***Coming Soon***
‘We shape our tools and then our tools shape us’ - Marshall McLuhan
Course Purpose
This course has been designed for risk and security sectors, and for insider threat specialist at critical infrastructure. It introduces science that post dates established precepts for regulating how insiders behave and and assumptions about how they make the choices that they do. Concepts introduced include: i) emotional cues that if left unattended amplify into workplace sabotage and workplace violence; ii) organizational culture and workplace conditions that self-justify cognitive rationalizations and excuses when insiders are tempted to do bad things (e.g. occupational fraud, theft or corruption; iii) engagement of insiders for in vigilance for social engineering attacks to gain access to personal identifiers and corporate trade secrets, and iv) insiders closing the security gaps from dependency on government identification and other types of documents to make security and business decisions.
Duration: 25 - 30 Hours with Inter-Session Assignments
Background
Organizational culture and workplace environment are hand down the most significant influencer on insider behaviour.
Significant changes to business practices, societal structures and workplaces have been underway for more than two decades in what is coined the 'Information Age' increasing cognitive dissonance and emotional stress. This course proffers a adding a new dimension to conventional security and insider threat practice that is based behavioural and crime prevention science. Complex systems thinking weaves together multi buckets science including, but not limited to: human evolutionary biology, molecular and behavioural genetics, neurology and neural networks, ethology and endocrinology. To put things in context, there is a whole lot going on below levels conscious awareness, and which subordinates rational thought. As primatologist, neurologist Stanford University's Robert Sapolsky famously states: "Evolution is a tinker, not a builder. With that comes a lot of nutty wiring." The future of insider threat security in the Information Age is turning turn to science and learning hot to apply it in practical, effective ways.
Target Audience
Learning Objectives
By the end of this course, participants will:
Course Delivery Format
The course is delivered in adult learner format in half day sessions over 7 weeks with intersessional readings and assignments. As continuous learners, participants are encouraged to keep a journal documenting their ideas, thoughts, feelings and insights and a best practice.
Course Content
Part 1: Case Study: Insider Mitigation of Identity and Entitlement Threats
Participants are introduced to the overwhelming scope of theft and brokerage of legally attributed personal identifiers. Legitimate personal identifiers used as instruments for predatory criminal attacks and acts of terror attacks ranging from street-level crime, to boarding the 911 aircraft which struck the Pentagon and World Trade Center. You will learn the limitations of law enforcement in suppressing this international criminal activity, the unattended threats from security trade-off made by government issuers of means of identification and weaknesses in 'know-your-client' protocols and procedures in the Regulations attached to Proceeds of Crime (Money Laundering) and Terrorist Financing Act. Discussion on optimizing insider capacity knowledge and skills to detect a ruse at the point-of-surface provides a natural segue to the more complex and heavily nuanced insider threats posed (e.g. disengagement, workplace sabotage, workplace violence with interventions based in new science.
Topics: Global dynamics of personation and identity fraud. Types of identification and their strengths and weaknesses. Case studies and group exercises. History of legislative responses to identity fraud and personation/ Group exercises on identifying gaps in current policies. Anti-money laundering/terrorist financing/consumer account attacks, behaviour cues and transactional red flags.
Part II: Implicit Bias
Implicit bias influences the judgement of employees of corporations adhering to government ‘Know your Client’ and red flag Regulatory requirements with some incidents resulting in successful six-figure civil litigation when grounded in accusations of racism. The day-to-day harm to reputation and trust is bit quantifiable from rejecting people who are who they say they are and are entitled to. Implicit bias impacts the judgment of all insiders, not just those at the point-of-service handling documents. Implicit biases are unconscious, unlike beliefs with are conscious (cognitive).
Topics: Definition and impact of implicit bias. Origin of Implicit Bias. Distinguishing implicit bias from racism, Debiasing techniques.
Part III: Intuition, Judgement and Decision Making
Participants are introduced to the science on Emotional Intelligence and four identified emotional intelligence competencies. You will learn that where IQ is pretty much set, emotional intelligence (SQ) can be improved in most people. As a group participants, will discuss the results and insights from the self-test homework handed out in Session 2 on individual emotional styles and discuss where this may apply to insider threats and the mitigation of identity fraud at the point-of-service. Finally you will be introduced to heuristics biases - cognitive shortcuts that influence your decision making.
.
Topics: Introduction to the brain’s cognitive and more ancient sensory information processing systems. How these systems influence each other and under what conditions. How emotions influence perception and inform judgment and decision-making, Intuition. Intro to Emotional Intelligence. Heuristic bias.
