SlideShare a Scribd company logo
1 of 11
Download to read offline
Insider Threats
Tom McAndrew

1
Ninja
KU – “NINE”

Ninja
Shinobi

NO – “AND/TALENT
ONNA- “Woman”

ICHI – “ONE”

HIMEJI Castle

2
American Ninja Warrior

3
Today’s Threats
“The ongoing cyber-thefts from the networks of
public and private organizations, including Fortune
500 companies, represent the greatest transfer of
wealth in human history.”

4

http://www.nsa.gov/research/tnw/tnw194/article2.shtml
ONCIX

5
ONCIX
• Insider threats remain the top counterintelligence challenge to our community.
• Over the past century, the most damaging U.S. counterintelligence failures were perpetrated by a trusted
insider with ulterior motives.
• In each case, the compromised individual exhibited the identifiable signs of a traitor – but the signs went
unreported for years due to the unwillingness or inability of colleagues to accept the possibility of treason.
• Insiders … are people who have been lured to betray their nation for ideological reasons, a lust for
money or sex, or through blackmail.
• Mankind's methods may change – but core motivations do not.
• Insiders convicted of espionage have, on average, been active for a number of years before being
caught.
• The damage caused by malicious insiders will likely continue to increase unless we have effective
insider threat detection programs that can proactively identify and mitigate the threats before
they fully mature.

6
http://www.ncix.gov/issues/ithreat/index.php
NITTF

7
Six Recommendations from FBI
Ease of Implementation
More Technical

Less Technical

1. Use appropriate screening
processes to select new
employees.

2. Educate and regularly train
employees on security or other
protocols

3. Provide non-threatening,
convenient ways for employees
to report suspicions.

5. Routinely monitor computer
networks for suspicious activity.

4. Ensure that proprietary
information is adequately, if not
robustly, protected.

6. Ensure security (to include computer
network security) personnel have the
tools they need.

“Remind employees that reporting security concerns is vital to
protecting your company’s intellectual property, its reputation, its
financial well-being, and its future. They are protecting their own
jobs. Remind them that if they see something, to say something.”
– FBI Insider Threats
FBI: http://www.fbi.gov/about-us/investigate/counterintelligence/the-insider-threat
ONCIX: http://www.ncix.gov/issues/ithreat

8
Why we need Network Analytics?

9
Rapid Adoption of 4 “Game Changing” Technologies

10
Final Note

Thanks for listening.
Tom McAndrew
Tom.mcandrew@coalfire.com
11

More Related Content

What's hot (20)

Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
 
Power Point Gov
Power Point GovPower Point Gov
Power Point Gov
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Cyber war
Cyber warCyber war
Cyber war
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Hacking
HackingHacking
Hacking
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
About cyber war
About cyber warAbout cyber war
About cyber war
 

Viewers also liked

A Survey on Balancing the Network Load Using Geographic Hash Tables
A Survey on Balancing the Network Load Using Geographic Hash TablesA Survey on Balancing the Network Load Using Geographic Hash Tables
A Survey on Balancing the Network Load Using Geographic Hash TablesIOSR Journals
 
Actividad 7 momentos claves batz socop marta maría
Actividad 7 momentos claves batz socop marta maríaActividad 7 momentos claves batz socop marta maría
Actividad 7 momentos claves batz socop marta maríaMartaBatz
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksIOSR Journals
 
Empresarismo nueva
Empresarismo nuevaEmpresarismo nueva
Empresarismo nuevaarcicol
 
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...Steven Wardell
 
CISummit 2013: Karen Gardner,
CISummit 2013: Karen Gardner, CISummit 2013: Karen Gardner,
CISummit 2013: Karen Gardner, Steven Wardell
 
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012Steven Wardell
 
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...Steven Wardell
 
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving NetworksCISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving NetworksSteven Wardell
 
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...Steven Wardell
 
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...Steven Wardell
 
The Network Approach to Change Initiatives
The Network Approach to Change InitiativesThe Network Approach to Change Initiatives
The Network Approach to Change InitiativesSteven Wardell
 
