Insider Threat Security Program
PDF Documents
- ITSP Manual – This is the Insider Threat Security Program Manual. It is set up so that all anyone needs to do is change the company name on the second page and then start running with it. Companies should be able to implement it without having to spend a penny, so it should be good for most of the smaller businesses and anyone who is stuck with a tight budget. It can also be modified to fit a company’s needs or used as a template when creating another program.
- ITRT Database – This is the Insider Threat Risk Tracker. It ties in with the ITSP Manual and allows for the tracking and recording of a lot of information in an easy to use format. It has been set up so that anyone who has Microsoft Access can immediately open it up. Anyone who does not have MS Access can download the free Access Runtime environment from Microsoft. Initial login is Username: Admin and Password: Admin.
- ITRT User Guide – This short document gives a basic rundown of how to use the ITRT database.
PDF Documents
Internet Sites
- ITSP Manual – This is the Insider Threat Security Program Manual. It is set up so that all anyone needs to do is change the company name on the second page and then start running with it. Companies should be able to implement it without having to spend a penny, so it should be good for most of the smaller businesses and anyone who is stuck with a tight budget. It can also be modified to fit a company’s needs or used as a template when creating another program.
- ITRT Database – This is the Insider Threat Risk Tracker. It ties in with the ITSP Manual and allows for the tracking and recording of a lot of information in an easy to use format. It has been set up so that anyone who has Microsoft Access can immediately open it up. Anyone who does not have MS Access can download the free Access Runtime environment from Microsoft. Initial login is Username: Admin and Password: Admin.
- ITRT User Guide – This short document gives a basic rundown of how to use the ITRT database.