Loading Events

« All Events

  • This event has passed.

Insider Threat Workshop

August 15, 2013 @ 8:00 am - 4:00 pm UTC-5

The Insider Threat Workshop is a one-day review of current trends in Insider Threat tactics and remediation steps of interest to managers and Cyber Security professionals. The workshop provides an overview of the current state of understanding of who the “insiders” are, how they operate, what motivates them and what threats they pose to information systems. The workshop will also address new approaches based on current technology, such as Cloud Computing and Bring Your Own Device (BYOD), and the threats they impose.  Technical papers and a mid-day panel of experts, including representatives from the Air Force Research Laboratory (AFRL/Rome) will provide a wide-ranging discussion surface to engage most all areas of interest regarding the Insider Threat.  The output of this workshop will be used to update the 2007 “The Insider Threat to Information Systems” State of the Art Report (SOAR) published by the Defense Technical Information Center (DTIC) under the Information Assurance Technology Analysis Center (IATAC) which has recently been merged into the Cyber Security and Information Systems Information Analysis Center (CSIAC).

Agenda:

0800 – Registration and Badging, light pastries and coffee
0830 – Introduction and Overview

0845-0915 – Keynote for Insider Threat Panel/Conference – VIEW SLIDES
Bruce Gabrielson, PhD; CACI (Lead author of original report and consultant to DoD)

0915-0945 – Best Practices in Insider Threat Management – VIEW SLIDES
Randy Trzeciak, Director CMU Insider Threat Group

0945-1015 – BYOD/Cloud and the Insider Threat – VIEW SLIDES
Zbigniew Kalbarczyk, PhD., University of Illinois at Urbana Champaign

1015-1045 – Localized Encryption Groups (LEG) – VIEW SLIDES
Trent Brunson, AIS

1045-1100 – Break

1100-1215 – Panel Discussion
Trends in Insider Threat practice – what are the insider threat actors trying to do now?
Trends in Insider Threat defense – what are the defenders trying to do now?
Moderator: Michael Weir, Quanterion Solutions Incorporated
Panelists: Thomas “TJ” Vestal, AFRL/Rome
Bruce Gabrielson, CACI
Matthew Sweeney, SRC
Randy Trzeciak, Director CMU Insider Threat Group
James Henderson, Cyber Security-Information Assurance Program
Management/Counterespionage Training Course Instructor for TopSecretProtection.Com

1215-1330 – Lunch (provided) and informal discussion groups

1330-1400 – Insider Threat Current Events – the CIP Perspective – VIEW SLIDES
Mark Troutman, Ph.D., Center for Infrastructure Protection and Homeland Security (CIP/HS) at the George Mason University
Paul Losiewicz, Ph.D., Quanterion Solutions Incorporated (Presenter)

1400-1430 – Next Generation Insider Threat – VIEW SLIDES
Richard Cook, AIS

1430-1500 – Cyber Behavior – Physical and Virtual: The Whole Person Insider Threat Analysis Paradigm – VIEW SLIDES
Matthew Sweeney, SRC

1500-1515 – Research Challenge Problems – VIEW SLIDES
Moderator: Paul Losiewicz, Ph.D., Quanterion Solutions Incorporated

1515-1600 – Final discussion/conclusion

Learn More

Presenters

Michael Weir
Michael Weir, CSIAC Director, has been with Quanterion Solutions, Inc. for about four years with a primary focus in cyber security. Prior to joining QSI, Michael spent 32 years in and out of the Air Force and Air National Guard, maintaining ties with the Air Force Research Laboratory while supporting operational units in the US and overseas. He has degrees in Music Performance, Electrical and Computer Engineering, and Information Management along with several certifications in network and computer security.

Dr. Paul Losiewicz
Senior Scientific Advisor at Quanterion Solutions Incorporated

Matt Sweeney

Details

Date:
August 15, 2013
Time:
8:00 am - 4:00 pm
Event Category:
Event Tags:
, ,

Organizer

CSIAC
Phone:
800-214-7921
Email:
info@csiac.org
Website:
https://www.csiac.org/

Venue

Griffiss Institute
725 Daedalian Drive
Rome, NY 13441 United States
+ Google Map
Phone:
(315) 838-1696
Website:
http://www.griffissinstitute.org/

Reader Interactions

Leave a Comment