SlideShare a Scribd company logo
PUBLIC
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 1
They’re People Not Data!
The Human Side of Insider Cyberthreats
Dawn M. Cappelli, VP and Chief Information Security Officer
Rockwell Automation
Susan Schmitt, Senior Vice President Human Resources
Rockwell Automation
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 2Public
Rockwell Automation Industries
Automotive FoodBeverage Entertainment
Life Sciences Marine Metals
Household &
Personal Care
Fibers &
Textiles
Mining, Minerals
& Cement
Oil & Gas
Power
Generation
Pulp & Paper Tire &
Rubber
Infrastructure
Print &
Publishing
Semiconductor &
Electronics
Water Wastewater
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 3Public
Agenda
 Convince you that insider risk cannot be mitigated unless your team,
processes, and technical tools are people-focused
 Describe how Human Resources (HR) and managers are critical
partners in providing a people-focused approach for Rockwell
Automation’s insider risk program
 Provide practical tips that you can use at your company next week to
start building this type of a people-focused program
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 4Public
Who Are You?
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 5Public
Potential Insider Threat?
https://www.youtube.com/watch?v=6AlqHORFFaE
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 6Public
Essential Participants in an
Insider Risk Program
Human
Resources
IT /
Information
Security
Management
Insider Risk
Team
Legal
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 7Public
What Does Your Insider Risk Program
Look Like?
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 8Public
Are You Stopping Your IP From
Walking Out Your Door?
Symantec, 2013: What's Yours Is Mine: How Employees are Putting Your
Intellectual Property at Risk. http://bit.ly/XFjYwQ
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 9Public
Are You Stopping Your IP from
Walking Out Your Door?
Statistically, half of the people
leaving your company are taking
confidential corporate
information with them!
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 10Public
What You Don’t Know CAN Hurt You!
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 11Public
Focus on the PEOPLE!
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 12Public
Turn Research into a Practical Program
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 13Public
Focus Your Limited Resources
• 50% of insiders who steal IP
do it within 1 month of
leaving the company
• 70% within 2 months
• Over 80% within 3 months
Software Engineering Institute, 2013. Justification of a Pattern for Detecting Intellectual
Property Theft by Departing Insiders: http://repository.cmu.edu/cgi/viewcontent.cgi?
article=1731&context=sei
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 14Public
An Unusual End to a Theft of IP Case!
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 15Public
The Scene of the Attack
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 16Public
The Weapons
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 17Public
Lessons Learned
 CERT’s 90 day window works!
 HR’s role is essential
 Beware of social engineering by insiders, not just outsiders
 Understand and be on the watch for cultural norms
surrounding authority
 Never give up!
 Communicate carefully - especially when there are
language / cultural issues
 Trust but verify
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 18Public
SCADA System –
Insider Cyber Sabotage
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 19Public
Medical System –
Insider Cyber Sabotage
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 20Public
Financial System -
Insider Cyber Sabotage
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 21Public
A New People Focus –
Insider Cyber Sabotage
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 22Public
HR: Your Global Team
If you can educate HR
to understand the
warning patterns of
behavior and
contextual issues,
then they can be your
eyes and ears across
the globe
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 23Public
Sabotage is Critical!
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 24Public
Early Warning of Organizational Risk of Sabotage is
Critical!
If a technical team like IT or
a software engineering
team is under significant
stress, it is important for the
managers to take a step
back and carefully consider
whether they have anyone
exhibiting these behavioral
patterns.
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 25Public
Employee sabotaged his team by shutting down their server …
Rockwell Automation
Insider Cyber Sabotage Case
They had to rebuild all
of their virtual machines
and it cost them 3 days
as they worked on a
tight customer deadline
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 26Public
Get HR and Legal on Board
Work with IT to create
auditing capability
Begin training HR
Your Action Plan –
The Next 3 Months
Build the Foundation
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 27Public
Your Action Plan –
Month 4
Begin a Pilot
REMEMBER
You have a
50/50 chance of
discovering
someone trying
to take
confidential
information
every time you
do
an audit!!
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 28Public
Your Action Plan –
Months 5-6
GO GLOBAL!
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 29Public
Create investigations playbook
Train HR and management on
Insider Cyber Sabotage
Automate
Your Action Plan –
Months 7 and Beyond
Mature the Program
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 30Public
Final Thoughts -
The Changing Threat Landscape
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 31Public
Emerging Threat: Arrest of Engineers
Associated with ISIS
Energy Sector Infrastructure SW Development Digital Business
• Engineer working for Indian Oil
Corporation arrested (6/16)
• UK Navy Officer who managed
oil fields for ISIS arrested in
Kuwait (7/16)
• Petroleum engineer from
Britain moved to Syria to work
in oil production for the Islamic
State arrested in Kuwait (7/16)
• Civil engineering dropout
arrested in India (7/16)
• Former Flight Engineer
arrested in Malaysia (5/16)
• Software Engineer – the Amir
of an ISIS cell - arrested in
India (1/16)
• Computer engineer in UAE
arrested (6/16)
• Electronics engineer from
India arrested in Saudi Arabia
(7/16)
• Web designer arrested in India
(1/16)
2
1
4
5
6
7
8
9
3
1
2
4
5
6
7
8
9
3
PUBLIC
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 32
We all need to work together to predict
and defend against emerging threats
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 33Public
Change the Perception of Insider Risk
from this…
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 34Public
To This!
Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 35Public
Contact Information
Please direct comments and questions to:
Susan Schmitt
Senior Vice President Human Resources
Rockwell Automation
+1 414-382-8113
sjschmitt@ra.rockwell.com
Dawn Cappelli
Vice President and Chief Information Security
Officer
Rockwell Automation
+1 414-323-0404
dmcappelli@ra.rockwell.com

