Research Security Management certificate Program
Keep Your Research Safe from Theft and Misappropriation

Learn how to protect your precious assets now. Register for the Research Security Management Certificate Course and level up your program!
Threats to Research Fidelity
State-of-the-art research programs face serious threats every day. Because of the strategic importance of their work, research programs in cutting edge industries like biopharmaceuticals, biotechnology, telecommunications, oil/gas/nuclear energy, advanced computing and more face the theft, loss, or misappropriation of their Intellectual Property.
These threats aren’t new, but the danger remains. Without action, these programs face significant risks.
Invest in Research Security
Fortunately, there’s a solution to the threats research programs face. Building from a deep understanding of the value and importance of safeguarding research assets, we have developed an innovative curriculum designed to equip research personnel with the skills they need to protect their work from global security threats.
A lauded leader in the field of risk management, our decades of experience help organizations minimize the threats to their most valuable assets.
The RSM Certificate Program
Our innovative Research Security Management Certificate Program provides researchers and research program staff with the knowledge and skills they need to effectively identify, analyze, and neutralize risks to their programming.
The Research Security Management Certificate Program consists of five 60-minute courses that will help your organization keep its hard work safe.
What's in the Research Security Management Certificate Program?
The Research Security Management Certificate Program consists of five 60-minute courses. Participants who complete the five-course series receive a Research Security Management Certificate from the National Center for Therapeutics Manufacturing (NCTM) and are eligible for Continuing Education Units (CEUs).
How much does the Research Security Management Certificate Program cost?
The Research Security Management Certificate Program costs $975. You can register for the course year-round through the NCTM training website.
Research Security Management
Course Descriptions
COURSE #1
INTRODUCTION TO RESEARCH SECURITY (COURSE #: RSM 301)
OVERVIEW: This course provides an introduction to the theory and practice of securing research assets from inside and outside threats. Course content includes:
- An overview of research management best practices and basic concepts.
- Insights on internal and external threats that organizations face.
- How researchers and other research program staff can lead protection efforts, as well as how they can develop response and resource plans to effectively mitigate risks.
- An overview of Confidentiality, Integrity and Accessibility principles of information security and their application in the strategy of a Research Security Management Program.
PREREQUISITE: None
COURSE LENGTH: 60-minutes
FORMAT: Online
LEARNING OBJECTIVES: This foundational course provides the building blocks for the rest of the content in the Research Security Management Certificate Program. In it, learners will…
- Develop a basic understanding of Research Security Management practices.
- Discover how researchers and other internal stakeholders can proactively participate in safeguarding their research programs.
- Understand how research security supports all research organization stakeholders.
COURSE #2
UNDERSTANDING INSIDER THREAT RISKS TO RESEARCH PROGRAMS (COURSE #: RSM 302)
OVERVIEW: This course provides a deep examination of historical, current, and future national and insider researcher threats. Course content includes:
- An exploration of foreign influence activities that target research program professionals.
- An examination of how to create internal compliance policies and procedures to mitigate improper behaviors.
- How risk mitigation, intellectual property loss, and crisis management strategies can help research organizations neutralize national and global threats and create a culture of trust.
PREREQUISITE: RSM 301
COURSE LENGTH: 60-minutes
FORMAT: Online
LEARNING OBJECTIVES: This course provides an in-depth examination into insider threats to research programs. In it, learners will…
- Understand how foreign influence programs such as the Global Talents Recruitment Programs compromise the integrity of proprietary research data and other types of intellectual property.
- Examine the roles that researchers and other internal stakeholders play in the proactive protection of important research assets.
COURSE #3
IDENTIFYING ELICITATION: IDENTIFY SUBTLE ATTACKS AGAINST RESEARCHERS (COURSE #: RSM 303)
OVERVIEW: This course examines the practice of elicitation and how elicitation techniques are deployed against researchers and other program staff. Course content includes:
- An exploration of elicitation techniques across multiple situations, including social media and in-person interactions at conferences and speaking engagements.
- An examination of elicitation campaign “red flags.”
- An overview of techniques to deter, deflect, and defeat elicitation attempts.
PREREQUISITE: RSM 302
COURSE LENGTH: 60-minutes
FORMAT: Online
LEARNING OBJECTIVES: This course explores how elicitation techniques are used by bad actors to steal sensitive information from researchers and support staff. In the course, learners will…
- Discover how to recognize illicit elicitation attempts across multiple platforms (such as social media, email, in-person).
- Understand how to deter and deflect elicitation attempts.
- Understand how to report elicitation attempts so that threats can be identified and neutralized as quickly as possible.
COURSE #4
GET OFF THE X: PROTECTING RESEARCH PROGRAM ASSETS DURING TRAVEL (COURSE #: RSM 304)
OVERVIEW: This course examines the basic components of protecting research assets during domestic and international travel. Course content includes:
- A summary of common travel risks researchers face when at different engagements, including conferences, seminars, workshops, and speaking engagements.
- An overview of hostile surveillance and security methods employed against researchers during travel. Examples include encounters at immigration, port-of-entry interrogations, hotel room intrusions, and more.
- An overview of techniques that researchers can use to improve their travel security awareness and effectively manage the risk to research program assets.
PREREQUISITE: RSM 303
COURSE LENGTH: 60-minutes
FORMAT: Online
LEARNING OBJECTIVES: This course helps learners develop travel security best practices so they can avoid hostile attacks during domestic and international travel. By the end of the course, learners will be able to…
- Identify common techniques used by hostile actors that target researcher vulnerabilities.
- Employ a travel security mindset that keeps their research assets (physical and theoretical) safe before, during, and after travel.
- Reduce the threat of negative interactions with hostile actors through pre-planning and situational awareness.
- Understand how to identify and report hostile encounters during travel.
COURSE #5
DODGING DANGER: UNDERSTAND RESEARCH PROGRAM COMPLIANCE ISSUES (COURSE #: RSM 305)
OVERVIEW: This course examines the current compliance and regulatory risks landscapes that researchers in most industries face. Course content includes:
- An exploration of recent case studies regarding improper researcher behaviors and violations of compliance policies.
- An overview of how researchers and other research program staff can act as leaders to compliance policy adherence.
- An overview of how to create an organizational culture that prioritizes the protection of research program assets.
- Practical guidance to avoid the consequences of non-compliant behaviors.
PREREQUISITE: RSM 304
COURSE LENGTH: 60-minutes
FORMAT: Online
LEARNING OBJECTIVES:
This course dives into compliance issues caused by improper researcher behaviors and decisions. In the course, learners will learn to…
- Recognize activities that may be deemed conflicts of interest and/or violations of policy.
- Identify places they can seek guidance related to compliance and ethics questions within their organizations.
- Understand how to report ethics concerns they observe.
Let’s Get this PRocess Started…
You can call us at 908-500-6430, email us at info@cybertalons.com, or use the form below. You decide how you want to get in touch. We look forward to hearing from you!