Part IV Establishing a Baseline for Observing Behaviour
This session moves from theory to practice by introduces insider competencies and skills that are needed as primary information gathers at the point-of-contact/service to counter dependency on ID and other documents to make security and business decisions. Commonly held myths about lie detection and body language are dispelled and mitigated. Insights gained from this session are seamless to advanced interviewing skills required by insiders handling more high risk situations. This session anticipates more advanced topics on the underpinning biology on human behaviour applied to more complex and nuanced insider threats including occupational fraud, theft, corruption, workplace sabotage and workplace violence.
.
Topics: Why it is important to establish a baseline for observing human behaviour. Techniques for messaging vigilance at the points of contact. What to have total belief in response to questions. Why and techniques for using eye contact to detect deception.
Part V: Effective Information Gathering
The basis for making effective judgments on the veracity of what people are telling point-of-contact insider hinges on how information is gathered, which requires mastery of the open ended question. In normal conversation, people listen to what is being said and fill in the blanks when there is missing information. For assessing veracity insider must listen to context of the language in response to questions - how it is being said operating from a standard point-of-contact script applied by everyone. Seamless, more advanced training in this domain is available up to and including ethical investigative interviewing.
Topics: Pure version (‘in the words of”) information-gathering techniques. Developing a standard information-gathering plan. General rules for effective information gathering. Techniques for addressing ambiguity, deflection and resistance
Part VI: Topics in Biology and Prevention Science
This session is begins with the psychology of risk before establishing a baseline understanding of behavioural biology (BehBio) research applicable to insider threats. You will learn terminology useful to self-directed learners wishing to get into this the topic of genetics in more detail. Molecular biology techniques are used to identify specific biomarkers associated with unusual behavioral patterns in individuals. Psychobiological Research helps with understanding the molecular basis of stress and emotional responses can lead to insights into employees' motivations, helping organizations to develop better support systems to mitigate potential insider threats.
Topics: Behavioural Evolution. Molecular Genetics. Behavioural Genetics. Biology of Aggression. Social Ecology of Crime.
Session 7 New Science Observations for Dynamic Systems Thinkers
I wouldn't have seen it, if I hadn't believed it. - Marshall McLuhan (1960s)
This session is for security and insider threat though leaders. It introduces insights beyond the language, precepts, constructs and science of the Industrial era. This is distinct and apart from the evolutionary reality of human brain physiology and the internal biology of insiders crafted by environmental conditions that began 1.9 billion years ago from single cell life on the planet. This session is about since that places insider behaviour squarely in the context of mysterious forces at play in the natural world, with lessons from nature one should pay attention to that conflict with our species invented reality.
Begin with the end in mind and always sharpen the saw - Stephen Covey (1989)
Topics: Chaos. Emergence., Complexity.
‘We shape our tools and then our tools shape us’ - Marshall McLuhan
Course Purpose
This course has been designed for risk and security sectors, and for insider threat specialist at critical infrastructure. It introduces science that post dates established precepts for regulating how insiders behave and and assumptions about how they make the choices that they do. Concepts introduced include: i) emotional cues that if left unattended amplify into workplace sabotage and workplace violence; ii) organizational culture and workplace conditions that self-justify cognitive rationalizations and excuses when insiders are tempted to do bad things (e.g. occupational fraud, theft or corruption; iii) engagement of insiders for in vigilance for social engineering attacks to gain access to personal identifiers and corporate trade secrets, and iv) insiders closing the security gaps from dependency on government identification and other types of documents to make security and business decisions.
Duration: 25 - 30 Hours with Inter-Session Assignments
Background
Organizational culture and workplace environment are hand down the most significant influencer on insider behaviour.
Significant changes to business practices, societal structures and workplaces have been underway for more than two decades in what is coined the 'Information Age' increasing cognitive dissonance and emotional stress. This course proffers a adding a new dimension to conventional security and insider threat practice that is based behavioural and crime prevention science. Complex systems thinking weaves together multi buckets science including, but not limited to: human evolutionary biology, molecular and behavioural genetics, neurology and neural networks, ethology and endocrinology. To put things in context, there is a whole lot going on below levels conscious awareness, and which subordinates rational thought. As primatologist, neurologist Stanford University's Robert Sapolsky famously states: "Evolution is a tinker, not a builder. With that comes a lot of nutty wiring." The future of insider threat security in the Information Age is turning turn to science and learning hot to apply it in practical, effective ways.