More Related Content

Viewers also liked

WE16 - Shine Theory
WE16 - Shine TheoryWE16 - Shine Theory
WE16 - Shine Theory
Society of Women Engineers
 
WE16 - The State of Women in Engineering
WE16 - The State of Women in EngineeringWE16 - The State of Women in Engineering
WE16 - The State of Women in Engineering
Society of Women Engineers
 
WE16 - How do Faculty Ensure Student Competency at Course Completion?
WE16 - How do Faculty Ensure Student Competency at Course Completion?WE16 - How do Faculty Ensure Student Competency at Course Completion?
WE16 - How do Faculty Ensure Student Competency at Course Completion?
Society of Women Engineers
 
WE16 - Confronting Workplace Sexism
WE16 - Confronting Workplace SexismWE16 - Confronting Workplace Sexism
WE16 - Confronting Workplace Sexism
Society of Women Engineers
 
WE16 - Navigating the Corporate Maze Effectively
WE16 - Navigating the Corporate Maze EffectivelyWE16 - Navigating the Corporate Maze Effectively
WE16 - Navigating the Corporate Maze Effectively
Society of Women Engineers
 
WE16 - Courageous Conversation on Diversity and Inclusion
WE16 - Courageous Conversation on Diversity and InclusionWE16 - Courageous Conversation on Diversity and Inclusion
WE16 - Courageous Conversation on Diversity and Inclusion
Society of Women Engineers
 
WE16 - Navigating the Seas of Open Source Projects
WE16 - Navigating the Seas of Open Source ProjectsWE16 - Navigating the Seas of Open Source Projects
WE16 - Navigating the Seas of Open Source Projects
Society of Women Engineers
 
WE16 - Diving into Entrepreneurship
WE16 - Diving into EntrepreneurshipWE16 - Diving into Entrepreneurship
WE16 - Diving into Entrepreneurship
Society of Women Engineers
 
WE16 - SWE Advocacy: Learn It to Live It
WE16 - SWE Advocacy: Learn It to Live ItWE16 - SWE Advocacy: Learn It to Live It
WE16 - SWE Advocacy: Learn It to Live It
Society of Women Engineers
 
