Managing the Insider Threat: What Every Organization Should Know
Start Date: Thursday, August 8, 2013
End Date: Thursday, August 8, 2013
Start Time: 9:00 a.m.
End Time: 5:00 p.m.
About the Virtual
How secure is your organization's cyber environment? Are you prepared to
combat insider threat?
For over a decade, the CERT Program has studied how to prevent, detect, and respond to insider threats. At the SEI, CERT experts have analyzed hundreds of cyber incidents, threats, and concerns across all types of organizations including the DoD, Federal Government, and the Private and Public Sectors, to boost confidence in anticipating and solving cyber problems today and provide the means to build a secure cyber future.
In this free virtual event,
you will learn about recent insider threat research and development in:
Threat Posed by Insiders to Critical Assets
- How to Identify Insider Threats within Your Organization
and Considerations in Building an Insider Threat Program
Realistic Synthetic Insider Threat (Cyber-Social) Test Data
Practices and Controls for Mitigating Insider Threats
Trends (in cloud computing and mobile devices)
Who Should Attend?
Managers and CISOs
and IT Managers
9:00—9:45 AM ET Overview of the Threat Posed by Insiders to Critical Assets
by Randy Trzeciak & David Mundie
10:00—10:45 Best Practices and Controls for Mitigating Insider Threats
by George Silowash & Alex Nicoll
11:00—11:45 Components and Considerations in Building an Insider Threat
Program by Carly Huth & Robin Ruefle
1:00—1:45 PM ET Engineering Realistic Synthetic Insider Threat
(Cyber-Social) Test Data by Kurt Wallnau
2:00—2:45 Emerging Trends by Bill Claycomb & Andy Moore
3:00—3:45 Insider Fraud: Illicit Cyber Activity Involving Fraud by Randy
Trzeciak & David McIntire
4:00—5:00 PANEL DISCUSSION: Insider Threat Challenge Problems moderated
by Robert Floodeen
To register: http://www.webcaster4.com/Webcast/Page/139/1742
Sponsored by: Software Engineering Institute