Course Series: Trusted Workforce Program
A practical series of three courses on building, operating and sustaining a trusted workforce. The courses are aligned with the needs of Australia’s critical infrastructure sectors, as set out in the Security of Critical Infrastructure Act 2018, but are applicable to the workforce security needs of any organisation.
Designed to help organisations connect personnel security, enterprise security risk management, role design, and individual suitability in a defensible way.
Covering the full lifecycle — from recruitment, to ongoing suitability, through to secure offboarding. The intent is to enable the recruitment and management of people to enhance the security of assets and operations through a Trusted Workforce Program.
Course Overview
This course focuses on secure offboarding and post-employment risk — an area where many organisations underestimate exposure and where insider threat activity often occurs.
Designed for senior executives, HR leaders, security, people partners, ICT, legal and risk professionals, the course provides a structured risk-based framework for managing sensitive separations, protecting critical assets, and ensuring that trust, access and obligations are appropriately managed when workers leave the organisation.
Participants explore different separation scenarios, residual risk, obligations such as confidentiality and IP protection, and the practical controls required for critical and high-trust roles. The course also introduces proportionate and ethical approaches to post-employment monitoring, and shows how offboarding connects back to the Trusted Workforce Program, insider threat prevention and CIRMP personnel-hazard expectations.
Practical templates support separation planning, access de-provisioning, debriefing, residual-risk assessment and documentation.
Learning Objectives
By the end of this course, participants will:
- Understand why offboarding is a high-risk moment in the workforce lifecycle.
- Distinguish between different separation scenarios and associated risk levels.
- Apply risk-based decision-making to offboarding approaches.
- Implement secure, sequenced offboarding processes across HR, ICT and security.
- Manage sensitive exits with professionalism and reduced risk escalation.
- Identify and manage residual risk after departure, including confidentiality and influence risk.
- Apply lawful and proportionate post-employment assurance, including appropriate use of OSINT.
- Integrate offboarding into governance, CIRMP obligations and continuous improvement.
Learning Outcomes
After completing this course, participants will be able to:
- Design and implement a risk-based offboarding framework.
- Assess exit scenarios and select proportionate controls.
- Execute coordinated access removal and asset recovery.
- Manage difficult or high-risk separations professionally.
- Identify and document residual risk post-employment.
- Apply defensible monitoring and assurance approaches.
- Embed offboarding into enterprise risk and governance systems.