WE16 - Project Management As Your Next Career Move
WE16 - Project Management As Your Next Career MoveWE16 - Project Management As Your Next Career Move
WE16 - Project Management As Your Next Career Move
Society of Women Engineers
 
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the FutureWE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
Society of Women Engineers
 
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...
Society of Women Engineers
 
WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...
WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...
WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...
Society of Women Engineers
 
WE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security ControlsWE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security Controls
Society of Women Engineers
 
WE16 - Top Ten Tips for Inclusive Team Meetings
WE16 - Top Ten Tips for Inclusive Team MeetingsWE16 - Top Ten Tips for Inclusive Team Meetings
WE16 - Top Ten Tips for Inclusive Team Meetings
Society of Women Engineers
 
WE16 - 4 Ways Improv Can Improve Your Career
WE16 - 4 Ways Improv Can Improve Your CareerWE16 - 4 Ways Improv Can Improve Your Career
WE16 - 4 Ways Improv Can Improve Your Career
Society of Women Engineers
 
WE16 - Disciplined Entrepreneurship
WE16 - Disciplined EntrepreneurshipWE16 - Disciplined Entrepreneurship
WE16 - Disciplined Entrepreneurship
Society of Women Engineers
 
WE16 - There is no Crying in Baseball
WE16 - There is no Crying in BaseballWE16 - There is no Crying in Baseball
WE16 - There is no Crying in Baseball
Society of Women Engineers
 
You're Doing What? - Returning To A Technical Path Mid-Career
You're Doing What? - Returning To A Technical Path Mid-CareerYou're Doing What? - Returning To A Technical Path Mid-Career
You're Doing What? - Returning To A Technical Path Mid-Career
Society of Women Engineers
 
WE16 - Strategies for Obtaining Your First Academic Position
WE16 - Strategies for Obtaining Your First Academic PositionWE16 - Strategies for Obtaining Your First Academic Position
WE16 - Strategies for Obtaining Your First Academic Position
Society of Women Engineers
 

Viewers also liked (20)

WE16 - Shine Theory
WE16 - Shine TheoryWE16 - Shine Theory
WE16 - Shine Theory
 
WE16 - The State of Women in Engineering
WE16 - The State of Women in EngineeringWE16 - The State of Women in Engineering
WE16 - The State of Women in Engineering
 
WE16 - How do Faculty Ensure Student Competency at Course Completion?
WE16 - How do Faculty Ensure Student Competency at Course Completion?WE16 - How do Faculty Ensure Student Competency at Course Completion?
WE16 - How do Faculty Ensure Student Competency at Course Completion?
 
WE16 - Confronting Workplace Sexism
WE16 - Confronting Workplace SexismWE16 - Confronting Workplace Sexism
WE16 - Confronting Workplace Sexism
 
WE16 - Navigating the Corporate Maze Effectively
WE16 - Navigating the Corporate Maze EffectivelyWE16 - Navigating the Corporate Maze Effectively
WE16 - Navigating the Corporate Maze Effectively
 
WE16 - Courageous Conversation on Diversity and Inclusion
WE16 - Courageous Conversation on Diversity and InclusionWE16 - Courageous Conversation on Diversity and Inclusion
WE16 - Courageous Conversation on Diversity and Inclusion
 
WE16 - Navigating the Seas of Open Source Projects
WE16 - Navigating the Seas of Open Source ProjectsWE16 - Navigating the Seas of Open Source Projects
WE16 - Navigating the Seas of Open Source Projects
 
WE16 - Diving into Entrepreneurship
WE16 - Diving into EntrepreneurshipWE16 - Diving into Entrepreneurship
WE16 - Diving into Entrepreneurship
 
WE16 - SWE Advocacy: Learn It to Live It
WE16 - SWE Advocacy: Learn It to Live ItWE16 - SWE Advocacy: Learn It to Live It
WE16 - SWE Advocacy: Learn It to Live It
 
WE16 - Project Management As Your Next Career Move
WE16 - Project Management As Your Next Career MoveWE16 - Project Management As Your Next Career Move
WE16 - Project Management As Your Next Career Move
 
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the FutureWE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
 
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...
WE16 - Feeling Over Scheduled and Overworked? Use These Tools to Manage Your ...
 
WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...
WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...
WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...
 
WE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security ControlsWE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security Controls
 
WE16 - Top Ten Tips for Inclusive Team Meetings
WE16 - Top Ten Tips for Inclusive Team MeetingsWE16 - Top Ten Tips for Inclusive Team Meetings
WE16 - Top Ten Tips for Inclusive Team Meetings
 
WE16 - 4 Ways Improv Can Improve Your Career
WE16 - 4 Ways Improv Can Improve Your CareerWE16 - 4 Ways Improv Can Improve Your Career
WE16 - 4 Ways Improv Can Improve Your Career
 
WE16 - Disciplined Entrepreneurship
WE16 - Disciplined EntrepreneurshipWE16 - Disciplined Entrepreneurship
WE16 - Disciplined Entrepreneurship
 
WE16 - There is no Crying in Baseball
WE16 - There is no Crying in BaseballWE16 - There is no Crying in Baseball
WE16 - There is no Crying in Baseball
 
You're Doing What? - Returning To A Technical Path Mid-Career
You're Doing What? - Returning To A Technical Path Mid-CareerYou're Doing What? - Returning To A Technical Path Mid-Career
You're Doing What? - Returning To A Technical Path Mid-Career
 
WE16 - Strategies for Obtaining Your First Academic Position
WE16 - Strategies for Obtaining Your First Academic PositionWE16 - Strategies for Obtaining Your First Academic Position
WE16 - Strategies for Obtaining Your First Academic Position
 

Similar to WE16 - They're People Not Data! The Human Side of Insider Cyberthreats

Oracle: Building Cloud Native Applications
Oracle: Building Cloud Native ApplicationsOracle: Building Cloud Native Applications
Oracle: Building Cloud Native Applications
Kelly Goetsch
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
scoopnewsgroup
 
"A Practitioner’s Guide to Commercializing Applications of Computer Vision," ...
"A Practitioner’s Guide to Commercializing Applications of Computer Vision," ..."A Practitioner’s Guide to Commercializing Applications of Computer Vision," ...
"A Practitioner’s Guide to Commercializing Applications of Computer Vision," ...
Edge AI and Vision Alliance
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
MassTLC
 
Preparing the next generation for the cognitive era - NFAIS Keynote
Preparing the next generation for the cognitive era - NFAIS KeynotePreparing the next generation for the cognitive era - NFAIS Keynote
Preparing the next generation for the cognitive era - NFAIS Keynote
Steven Miller
 
Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4
Accenture Technology
 
Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4
accenture
 
Conference: Rockwell Automation 2016 Investor Meeting
Conference: Rockwell Automation 2016 Investor MeetingConference: Rockwell Automation 2016 Investor Meeting
Conference: Rockwell Automation 2016 Investor Meeting
investorsrockwell
 
Big data analytics und machine learning die Herrschaft der Daten
Big data analytics und machine learning die Herrschaft der DatenBig data analytics und machine learning die Herrschaft der Daten
Big data analytics und machine learning die Herrschaft der Daten
Peter Seeberg
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelů
MarketingArrowECS_CZ
 
Learn How to Operationalize IoT Apps on Pivotal Cloud Foundry
Learn How to Operationalize IoT Apps on Pivotal Cloud FoundryLearn How to Operationalize IoT Apps on Pivotal Cloud Foundry
Learn How to Operationalize IoT Apps on Pivotal Cloud Foundry
VMware Tanzu
 
Health and Diagnostics at Your Fingertips
Health and Diagnostics at Your FingertipsHealth and Diagnostics at Your Fingertips
Health and Diagnostics at Your Fingertips
Rockwell Automation
 
The attention economy and the internet
The attention economy and the internetThe attention economy and the internet
The attention economy and the internet
Ross Garrett
 