Target Audience
- Security thought leaders engaged with systems, facilities, technologies, and services essential to the well being of citizens and government
- Independent professionals including risk managers, security practitioners.
- Insider harms reduction specialists, police and independent crime prevention specialist.
Learning Objectives
By the end of this course, participants will:
- Apply complex systems thinking to threat assessments at critical infrastructure designed for the Information Age
- Articulate the distinction between the dynamic nature of insider threats and linear, static nature of physical and mechanical threats
- In the shorter term: i) Mitigate unattended to threats posed from dependency on government identification and other types of documents to make security and business decisions the closes security gaps in the government ID issuing processes, and ii) address the unaccounted for threats and insider fallibilities in Photo ID comparison regulated by FINTRAC Proceeds of Crime (Money Laundering) and Terrorist Financing Regulations.
- In the longer term i) to identify and mitigate organization culture and workplace ecosystem conditions which deplete emotional resilience to suppress emotional cues leading to revenge (e.g. workplace sabotage, workplace violence), and ii) to eliminate organizational culture rationalizations and excuses when insiders are tempted to do bad things (e.g. Occupational fraud, theft, or corruption), and iii) weave action planning in insider threat mitigation practice for developing effective programs and strategies for the Information Age.
Course Delivery Format
The course is delivered in adult learner format in half day sessions over 7 weeks with intersessional readings and assignments. As continuous learners, participants are encouraged to keep a journal documenting their ideas, thoughts, feelings and insights and a best practice.
Course Content
Part 1: Case Study: Insider Mitigation of Identity and Entitlement Threats
Participants are introduced to the overwhelming scope of theft and brokerage of legally attributed personal identifiers. Legitimate personal identifiers used as instruments for predatory criminal attacks and acts of terror attacks ranging from street-level crime, to boarding the 911 aircraft which struck the Pentagon and World Trade Center. You will learn the limitations of law enforcement in suppressing this international criminal activity, the unattended threats from security trade-off made by government issuers of means of identification and weaknesses in 'know-your-client' protocols and procedures in the Regulations attached to Proceeds of Crime (Money Laundering) and Terrorist Financing Act. Discussion on optimizing insider capacity knowledge and skills to detect a ruse at the point-of-surface provides a natural segue to the more complex and heavily nuanced insider threats posed (e.g. disengagement, workplace sabotage, workplace violence with interventions based in new science.
Topics: Global dynamics of personation and identity fraud. Types of identification and their strengths and weaknesses. Case studies and group exercises. History of legislative responses to identity fraud and personation/ Group exercises on identifying gaps in current policies. Anti-money laundering/terrorist financing/consumer account attacks, behaviour cues and transactional red flags.
Part II: Implicit Bias
Implicit bias influences the judgement of employees of corporations adhering to government ‘Know your Client’ and red flag Regulatory requirements with some incidents resulting in successful six-figure civil litigation when grounded in accusations of racism. The day-to-day harm to reputation and trust is bit quantifiable from rejecting people who are who they say they are and are entitled to. Implicit bias impacts the judgment of all insiders, not just those at the point-of-service handling documents. Implicit biases are unconscious, unlike beliefs with are conscious (cognitive).
Topics: Definition and impact of implicit bias. Origin of Implicit Bias. Distinguishing implicit bias from racism, Debiasing techniques.
Part III: Intuition, Judgement and Decision Making
Participants are introduced to the science on Emotional Intelligence and four identified emotional intelligence competencies. You will learn that where IQ is pretty much set, emotional intelligence (SQ) can be improved in most people. As a group participants, will discuss the results and insights from the self-test homework handed out in Session 2 on individual emotional styles and discuss where this may apply to insider threats and the mitigation of identity fraud at the point-of-service. Finally you will be introduced to heuristics biases - cognitive shortcuts that influence your decision making.
.
Topics: Introduction to the brain’s cognitive and more ancient sensory information processing systems. How these systems influence each other and under what conditions. How emotions influence perception and inform judgment and decision-making, Intuition. Intro to Emotional Intelligence. Heuristic bias.
Part IV Establishing a Baseline for Observing Behaviour
This session moves from theory to practice by introduces insider competencies and skills that are needed as primary information gathers at the point-of-contact/service to counter dependency on ID and other documents to make security and business decisions. Commonly held myths about lie detection and body language are dispelled and mitigated. Insights gained from this session are seamless to advanced interviewing skills required by insiders handling more high risk situations. This session anticipates more advanced topics on the underpinning biology on human behaviour applied to more complex and nuanced insider threats including occupational fraud, theft, corruption, workplace sabotage and workplace violence.
