Secure Offboarding and Post-Employment Risk

Course Information

Difficulty: Professional

A practical series of three courses on building, operating and sustaining a trusted workforce.  The courses are aligned with the needs of Australia’s critical infrastructure sectors, as set out in the Security of Critical Infrastructure Act 2018, but are applicable to the workforce security needs of any organisation.

Designed to help organisations connect personnel security, enterprise security risk management, role design, and individual suitability in a defensible way.

Covering the full lifecycle — from recruitment, to ongoing suitability, through to secure offboarding.  The intent is to enable the recruitment and management of people to enhance the security of assets and operations through a Trusted Workforce Program.

This course focuses on secure offboarding and post-employment risk — an area where many organisations underestimate exposure and where insider threat activity often occurs.

Designed for senior executives, HR leaders, security, people partners, ICT, legal and risk professionals, the course provides a structured risk-based framework for managing sensitive separations, protecting critical assets, and ensuring that trust, access and obligations are appropriately managed when workers leave the organisation.

Participants explore different separation scenarios, residual risk, obligations such as confidentiality and IP protection, and the practical controls required for critical and high-trust roles. The course also introduces proportionate and ethical approaches to post-employment monitoring, and shows how offboarding connects back to the Trusted Workforce Program, insider threat prevention and CIRMP personnel-hazard expectations.

Practical templates support separation planning, access de-provisioning, debriefing, residual-risk assessment and documentation.

By the end of this course, participants will:

  1. Understand why offboarding is a high-risk moment in the workforce lifecycle.
  2. Distinguish between different separation scenarios and associated risk levels.
  3. Apply risk-based decision-making to offboarding approaches.
  4. Implement secure, sequenced offboarding processes across HR, ICT and security.
  5. Manage sensitive exits with professionalism and reduced risk escalation.
  6. Identify and manage residual risk after departure, including confidentiality and influence risk.
  7. Apply lawful and proportionate post-employment assurance, including appropriate use of OSINT.
  8. Integrate offboarding into governance, CIRMP obligations and continuous improvement.

After completing this course, participants will be able to:

  1. Design and implement a risk-based offboarding framework.
  2. Assess exit scenarios and select proportionate controls.
  3. Execute coordinated access removal and asset recovery.
  4. Manage difficult or high-risk separations professionally.
  5. Identify and document residual risk post-employment.
  6. Apply defensible monitoring and assurance approaches.
  7. Embed offboarding into enterprise risk and governance systems.

Welcome

0
Has Quiz
0
Has Quiz
0
Has Quiz
0
Has Quiz
0
Has Quiz
0
Has Quiz
0
Has Quiz
0
Has Quiz
0
    0
    Your Cart
    Your cart is emptyReturn to Shop