Trends in Insider Threat practice – what are the insider threat actors trying to do now? Trends in Insider Threat defense – what are the defenders trying to do now? Moderator: Michael Weir, Quanterion Solutions Incorporated Panelists: Thomas “TJ” Vestal, AFRL/Rome Bruce Gabrielson, CACI Matthew Sweeney, SRC Randy Trzeciak, Director CMU Insider Threat Group James…
Series: Insider Threat Workshop
The Insider Threat Workshop was a one-day review of current trends in Insider Threat tactics and remediation steps of interest to managers and Cyber Security professionals. The workshop provided an overview of the current state of understanding of who the “insiders” are, how they operate, what motivates them and what threats they pose to information systems. The workshop also addresses new approaches based on current technology, such as Cloud Computing and Bring Your Own Device (BYOD), and the threats they impose.
Presentation by Richard Cook on Next Generation Insider Threat.
Mark Troutman, Ph.D., Center for Infrastructure Protection and Homeland Security (CIP/HS) at the George Mason University Paul Losiewicz, Ph.D., Quanterion Solutions Incorporated (Presenter)
Presentation by Paul Losiewicz.
Presentation by Trent Brunson on Localized Encryption Groups (LEG).
Presentation by Randall Trzeciak.
Presentation by Matthew Sweeney.
Presentation by Zbigniew Kalbarczyk on BYOD/Cloud and the Insider Threat
Introduction to the Insider Threat workshop by Michael Weir.
Presentation by Bruce Gabrielson.