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...Steven Wardell
 
TNR2013 David Rock, The Neuroscience of Engagement
TNR2013 David Rock, The Neuroscience of EngagementTNR2013 David Rock, The Neuroscience of Engagement
TNR2013 David Rock, The Neuroscience of EngagementSteven Wardell
 
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...Steven Wardell
 
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...Steven Wardell
 
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...Steven Wardell
 
TNR2013 Ron Burt, Network Advantage on How the Network Was Built
TNR2013 Ron Burt, Network Advantage on How the Network Was BuiltTNR2013 Ron Burt, Network Advantage on How the Network Was Built
TNR2013 Ron Burt, Network Advantage on How the Network Was BuiltSteven Wardell
 
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...Steven Wardell
 

Viewers also liked (20)

A Survey on Balancing the Network Load Using Geographic Hash Tables
A Survey on Balancing the Network Load Using Geographic Hash TablesA Survey on Balancing the Network Load Using Geographic Hash Tables
A Survey on Balancing the Network Load Using Geographic Hash Tables
 
Actividad 7 momentos claves batz socop marta maría
Actividad 7 momentos claves batz socop marta maríaActividad 7 momentos claves batz socop marta maría
Actividad 7 momentos claves batz socop marta maría
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
Empresarismo nueva
Empresarismo nuevaEmpresarismo nueva
Empresarismo nueva
 
Vra core
Vra coreVra core
Vra core
 
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
 
CISummit 2013: Karen Gardner,
CISummit 2013: Karen Gardner, CISummit 2013: Karen Gardner,
CISummit 2013: Karen Gardner,
 
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
 
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
 
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving NetworksCISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
 
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
 
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
 
The Network Approach to Change Initiatives
The Network Approach to Change InitiativesThe Network Approach to Change Initiatives
The Network Approach to Change Initiatives
 
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
 
TNR2013 David Rock, The Neuroscience of Engagement
TNR2013 David Rock, The Neuroscience of EngagementTNR2013 David Rock, The Neuroscience of Engagement
TNR2013 David Rock, The Neuroscience of Engagement
 
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
 
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
 
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
 
TNR2013 Ron Burt, Network Advantage on How the Network Was Built
TNR2013 Ron Burt, Network Advantage on How the Network Was BuiltTNR2013 Ron Burt, Network Advantage on How the Network Was Built
TNR2013 Ron Burt, Network Advantage on How the Network Was Built
 
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
 

Similar to CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

The Insider Threat January.pptx
The Insider Threat January.pptxThe Insider Threat January.pptx
The Insider Threat January.pptxBertrandRussell6
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligenceDoing What I Do
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxFroilan Cantillo
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyDr. Lydia Kostopoulos
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesJohn Bambenek
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Dr. Tim Dosemagen
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarRaghunath G
 
Social Engineering By Rakesh Nagekar
Social Engineering By Rakesh NagekarSocial Engineering By Rakesh Nagekar
Social Engineering By Rakesh Nagekarnforceit
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat MitigationRoger Johnston
 
Insider threats
Insider threatsInsider threats
Insider threatsizoologic
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxZakiAhmed70
 

Similar to CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network (20)

The Insider Threat January.pptx
The Insider Threat January.pptxThe Insider Threat January.pptx
The Insider Threat January.pptx
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political Breaches
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
 
Social Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark ArtsSocial Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark Arts
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
 
Social Engineering By Rakesh Nagekar
Social Engineering By Rakesh NagekarSocial Engineering By Rakesh Nagekar
Social Engineering By Rakesh Nagekar
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat Mitigation
 
Insider threats
Insider threatsInsider threats
Insider threats
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 

More from Steven Wardell

Wardell, Future of Digital Health, Leerink Research 2014-10
Wardell, Future of Digital Health, Leerink Research 2014-10Wardell, Future of Digital Health, Leerink Research 2014-10
Wardell, Future of Digital Health, Leerink Research 2014-10Steven Wardell
 
