Defining Insider Threats / Going Beyond Traditional Definitions (What Is Really Happening Behind Firewalls)
How Damaging And Costly An Insider Threat Incident Can Be? (Eye Opening Examples From 10+ Years Of Research)
Creating An Insider Threat Mitigation Framework
INSIDER THREAT INCIDENTS E-MAGAZINE
2014 To Present
The Insider Threat Incidents E-Magazine contains the largest publicly available source of Insider Threat incidents (2,700+ Incidents).
View On This Link. Or Download The Flipboard App To View On Your Mobile Device
INSIDER THREAT INCIDENT POSTINGS WITH DETAILS
Incident Posting Notifications
Enter your e-mail address in the Subscriptions box on the right of this page.
INSIDER THREAT INCIDENTS COSTING $1 MILLION TO $1 BILLION +
INSIDER THREAT INCIDENT POSTINGS ON TWITTER
Follow Us On Twitter: @InsiderThreatDG
CRITICAL INFRASTRUCTURE INSIDER THREAT INCIDENTS
https://www.nationalinsiderthreatsig.org/crticial-infrastructure-insider-threats.html Visit https://www.securityweekly.com/scw for all the latest episodes!
Insider Threats Overview – Going Beyond The Norm, Part 2
Jim Henderson – Insider Threat Mitigation Training Course Instructor / Consultant at Insider Threat Defense Group, Inc.
Mr. Henderson has over 15 years of experience protecting classified information up to the Top Secret SCI Level, with hands-on experience in the development, implementation and management of; Insider Threat Programs, Cyber Security-Information Systems Security Programs, Information Assurance Programs, for U.S. Government Agencies (Department of Defense (DoD), Intelligence Community (IC) Agencies, Defense Contractors, State Governments, large and small businesses.
Mr. Henderson has held numerous high level security positions working as a contractor for the following government agencies; U.S. Special Operations Command, Central Intelligence Agency, Defense Intelligence Agency, DoD Insider Threat Counterintelligence Group, Defense Security Services, Department Of Energy and Health And Human Services.
Mr. Henderson’s has a background in many different security disciplines (Physical Security, Data Loss Prevention, Information Assurance, Computer Forensics, Certification & Accreditation Of Information Systems / Networks, Cyber Security, Electronic Covert Spy Devices, etc.) that drove him to create the ITDG 2009.
Jeff Man – #HackingisNotaCrime Advocate, Sr. InfoSec Consultant at Online Business Systems
Cryptanalyst, infosec analyst, pioneering ex-NSA pen tester, PCI specialist and certified security curmudgeon. Currently a Sr. InfoSec Consultant for Online Business Systems.
Josh Marpet – Executive Director at RM-ISAO
Executive Director, RM-ISAO
Liam Downward – CEO at CYRISMA
Liam started his career in 1998 in Dublin, Ireland and each year brought new challenges and with this where my passion of Information Security grew. In 2018, he saw that Cyber Security was becoming more complex and organizations would rather ignore risks as their budgets could not afford solutions to protect their data and CYRISMA was born.
Scott Lyons – CEO at Red Lion
CEO at Red Lion
Security Weekly Unlocked will be held IN PERSON this December 5-7 at the Hilton Lake Buena Vista!
We are excited to announce our speakers: Lesley Carhart, John Strand, Alyssa Miller, Dave Kennedy, O’Shea Bowens, Marina Ciavatta, Patrick Coble, Chris Eng, Eric Escobar, Nick Leghorn, Michael Schladt, Kevin Johnson, Justin Kohler, Jay Beale, Trenton Ivey & Ryan Cobb!
Visit https://securityweekly.com/unlocked to register and check out our rockstar lineup!
If you missed any of our previously recorded webcasts or technical trainings, they are available for your viewing pleasure at https://securityweekly.com/ondemand