Warning Signs: User Activities that Help Predict an Insider Threat
Date: Tuesday, March 26, 2019
Time: 02:00 PM Eastern Daylight Time
Duration: 1 hour
An insider threat is a security threat posed by someone inside or connected to the organization. That could be an employee, former employee, a contractor, or a business partner. They can steal your most sensitive information and assets because they have either the credentials or the knowledge necessary to bypass your security. Sometimes insiders strike for years before being caught, sometimes they hit once but still create devastating damage to the organization. According to a Poneman report, an insider attack costs an average of $600,000.
Join our panelist of insider security experts for this MSSP Insider video roundtable as they discuss how to identify who in your ranks is an insider threat or looks likely to become one.
If you have already registered, click here to access
Randy Trzeciak is a senior member of the technical staff with CERT at the Software Engineering Institute (SEI), Carnegie Mellon University. He is a member of a team focusing on insider threat research, including insider threat studies being conducted with the U.S. Secret Service National Threat Assessment Center, the U.S. Department of Defense Personnel Security Research Center, and Carnegie Mellon’s CyLab. Trzeciak also is an adjunct professor at Carnegie Mellon’s H. John Heinz III School of Public Policy and Management. Prior to his position at CERT, Trzeciak managed the Management Information Systems team in the Information Technology Department at the SEI. Prior to working at the SEI, Trzeciak was a software engineer at the Carnegie Mellon Research Institute. He was a lead developer and database administrator at Computing Services at Carnegie Mellon. Trzeciak also worked for Software Technology, Inc. in Alexandria, Virginia. He holds an MS in Management from the University of Maryland and a BS in Management Information Systems and a BA in Business Administration from Geneva College.
Christopher Dawson is Threat Intelligence Lead at Proofpoint, focused on connecting defenders and decisionmakers with compelling research. Mr. Dawson has written extensively about security hardware, software, services, and best practices and through a lengthy career has explored healthcare and education IT deeply, writing and broadcasting extensively on topics of interest to IT and security professionals.
Richard Langston, Sr. Technical Product Marketing Manager at AlienVault
Rich Langston has been creating products in the networking and security space since the turn of the century. He has played pivotal roles in the growth of several startups, including Webstacks (acquired by Extreme Networks), Sygate (Symantec), and PGP (Symantec).