Data Science Powered Apps for Internet of Things
Data Science Powered Apps for Internet of ThingsData Science Powered Apps for Internet of Things
Data Science Powered Apps for Internet of Things
VMware Tanzu
 
The Very Best Intranets & Digital Workplace from the 2016 Intranet Global Forum
The Very Best Intranets & Digital Workplace from the 2016 Intranet Global ForumThe Very Best Intranets & Digital Workplace from the 2016 Intranet Global Forum
The Very Best Intranets & Digital Workplace from the 2016 Intranet Global Forum
Prescient Digital Media
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016
Bill Chamberlin
 
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps
CA Technologies
 
Assault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities GridAssault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities Grid
accenture
 
2016 Forecasts: What's Ahead in Business Technology
2016 Forecasts: What's Ahead in Business Technology2016 Forecasts: What's Ahead in Business Technology
2016 Forecasts: What's Ahead in Business Technology
Marco
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
NowSecure
 

Similar to WE16 - They're People Not Data! The Human Side of Insider Cyberthreats (20)

Oracle: Building Cloud Native Applications
Oracle: Building Cloud Native ApplicationsOracle: Building Cloud Native Applications
Oracle: Building Cloud Native Applications
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
"A Practitioner’s Guide to Commercializing Applications of Computer Vision," ...
"A Practitioner’s Guide to Commercializing Applications of Computer Vision," ..."A Practitioner’s Guide to Commercializing Applications of Computer Vision," ...
"A Practitioner’s Guide to Commercializing Applications of Computer Vision," ...
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
 
Preparing the next generation for the cognitive era - NFAIS Keynote
Preparing the next generation for the cognitive era - NFAIS KeynotePreparing the next generation for the cognitive era - NFAIS Keynote
Preparing the next generation for the cognitive era - NFAIS Keynote
 
Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4
 
Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4
 
Conference: Rockwell Automation 2016 Investor Meeting
Conference: Rockwell Automation 2016 Investor MeetingConference: Rockwell Automation 2016 Investor Meeting
Conference: Rockwell Automation 2016 Investor Meeting
 
Big data analytics und machine learning die Herrschaft der Daten
Big data analytics und machine learning die Herrschaft der DatenBig data analytics und machine learning die Herrschaft der Daten
Big data analytics und machine learning die Herrschaft der Daten
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelů
 
Learn How to Operationalize IoT Apps on Pivotal Cloud Foundry
Learn How to Operationalize IoT Apps on Pivotal Cloud FoundryLearn How to Operationalize IoT Apps on Pivotal Cloud Foundry
Learn How to Operationalize IoT Apps on Pivotal Cloud Foundry
 
Health and Diagnostics at Your Fingertips
Health and Diagnostics at Your FingertipsHealth and Diagnostics at Your Fingertips
Health and Diagnostics at Your Fingertips
 
The attention economy and the internet
The attention economy and the internetThe attention economy and the internet
The attention economy and the internet
 
Data Science Powered Apps for Internet of Things
Data Science Powered Apps for Internet of ThingsData Science Powered Apps for Internet of Things
Data Science Powered Apps for Internet of Things
 
The Very Best Intranets & Digital Workplace from the 2016 Intranet Global Forum
The Very Best Intranets & Digital Workplace from the 2016 Intranet Global ForumThe Very Best Intranets & Digital Workplace from the 2016 Intranet Global Forum
The Very Best Intranets & Digital Workplace from the 2016 Intranet Global Forum
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016
 
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps
 
Assault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities GridAssault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities Grid
 
2016 Forecasts: What's Ahead in Business Technology
2016 Forecasts: What's Ahead in Business Technology2016 Forecasts: What's Ahead in Business Technology
2016 Forecasts: What's Ahead in Business Technology
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 

More from Society of Women Engineers

Schneider electric overview laurie addisonlavelle_2
Schneider electric overview laurie addisonlavelle_2Schneider electric overview laurie addisonlavelle_2
Schneider electric overview laurie addisonlavelle_2
Society of Women Engineers
 
