SlideShare a Scribd company logo
Insider Threats
Tom McAndrew

1
Ninja
KU – “NINE”

Ninja
Shinobi

NO – “AND/TALENT
ONNA- “Woman”

ICHI – “ONE”

HIMEJI Castle

2
American Ninja Warrior

3
Today’s Threats
“The ongoing cyber-thefts from the networks of
public and private organizations, including Fortune
500 companies, represent the greatest transfer of
wealth in human history.”

4

http://www.nsa.gov/research/tnw/tnw194/article2.shtml
ONCIX

5
ONCIX
• Insider threats remain the top counterintelligence challenge to our community.
• Over the past century, the most damaging U.S. counterintelligence failures were perpetrated by a trusted
insider with ulterior motives.
• In each case, the compromised individual exhibited the identifiable signs of a traitor – but the signs went
unreported for years due to the unwillingness or inability of colleagues to accept the possibility of treason.
• Insiders … are people who have been lured to betray their nation for ideological reasons, a lust for
money or sex, or through blackmail.
• Mankind's methods may change – but core motivations do not.
• Insiders convicted of espionage have, on average, been active for a number of years before being
caught.
• The damage caused by malicious insiders will likely continue to increase unless we have effective
insider threat detection programs that can proactively identify and mitigate the threats before
they fully mature.

6
http://www.ncix.gov/issues/ithreat/index.php
NITTF

7
Six Recommendations from FBI
Ease of Implementation
More Technical

Less Technical

1. Use appropriate screening
processes to select new
employees.

2. Educate and regularly train
employees on security or other
protocols

3. Provide non-threatening,
convenient ways for employees
to report suspicions.

5. Routinely monitor computer
networks for suspicious activity.

4. Ensure that proprietary
information is adequately, if not
robustly, protected.

6. Ensure security (to include computer
network security) personnel have the
tools they need.

“Remind employees that reporting security concerns is vital to
protecting your company’s intellectual property, its reputation, its
financial well-being, and its future. They are protecting their own
jobs. Remind them that if they see something, to say something.”
– FBI Insider Threats
FBI: http://www.fbi.gov/about-us/investigate/counterintelligence/the-insider-threat
ONCIX: http://www.ncix.gov/issues/ithreat

8
Why we need Network Analytics?

9
Rapid Adoption of 4 “Game Changing” Technologies

10
Final Note

Thanks for listening.
Tom McAndrew
Tom.mcandrew@coalfire.com
11

More Related Content

What's hot

Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Maira Asif
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Sai praveen Seva
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
sherrysher82
 
Power Point Gov
Power Point GovPower Point Gov
Power Point Govarii827
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
Pierluigi Paganini
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
Murray Security Services
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivismBilal Ali
 
Cyber war
Cyber warCyber war
Cyber war
Praveen
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
Jamie Moore
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Hacking
HackingHacking
Hacking
kill4love
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
ideaflashed
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
EnclaveSecurity
 
About cyber war
About cyber warAbout cyber war
About cyber war
eugenvaleriu
 

What's hot (20)

Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
 
Power Point Gov
Power Point GovPower Point Gov
Power Point Gov
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Cyber war
Cyber warCyber war
Cyber war
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Hacking
HackingHacking
Hacking
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
About cyber war
About cyber warAbout cyber war
About cyber war
 

Viewers also liked

A Survey on Balancing the Network Load Using Geographic Hash Tables
A Survey on Balancing the Network Load Using Geographic Hash TablesA Survey on Balancing the Network Load Using Geographic Hash Tables
A Survey on Balancing the Network Load Using Geographic Hash Tables
IOSR Journals
 
Actividad 7 momentos claves batz socop marta maría
Actividad 7 momentos claves batz socop marta maríaActividad 7 momentos claves batz socop marta maría
Actividad 7 momentos claves batz socop marta maría
MartaBatz
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
IOSR Journals
 
Empresarismo nueva
Empresarismo nuevaEmpresarismo nueva
Empresarismo nuevaarcicol
 
Vra core
Vra coreVra core
Vra core
leedal87
 
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...Steven Wardell
 
CISummit 2013: Karen Gardner,
CISummit 2013: Karen Gardner, CISummit 2013: Karen Gardner,
CISummit 2013: Karen Gardner, Steven Wardell
 
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Steven Wardell
 
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...Steven Wardell
 
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving NetworksCISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving NetworksSteven Wardell
 
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...Steven Wardell
 
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...Steven Wardell
 
The Network Approach to Change Initiatives
The Network Approach to Change InitiativesThe Network Approach to Change Initiatives
The Network Approach to Change Initiatives
Steven Wardell
 
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...Steven Wardell
 
TNR2013 David Rock, The Neuroscience of Engagement
TNR2013 David Rock, The Neuroscience of EngagementTNR2013 David Rock, The Neuroscience of Engagement
TNR2013 David Rock, The Neuroscience of EngagementSteven Wardell
 