.
Topics: Why it is important to establish a baseline for observing human behaviour. Techniques for messaging vigilance at the points of contact. What to have total belief in response to questions. Why and techniques for using eye contact to detect deception.
Part V: Effective Information Gathering
The basis for making effective judgments on the veracity of what people are telling point-of-contact insider hinges on how information is gathered, which requires mastery of the open ended question. In normal conversation, people listen to what is being said and fill in the blanks when there is missing information. For assessing veracity insider must listen to context of the language in response to questions - how it is being said operating from a standard point-of-contact script applied by everyone. Seamless, more advanced training in this domain is available up to and including ethical investigative interviewing.
Topics: Pure version (‘in the words of”) information-gathering techniques. Developing a standard information-gathering plan. General rules for effective information gathering. Techniques for addressing ambiguity, deflection and resistance
Part VI: Topics in Biology and Prevention Science
This session is begins with the psychology of risk before establishing a baseline understanding of behavioural biology (BehBio) research applicable to insider threats. You will learn terminology useful to self-directed learners wishing to get into this the topic of genetics in more detail. Molecular biology techniques are used to identify specific biomarkers associated with unusual behavioral patterns in individuals. Psychobiological Research helps with understanding the molecular basis of stress and emotional responses can lead to insights into employees' motivations, helping organizations to develop better support systems to mitigate potential insider threats.
Topics: Behavioural Evolution. Molecular Genetics. Behavioural Genetics. Biology of Aggression. Social Ecology of Crime.
Session 7 New Science Observations for Dynamic Systems Thinkers
I wouldn't have seen it, if I hadn't believed it. - Marshall McLuhan (1960s)
This session is for security and insider threat though leaders. It introduces insights beyond the language, precepts, constructs and science of the Industrial era. This is distinct and apart from the evolutionary reality of human brain physiology and the internal biology of insiders crafted by environmental conditions that began 1.9 billion years ago from single cell life on the planet. This session is about since that places insider behaviour squarely in the context of mysterious forces at play in the natural world, with lessons from nature one should pay attention to that conflict with our species invented reality.
Begin with the end in mind and always sharpen the saw - Stephen Covey (1989)
Topics: Chaos. Emergence., Complexity.
Course Price: $4,000
- Articulate the impact that culture and workplace environment can have on depleting the emotional resiliency of insiders to triggers inducing workplace sabotage and workplace violence
Insider Threat Mitigation Certificate
A certification certificate will be issued for full participation in this attendance in this training, that includes completion of intersession assignments.
A certification certificate will be issued for full participation in this attendance in this training, that includes completion of intersession assignments.
About the Instructor
John Lyons' professional development began in policing over 28 years. With multiple years of uniform and criminal investigations experience, he was assigned to the RCMP Federal Policing Branch, then Interpol Ottawa National Central Bureau. He finished out this career in the national training office, were he co-established the International Police Training Assistance Program and transferred training know how to Central Europe and Southeast Asia on intelligence analysis and money laundering. Post policing he joined the Insurance Crime Prevention Bureau of Canada (Toronto) conducting fraud investigations requested by insurance companies and independent adjusters. He spent thirteen years (Kingston) consulting on threats posed to health care card registration systems and preventing insider threats posed by trusted diagnosing and billing agents. John now applies this experience and continuing research for incorporating insights from science into conventional security and insider threat practice at critical infrastructure.
John Lyons' professional development began in policing over 28 years. With multiple years of uniform and criminal investigations experience, he was assigned to the RCMP Federal Policing Branch, then Interpol Ottawa National Central Bureau. He finished out this career in the national training office, were he co-established the International Police Training Assistance Program and transferred training know how to Central Europe and Southeast Asia on intelligence analysis and money laundering. Post policing he joined the Insurance Crime Prevention Bureau of Canada (Toronto) conducting fraud investigations requested by insurance companies and independent adjusters. He spent thirteen years (Kingston) consulting on threats posed to health care card registration systems and preventing insider threats posed by trusted diagnosing and billing agents. John now applies this experience and continuing research for incorporating insights from science into conventional security and insider threat practice at critical infrastructure.
For more details on the course and grants contact:
Matt Rakowski
Kestrel Partners Group
[email protected]
Matt Rakowski
Kestrel Partners Group
[email protected]