Introduction To Insider Threat


The Introduction to Insider Threats training course is designed to provide participants with a comprehensive understanding of individuals’ potential risks within an organisation.

Insider threats, often overlooked, can result in significant harm to an organisation’s data, intellectual property, and overall security. This course aims to equip participants with the knowledge and skills necessary to identify, mitigate, and respond to insider threats effectively.

The Introduction to Insider Threat consists of self-paced learning and exercises to assist you in gaining an understanding of what constitutes Insider Threats.


  • Understand the concept of insider threats and differentiate between various types of insider attacks.
  • Recognise behavioural, technical, and physical indicators that may signal potential insider threats.
  • Explore the motivations behind insider attacks and study common profiles of individuals who may pose insider threats.
  • Explore various strategies and best practices for mitigating insider threats, including access controls, monitoring systems, and employee awareness programs.
  • Understand the key components of an effective insider threat program and how to integrate it into existing security.
  • Gain insights into how organisations can strengthen their overall security posture by addressing insider threats.

Course Instructor

Your Instructor:
Boaz Fischer

About Boaz:

  • Boaz is Australia’s Trusted Authority on Insider Risk Management.
  • He has made it his mission to help business leaders understand the cybersecurity risks companies face from their own employees and put in place strategies to manage and mitigate these risks.
  • A cyber security expert par excellence, Boaz is the specialist you need to help you navigate the tricky waters and take action to avoid a catastrophic cyber breach.
  • His clients include three of the biggest banks in Australia, several Federal and State government agencies, and Australia’s largest national telecommunications organisations.
  • He brings together decades of experience and insights as a trusted cybersecurity consultant and fellow business owner to show CEOs and board members how to protect their high-value assets from insider cyber threats.

Topics Covered

  • Understanding of Insider Threats
  • Insider Sabotage
  • Insider Theft
  • Insider Fraud
  • Dealing with non-malicious Insiders
  • Best practice for prevention and detection


By the end of the course, participants will have a solid foundation in recognising, assessing, and responding to insider threats.

Armed with this knowledge, organisations can enhance their security measures and better protect sensitive information from internal risks, ultimately strengthening their overall cybersecurity resilience.

Who Should Attend

This course is suitable for cybersecurity professionals, IT administrators, human resources personnel, and anyone involved in managing and securing organisational assets.

It is also beneficial for individuals interested in enhancing their understanding of insider threats and strengthening their organisation’s overall security posture



Course Length:

Online and self-paced.

Sign up for early access