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...Steven Wardell
 
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...Steven Wardell
 
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...Steven Wardell
 
TNR2013 Ron Burt, Network Advantage on How the Network Was Built
TNR2013 Ron Burt, Network Advantage on How the Network Was BuiltTNR2013 Ron Burt, Network Advantage on How the Network Was Built
TNR2013 Ron Burt, Network Advantage on How the Network Was BuiltSteven Wardell
 
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...Steven Wardell
 

Viewers also liked (20)

A Survey on Balancing the Network Load Using Geographic Hash Tables
A Survey on Balancing the Network Load Using Geographic Hash TablesA Survey on Balancing the Network Load Using Geographic Hash Tables
A Survey on Balancing the Network Load Using Geographic Hash Tables
 
Actividad 7 momentos claves batz socop marta maría
Actividad 7 momentos claves batz socop marta maríaActividad 7 momentos claves batz socop marta maría
Actividad 7 momentos claves batz socop marta maría
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
Empresarismo nueva
Empresarismo nuevaEmpresarismo nueva
Empresarismo nueva
 
Vra core
Vra coreVra core
Vra core
 
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
 
CISummit 2013: Karen Gardner,
CISummit 2013: Karen Gardner, CISummit 2013: Karen Gardner,
CISummit 2013: Karen Gardner,
 
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
 
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
 
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving NetworksCISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
 
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
 
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
 
The Network Approach to Change Initiatives
The Network Approach to Change InitiativesThe Network Approach to Change Initiatives
The Network Approach to Change Initiatives
 
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
 
TNR2013 David Rock, The Neuroscience of Engagement
TNR2013 David Rock, The Neuroscience of EngagementTNR2013 David Rock, The Neuroscience of Engagement
TNR2013 David Rock, The Neuroscience of Engagement
 
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
 
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
 
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
 
TNR2013 Ron Burt, Network Advantage on How the Network Was Built
TNR2013 Ron Burt, Network Advantage on How the Network Was BuiltTNR2013 Ron Burt, Network Advantage on How the Network Was Built
TNR2013 Ron Burt, Network Advantage on How the Network Was Built
 
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
 

Similar to CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

The Insider Threat January.pptx
The Insider Threat January.pptxThe Insider Threat January.pptx
The Insider Threat January.pptx
BertrandRussell6
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
Doing What I Do
 
powerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptxpowerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptx
deveraralph2
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
Froilan Cantillo
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Dr. Lydia Kostopoulos
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political Breaches
John Bambenek
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
Ayodeji Rotibi
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
Marin Ivezic
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Dr. Tim Dosemagen
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarRaghunath G
 
Social Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark ArtsSocial Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark Arts
n|u - The Open Security Community
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
Pace IT at Edmonds Community College
 
Social Engineering By Rakesh Nagekar
Social Engineering By Rakesh NagekarSocial Engineering By Rakesh Nagekar
Social Engineering By Rakesh Nagekar
nforceit
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
Murray Security Services
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Maurice Dawson
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
Jose L. Quiñones-Borrero
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
OWASP Foundation
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat Mitigation
Roger Johnston
 
Insider threats
Insider threatsInsider threats
Insider threats
izoologic
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
ZakiAhmed70
 

Similar to CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network (20)

The Insider Threat January.pptx
The Insider Threat January.pptxThe Insider Threat January.pptx
The Insider Threat January.pptx
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
powerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptxpowerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptx
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political Breaches
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
 
Social Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark ArtsSocial Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark Arts
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
 
Social Engineering By Rakesh Nagekar
Social Engineering By Rakesh NagekarSocial Engineering By Rakesh Nagekar
Social Engineering By Rakesh Nagekar
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat Mitigation
 
Insider threats
Insider threatsInsider threats
Insider threats
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
 

More from Steven Wardell

Wardell, Future of Digital Health, Leerink Research 2014-10
Wardell, Future of Digital Health, Leerink Research 2014-10Wardell, Future of Digital Health, Leerink Research 2014-10
Wardell, Future of Digital Health, Leerink Research 2014-10
Steven Wardell
 
Steve wardell Digital Health Marketing Deck
Steve wardell Digital Health Marketing DeckSteve wardell Digital Health Marketing Deck
Steve wardell Digital Health Marketing Deck
Steven Wardell
 
Steven Wardell Digital Health Landscape v1.8
Steven Wardell Digital Health Landscape v1.8Steven Wardell Digital Health Landscape v1.8
Steven Wardell Digital Health Landscape v1.8
Steven Wardell
 
ASCO 2013 Social #HCP Findings for Melanoma - Sample
ASCO 2013 Social #HCP Findings for Melanoma - SampleASCO 2013 Social #HCP Findings for Melanoma - Sample
ASCO 2013 Social #HCP Findings for Melanoma - SampleSteven Wardell
 