Opening keynote
Opening keynoteOpening keynote
Moonshot rodriguez slides
Moonshot rodriguez slidesMoonshot rodriguez slides
Moonshot rodriguez slides
Society of Women Engineers
 
Moonshot fetch slides
Moonshot fetch slidesMoonshot fetch slides
Moonshot fetch slides
Society of Women Engineers
 
H ivs ai_wehr_slides
H ivs ai_wehr_slidesH ivs ai_wehr_slides
H ivs ai_wehr_slides
Society of Women Engineers
 
H ivs ai_faust_slides
H ivs ai_faust_slidesH ivs ai_faust_slides
H ivs ai_faust_slides
Society of Women Engineers
 
H ivs ai_bestelmeyer_slides
H ivs ai_bestelmeyer_slidesH ivs ai_bestelmeyer_slides
H ivs ai_bestelmeyer_slides
Society of Women Engineers
 
Closing keynote
Closing keynoteClosing keynote
Ball d 8
Ball d 8Ball d 8
Ball d 7
Ball d 7Ball d 7
Ball d 6
Ball d 6Ball d 6
Ball d 4
Ball d 4Ball d 4
How to Develop Your Section's Corporate Relations
How to Develop Your Section's Corporate Relations How to Develop Your Section's Corporate Relations
How to Develop Your Section's Corporate Relations
Society of Women Engineers
 
How to Find Your Section's Next Officer Team
How to Find Your Section's Next Officer Team How to Find Your Section's Next Officer Team
How to Find Your Section's Next Officer Team
Society of Women Engineers
 
Using SWE to Complement your Career
Using SWE to Complement your Career Using SWE to Complement your Career
Using SWE to Complement your Career
Society of Women Engineers
 
How to Have a Difficult Conversation with an Underperforming SWE Leader
How to Have a Difficult Conversation with an Underperforming SWE LeaderHow to Have a Difficult Conversation with an Underperforming SWE Leader
How to Have a Difficult Conversation with an Underperforming SWE Leader
Society of Women Engineers
 
18 cd 32
18 cd 3218 cd 32
How to Get the Most out of your LCC Coach!
How to Get the Most out of your LCC Coach!How to Get the Most out of your LCC Coach!
How to Get the Most out of your LCC Coach!
Society of Women Engineers
 
The Mars Ice Challenge (RASC-AL)
The Mars Ice Challenge (RASC-AL)The Mars Ice Challenge (RASC-AL)
The Mars Ice Challenge (RASC-AL)
Society of Women Engineers
 
Beyond Disruption
Beyond Disruption Beyond Disruption
Beyond Disruption
Society of Women Engineers
 

More from Society of Women Engineers (20)

Schneider electric overview laurie addisonlavelle_2
Schneider electric overview laurie addisonlavelle_2Schneider electric overview laurie addisonlavelle_2
Schneider electric overview laurie addisonlavelle_2
 
Opening keynote
Opening keynoteOpening keynote
Opening keynote
 
Moonshot rodriguez slides
Moonshot rodriguez slidesMoonshot rodriguez slides
Moonshot rodriguez slides
 
Moonshot fetch slides
Moonshot fetch slidesMoonshot fetch slides
Moonshot fetch slides
 
H ivs ai_wehr_slides
H ivs ai_wehr_slidesH ivs ai_wehr_slides
H ivs ai_wehr_slides
 
H ivs ai_faust_slides
H ivs ai_faust_slidesH ivs ai_faust_slides
H ivs ai_faust_slides
 
H ivs ai_bestelmeyer_slides
H ivs ai_bestelmeyer_slidesH ivs ai_bestelmeyer_slides
H ivs ai_bestelmeyer_slides
 
