September 2-3, 2015
This course covers a wide range of potential threats: terrorist infiltration, espionage, sabotage, theft, hacking, whistle-blowers and much more.
These threats plague companies, government or military entities alike, costing millions of dollars annually and exposing us all to serious vulnerabilities.
This unique course offers trainees step-by-step methods for understanding and mitigating those threats. Countering Insider Threat is suitable for anyone tasked with preventing any kind of threat that comes from within, be it espionage, embezzlement, sabotage, hacking, infiltration and much more.
Students first learn about the nature of the threat itself. They then explore those populations and profiles most likely to be vulnerable to recruitment, or motivated to act. Lastly, students are given tools to identify and assess who within an organization poses a threat and how to best close up the loopholes. This topic addresses a problem whose wide ranging damage increases every year – costing billions of dollars and exposing agencies to serious vulnerabilities.
LOCATION: AMSTERDAM, NETHERLANDS
Industry – Euro 1,195.00
Government – Euro 1,095.00
- Nature of the Insider Threat
- Risk populations
- Threat Assessment and Suspicion Indicators
- Applicant Threat Assessment
- Clearance Interviewing
- Background checks for individuals and contractors (organizations)
- In-employment threat mitigation
- Conflicting allegiances
- Questioning skills
Train your Security and Human Resources department on what to look for, and how to conduct security-oriented interviewing as well as assess applicants for their threat potential to the organization.
|08:30 – 08:40||Introduction to the course curriculum, learning objectives and schedule – Chameleon trainers will introduce the course schedule and administration.|
|08:40 – 10:00||Defining Insider Threat – trainer will frame the threat to an organization in terms of infiltration capabilities starting from a lone wolf and ending with operatives working for a crime syndicate or for a country. Trainers will also discuss the motives for infiltration vis-a-vis departments and roles within the organization.|
|10:00 – 10:15||Morning Break|
|10:15 -11:00||Risk Populations – Given the threat definitions outlined in previous modules, trainers and students will together establish the different risk populations at the organization. Each risk population will be subject to different pre-employment and in-employment screening procedures.|
|11:00 – 12:00||Threat Assessment of Applicant – Trainees will be introduces to the MOs and correlating suspicion indicators that relate to infiltration and recruitments of insiders. Trainees will also review the psychological profiles that are most likely to become an insider’s threat.|
|12:00 – 13:00||Lunch|
|13:00 – 14:15||Issues of Conflicting Allegiance – An applicant or an employee may have allegiances that do not coincide or are in direct conflict with the organization’s mission. These allegiances may be formed out of political or religious views, culture and upbringing or out of personal relationship or personal gain. A conflicting allegiance is the factor most susceptible for recruitment or for independent hostile activity. The trainers will describe case studies involving conflicting allegiances and will talk about how these may be identified in a pre-employment and in-employment screening.|
|14:15 -15:15||Suspicion Indicators in Employment Applications – Trainers will provide examples of suspicion indicators that a potential adversary will display in an application form and process (including resumes, email communications, etc.). Trainers will also discuss how an application form should be designed to best expose suspicion indicators.|
|15:15 – 15:30||Afternoon Break|
|08:30 – 08:40||Recap|
|08:40 -9:40||Interviewing Exercise – Students will assess conduct an interview in the class. The students will then have to determine the security steps required to deal with the suspicion indicators found.|
|09:40 -10:00||In-Employment Screening– In-employment screening is the process involved in detecting the possibility for an employee to be recruited, to be vulnerable for recruitment activities or to have independent hostile intent. Trainers will discuss how physical tests, technological tools and periodic interviews can be preformed to identify possible suspicion for the entire employee population.– Students will assess conduct an interview in the class. The students will then have to determine the security steps required to deal with the suspicion indicators found.|
|10:00 -10:15||Morning Break|
|10:15 – 11:00||In-employment Screening (Continued)|
|10:15 – 11:00||Interviewing References– Trainers will discuss issues with interviewing applicant references including the location of the interview, preparing for the interview and assessing the validity of the information.|
|12:00 – 13:00||Lunch|
|13:00 – 14:15||Background Checks for Contractors (companies) – Trainers will discuss tools to assess the background, commercial viability of contracting companies and contracted employees.|
|14:15 – 15:15||Comprehensive Exercise – The students will undergo an exercise where they will have to use the tools given to them during the training program. The exercise will simulate an attempted infiltration into an organization.|
|15:15 – 15:30||Afternoon Break|
|15:15 – 15:30||Comprehensive Exercise, continued|
|16:15 – 16:30||Conclusions, Q & A and, Handing out of Certificates.|
WHO SHOULD ATTEND?