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...Steven Wardell
 
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...Steven Wardell
 
CISummit 2013: John Larerre, Strategy and Social Networking
CISummit 2013: John Larerre, Strategy and Social NetworkingCISummit 2013: John Larerre, Strategy and Social Networking
CISummit 2013: John Larerre, Strategy and Social NetworkingSteven Wardell
 
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...Steven Wardell
 
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...Steven Wardell
 
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...Steven Wardell
 
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...Steven Wardell
 
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...Steven Wardell
 
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...Steven Wardell
 
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...Steven Wardell
 
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?Steven Wardell
 
[Webinar] "Trust, Fear and Energy"
[Webinar] "Trust, Fear and Energy"[Webinar] "Trust, Fear and Energy"
[Webinar] "Trust, Fear and Energy"Steven Wardell
 
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
Steven Wardell
 

More from Steven Wardell (17)

Wardell, Future of Digital Health, Leerink Research 2014-10
Wardell, Future of Digital Health, Leerink Research 2014-10Wardell, Future of Digital Health, Leerink Research 2014-10
Wardell, Future of Digital Health, Leerink Research 2014-10
 
Steve wardell Digital Health Marketing Deck
Steve wardell Digital Health Marketing DeckSteve wardell Digital Health Marketing Deck
Steve wardell Digital Health Marketing Deck
 
Steven Wardell Digital Health Landscape v1.8
Steven Wardell Digital Health Landscape v1.8Steven Wardell Digital Health Landscape v1.8
Steven Wardell Digital Health Landscape v1.8
 
ASCO 2013 Social #HCP Findings for Melanoma - Sample
ASCO 2013 Social #HCP Findings for Melanoma - SampleASCO 2013 Social #HCP Findings for Melanoma - Sample
ASCO 2013 Social #HCP Findings for Melanoma - Sample
 
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
 
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
 
CISummit 2013: John Larerre, Strategy and Social Networking
CISummit 2013: John Larerre, Strategy and Social NetworkingCISummit 2013: John Larerre, Strategy and Social Networking
CISummit 2013: John Larerre, Strategy and Social Networking
 
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
 
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
 
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
 
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
 
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
 
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
 
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
 
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
 
[Webinar] "Trust, Fear and Energy"
[Webinar] "Trust, Fear and Energy"[Webinar] "Trust, Fear and Energy"
[Webinar] "Trust, Fear and Energy"
 
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

  • 2. Ninja KU – “NINE” Ninja Shinobi NO – “AND/TALENT ONNA- “Woman” ICHI – “ONE” HIMEJI Castle 2
  • 4. Today’s Threats “The ongoing cyber-thefts from the networks of public and private organizations, including Fortune 500 companies, represent the greatest transfer of wealth in human history.” 4 http://www.nsa.gov/research/tnw/tnw194/article2.shtml
  • 6. ONCIX • Insider threats remain the top counterintelligence challenge to our community. • Over the past century, the most damaging U.S. counterintelligence failures were perpetrated by a trusted insider with ulterior motives. • In each case, the compromised individual exhibited the identifiable signs of a traitor – but the signs went unreported for years due to the unwillingness or inability of colleagues to accept the possibility of treason. • Insiders … are people who have been lured to betray their nation for ideological reasons, a lust for money or sex, or through blackmail. • Mankind's methods may change – but core motivations do not. • Insiders convicted of espionage have, on average, been active for a number of years before being caught. • The damage caused by malicious insiders will likely continue to increase unless we have effective insider threat detection programs that can proactively identify and mitigate the threats before they fully mature. 6 http://www.ncix.gov/issues/ithreat/index.php
  • 8. Six Recommendations from FBI Ease of Implementation More Technical Less Technical 1. Use appropriate screening processes to select new employees. 2. Educate and regularly train employees on security or other protocols 3. Provide non-threatening, convenient ways for employees to report suspicions. 5. Routinely monitor computer networks for suspicious activity. 4. Ensure that proprietary information is adequately, if not robustly, protected. 6. Ensure security (to include computer network security) personnel have the tools they need. “Remind employees that reporting security concerns is vital to protecting your company’s intellectual property, its reputation, its financial well-being, and its future. They are protecting their own jobs. Remind them that if they see something, to say something.” – FBI Insider Threats FBI: http://www.fbi.gov/about-us/investigate/counterintelligence/the-insider-threat ONCIX: http://www.ncix.gov/issues/ithreat 8
  • 9. Why we need Network Analytics? 9
  • 10. Rapid Adoption of 4 “Game Changing” Technologies 10
  • 11. Final Note Thanks for listening. Tom McAndrew Tom.mcandrew@coalfire.com 11