Closing keynote
Closing keynoteClosing keynote
Closing keynote
 
Ball d 8
Ball d 8Ball d 8
Ball d 8
 
Ball d 7
Ball d 7Ball d 7
Ball d 7
 
Ball d 6
Ball d 6Ball d 6
Ball d 6
 
Ball d 4
Ball d 4Ball d 4
Ball d 4
 
How to Develop Your Section's Corporate Relations
How to Develop Your Section's Corporate Relations How to Develop Your Section's Corporate Relations
How to Develop Your Section's Corporate Relations
 
How to Find Your Section's Next Officer Team
How to Find Your Section's Next Officer Team How to Find Your Section's Next Officer Team
How to Find Your Section's Next Officer Team
 
Using SWE to Complement your Career
Using SWE to Complement your Career Using SWE to Complement your Career
Using SWE to Complement your Career
 
How to Have a Difficult Conversation with an Underperforming SWE Leader
How to Have a Difficult Conversation with an Underperforming SWE LeaderHow to Have a Difficult Conversation with an Underperforming SWE Leader
How to Have a Difficult Conversation with an Underperforming SWE Leader
 
18 cd 32
18 cd 3218 cd 32
18 cd 32
 
How to Get the Most out of your LCC Coach!
How to Get the Most out of your LCC Coach!How to Get the Most out of your LCC Coach!
How to Get the Most out of your LCC Coach!
 
The Mars Ice Challenge (RASC-AL)
The Mars Ice Challenge (RASC-AL)The Mars Ice Challenge (RASC-AL)
The Mars Ice Challenge (RASC-AL)
 
Beyond Disruption
Beyond Disruption Beyond Disruption
Beyond Disruption
 

Recently uploaded

在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 

Recently uploaded (20)

