Companies can often detect and mitigate external attacks. However, the insidious threat from an employee is harder to detect and can cause the most damage because they have legitimate access. That insider may steal solely for personal gain, or that insider may be a “spy”—someone who is stealing company information or products to benefit another organization or country. Attendees of this course will learn methods to prevent, deter, detect, mitigate, and respond to insider threats. They will learn to review procedures, identify deficiencies, and implement changes in their existing insider threat programs. For those in need a new program, this course will provide the template for success.