- Security and HR professionals
- Intelligence officers
- Military and law enforcement … can all benefit from this course.
This course has been delivered to many organizations all over the world including the U.S. Military, Central Banks and Defense Contractors.
Chameleon trainers have a rich background in the application and design of security protocols and technology for threat mitigation.
Amotz Brandes – Managing Partner / Chameleon Associates
Mr. Brandes is a veteran of an Israeli Defense Forces Special Reconnaissance and Intelligence Unit. He began his career as a Security Agent for El-Al Israeli Airlines in Los Angeles. Since joining Chameleon Associates he formed the Consulting Division and developed training programs in “Red Teaming”, “Predictive Profiling” and “Security Engineering”. Mr. Brandes has an extensive project management and business development experience from international and federal projects. He was the project manager for many security audits and red teaming exercises around the world at mass transit hubs, government facilities, museums, malls and airports to name a few. He is the Author of the “Terrorist Threat Mitigation Reference Guide” and a lecturer and presenter in corporate and government settings, worldwide. Mr. Brandes has a B.A Degree in International Development Studies from UCLA. He is the Chair of the Homeland Security Committee of the California Israel Chamber of commerce.
TAKE HOME MATERIAL
The Terrorist Threat Mitigation Guide CD – The Guide is a reference book designed to help security professionals to better map their protected environments and security threats. The guide describes key terminologies and definitions of threat and provides successful formulas for threat mitigation ($40 Value). Seminar attendees will also receive a hard copy of the seminar multimedia presentation.
Chameleon seminars have been delivered to hundreds of law enforcement, security, military, corporate and non-profit organizations worldwide. Over the years, our trainers have received high praise from students, with average post-course survey scores never below 95%. The only consistent complaint we hear is that our students wished the training were longer because they want more.
Here are some comments from our Countering Insider Threat seminar participants:
|Amotz did an excellent job presenting this course. He encouraged each person to engage in the discussion. I especially enjoyed his anecdotes and examples (real world). The exercises were well-thought out and helped to cement the information presented during the lectures.|
|Excellent course. Many security officers within the government should take this course. Opened by eyes.|
|I very much enjoyed the learning experience and hope to participate in another training session.|
|Very informative course, well presented…would be great course for people doing security, investigations and hiring.|
|Amotz is extremely knowledgeable on all topics he discussed. Very interesting speaker and kept class engaged. Really enjoyed the class and learned a lot.|
|A phenomenal course with excellent instructor. The presenter brought a lot of experience and knowledge during the block of instructions. I will be bringing these new skill sets into the work place and incorporate into our security division training plan. Look forward to the next Chameleon Associate on base!!!|
|He went above and beyond teaching us things that may not be used in our jobs but very useful information. He did a great job!|
|Great role playing and in-depth look at the types of threats. Will be looking into more courses for sure.|
|Amotz Brandes was excellent at conducting this training and has given me skills that can be immediately used within my workplace.|
Some of the organizations that have attended such Chameleon seminars include: The U.S. Department of Homeland Security – Transportation Security Administration, U.S. Department of Homeland Security – Federal Protective Services, ALPA -Airline Pilot Association, Department of Justice, Law Enforcement agency from around the world, Defense Personnel Security Research Center (PERSEREC), U.S. Army, U.S. Marine Corps, North American Aerospace Defense Command (NORAD), U.S. General Accounting Office (GAO), AntiCrime International (Australia), The Institute for Homeland Security, Texas A&M University, Boeing , State of Alaska Department of Homeland Security, Canadian Air Transit Security Administration (CATSA) and more…