在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 

WE16 - They're People Not Data! The Human Side of Insider Cyberthreats

  • 1. PUBLIC Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 1 They’re People Not Data! The Human Side of Insider Cyberthreats Dawn M. Cappelli, VP and Chief Information Security Officer Rockwell Automation Susan Schmitt, Senior Vice President Human Resources Rockwell Automation
  • 2. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 2Public Rockwell Automation Industries Automotive FoodBeverage Entertainment Life Sciences Marine Metals Household & Personal Care Fibers & Textiles Mining, Minerals & Cement Oil & Gas Power Generation Pulp & Paper Tire & Rubber Infrastructure Print & Publishing Semiconductor & Electronics Water Wastewater
  • 3. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 3Public Agenda  Convince you that insider risk cannot be mitigated unless your team, processes, and technical tools are people-focused  Describe how Human Resources (HR) and managers are critical partners in providing a people-focused approach for Rockwell Automation’s insider risk program  Provide practical tips that you can use at your company next week to start building this type of a people-focused program
  • 4. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 4Public Who Are You?
  • 5. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 5Public Potential Insider Threat? https://www.youtube.com/watch?v=6AlqHORFFaE
  • 6. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 6Public Essential Participants in an Insider Risk Program Human Resources IT / Information Security Management Insider Risk Team Legal
  • 7. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 7Public What Does Your Insider Risk Program Look Like?
  • 8. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 8Public Are You Stopping Your IP From Walking Out Your Door? Symantec, 2013: What's Yours Is Mine: How Employees are Putting Your Intellectual Property at Risk. http://bit.ly/XFjYwQ
  • 9. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 9Public Are You Stopping Your IP from Walking Out Your Door? Statistically, half of the people leaving your company are taking confidential corporate information with them!
  • 10. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 10Public What You Don’t Know CAN Hurt You!
  • 11. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 11Public Focus on the PEOPLE!
  • 12. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 12Public Turn Research into a Practical Program
  • 13. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 13Public Focus Your Limited Resources • 50% of insiders who steal IP do it within 1 month of leaving the company • 70% within 2 months • Over 80% within 3 months Software Engineering Institute, 2013. Justification of a Pattern for Detecting Intellectual Property Theft by Departing Insiders: http://repository.cmu.edu/cgi/viewcontent.cgi? article=1731&context=sei
  • 14. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 14Public An Unusual End to a Theft of IP Case!
  • 15. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 15Public The Scene of the Attack
  • 16. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 16Public The Weapons
  • 17. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 17Public Lessons Learned  CERT’s 90 day window works!  HR’s role is essential  Beware of social engineering by insiders, not just outsiders  Understand and be on the watch for cultural norms surrounding authority  Never give up!  Communicate carefully - especially when there are language / cultural issues  Trust but verify
  • 18. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 18Public SCADA System – Insider Cyber Sabotage
  • 19. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 19Public Medical System – Insider Cyber Sabotage
  • 20. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 20Public Financial System - Insider Cyber Sabotage
  • 21. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 21Public A New People Focus – Insider Cyber Sabotage
  • 22. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 22Public HR: Your Global Team If you can educate HR to understand the warning patterns of behavior and contextual issues, then they can be your eyes and ears across the globe
  • 23. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 23Public Sabotage is Critical!
  • 24. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 24Public Early Warning of Organizational Risk of Sabotage is Critical! If a technical team like IT or a software engineering team is under significant stress, it is important for the managers to take a step back and carefully consider whether they have anyone exhibiting these behavioral patterns.
  • 25. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 25Public Employee sabotaged his team by shutting down their server … Rockwell Automation Insider Cyber Sabotage Case They had to rebuild all of their virtual machines and it cost them 3 days as they worked on a tight customer deadline
  • 26. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 26Public Get HR and Legal on Board Work with IT to create auditing capability Begin training HR Your Action Plan – The Next 3 Months Build the Foundation
  • 27. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 27Public Your Action Plan – Month 4 Begin a Pilot REMEMBER You have a 50/50 chance of discovering someone trying to take confidential information every time you do an audit!!
  • 28. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 28Public Your Action Plan – Months 5-6 GO GLOBAL!
  • 29. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 29Public Create investigations playbook Train HR and management on Insider Cyber Sabotage Automate Your Action Plan – Months 7 and Beyond Mature the Program
  • 30. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 30Public Final Thoughts - The Changing Threat Landscape
  • 31. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 31Public Emerging Threat: Arrest of Engineers Associated with ISIS Energy Sector Infrastructure SW Development Digital Business • Engineer working for Indian Oil Corporation arrested (6/16) • UK Navy Officer who managed oil fields for ISIS arrested in Kuwait (7/16) • Petroleum engineer from Britain moved to Syria to work in oil production for the Islamic State arrested in Kuwait (7/16) • Civil engineering dropout arrested in India (7/16) • Former Flight Engineer arrested in Malaysia (5/16) • Software Engineer – the Amir of an ISIS cell - arrested in India (1/16) • Computer engineer in UAE arrested (6/16) • Electronics engineer from India arrested in Saudi Arabia (7/16) • Web designer arrested in India (1/16) 2 1 4 5 6 7 8 9 3 1 2 4 5 6 7 8 9 3
  • 32. PUBLIC Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 32 We all need to work together to predict and defend against emerging threats
  • 33. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 33Public Change the Perception of Insider Risk from this…
  • 34. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 34Public To This!
  • 35. Copyright © 2016 Rockwell Automation, Inc. All Rights Reserved. 35Public Contact Information Please direct comments and questions to: Susan Schmitt Senior Vice President Human Resources Rockwell Automation +1 414-382-8113 sjschmitt@ra.rockwell.com Dawn Cappelli Vice President and Chief Information Security Officer Rockwell Automation +1 414-323-0404 dmcappelli@ra.rockwell.com

Editor's Notes

  1. <number>
  2. <number>
  3. <number>
  4. <number>
  5. <number>
  6. <number>
  7. <number>
  8. <number>
  9. <number>
  10. <number>
  11. <number>
  12. <number>
  13. <number>
  14. <number>
  15. <number>
  16. <number>
  17. <number>
  18. <number>
  19. <number>
  20. <number>
  21. <number>
  22. <number>
  23. <number>
  24. <number>
  25. <number>
  26. <number>
  27. <number>
  28. <number>
  29. <number>
  30. <number>
  31. <number>
  32. <number>
  33. <number>
  34. <number>