Provide literacy training on recognizing and reporting potential indicators of insider threat.
Provide literacy training on recognizing and reporting potential indicators of insider threat.
Provide literacy training on recognizing and reporting potential and actual instances of social engineering and social mining.
Provide literacy training on recognizing suspicious communications and anomalous behavior in organizational systems using [Assignment: organization-defined indicators of malicious code].
Provide literacy training on the advanced persistent threat.
(a) Provide literacy training on the cyber threat environment; and (b) Reflect current cyber threat information in system operations.
a. Provide role-based security and privacy training to personnel with the following roles and responsibilities: [Assignment: organization-defined roles and responsibilities]: 1. Before authorizing access to the system, information, or performing assigned duties, and [Assignment: organization-defined frequency] thereafter; and 2. When required by system changes; b. Update role-based training content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and c. Incorporate lessons learned from internal or external security incidents or breaches into role-based training.
Provide [Assignment: organization-defined personnel or roles] with initial and [Assignment: organization-defined frequency] training in the employment and operation of environmental controls.
Provide [Assignment: organization-defined personnel or roles] with initial and [Assignment: organization-defined frequency] training in the employment and operation of physical security controls.
Provide practical exercises in security and privacy training that reinforce training objectives.
[Withdrawn: Moved to AT-2(4)].