Steve wardell Digital Health Marketing Deck
Steve wardell Digital Health Marketing DeckSteve wardell Digital Health Marketing Deck
Steve wardell Digital Health Marketing DeckSteven Wardell
 
Steven Wardell Digital Health Landscape v1.8
Steven Wardell Digital Health Landscape v1.8Steven Wardell Digital Health Landscape v1.8
Steven Wardell Digital Health Landscape v1.8Steven Wardell
 
ASCO 2013 Social #HCP Findings for Melanoma - Sample
ASCO 2013 Social #HCP Findings for Melanoma - SampleASCO 2013 Social #HCP Findings for Melanoma - Sample
ASCO 2013 Social #HCP Findings for Melanoma - SampleSteven Wardell
 
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...Steven Wardell
 
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...Steven Wardell
 
CISummit 2013: John Larerre, Strategy and Social Networking
CISummit 2013: John Larerre, Strategy and Social NetworkingCISummit 2013: John Larerre, Strategy and Social Networking
CISummit 2013: John Larerre, Strategy and Social NetworkingSteven Wardell
 
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...Steven Wardell
 
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...Steven Wardell
 
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...Steven Wardell
 
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...Steven Wardell
 
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...Steven Wardell
 
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...Steven Wardell
 
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...Steven Wardell
 
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?Steven Wardell
 
[Webinar] "Trust, Fear and Energy"
[Webinar] "Trust, Fear and Energy"[Webinar] "Trust, Fear and Energy"
[Webinar] "Trust, Fear and Energy"Steven Wardell
 
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"Steven Wardell
 

More from Steven Wardell (17)

Wardell, Future of Digital Health, Leerink Research 2014-10
Wardell, Future of Digital Health, Leerink Research 2014-10Wardell, Future of Digital Health, Leerink Research 2014-10
Wardell, Future of Digital Health, Leerink Research 2014-10
 
Steve wardell Digital Health Marketing Deck
Steve wardell Digital Health Marketing DeckSteve wardell Digital Health Marketing Deck
Steve wardell Digital Health Marketing Deck
 
Steven Wardell Digital Health Landscape v1.8
Steven Wardell Digital Health Landscape v1.8Steven Wardell Digital Health Landscape v1.8
Steven Wardell Digital Health Landscape v1.8
 
ASCO 2013 Social #HCP Findings for Melanoma - Sample
ASCO 2013 Social #HCP Findings for Melanoma - SampleASCO 2013 Social #HCP Findings for Melanoma - Sample
ASCO 2013 Social #HCP Findings for Melanoma - Sample
 
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
 
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
 
CISummit 2013: John Larerre, Strategy and Social Networking
CISummit 2013: John Larerre, Strategy and Social NetworkingCISummit 2013: John Larerre, Strategy and Social Networking
CISummit 2013: John Larerre, Strategy and Social Networking
 
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
 
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
 
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
 
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
 
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
 
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
 
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
 
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
 
[Webinar] "Trust, Fear and Energy"
[Webinar] "Trust, Fear and Energy"[Webinar] "Trust, Fear and Energy"
[Webinar] "Trust, Fear and Energy"
 
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesSanjay Willie
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

  • 2. Ninja KU – “NINE” Ninja Shinobi NO – “AND/TALENT ONNA- “Woman” ICHI – “ONE” HIMEJI Castle 2
  • 4. Today’s Threats “The ongoing cyber-thefts from the networks of public and private organizations, including Fortune 500 companies, represent the greatest transfer of wealth in human history.” 4 http://www.nsa.gov/research/tnw/tnw194/article2.shtml
  • 6. ONCIX • Insider threats remain the top counterintelligence challenge to our community. • Over the past century, the most damaging U.S. counterintelligence failures were perpetrated by a trusted insider with ulterior motives. • In each case, the compromised individual exhibited the identifiable signs of a traitor – but the signs went unreported for years due to the unwillingness or inability of colleagues to accept the possibility of treason. • Insiders … are people who have been lured to betray their nation for ideological reasons, a lust for money or sex, or through blackmail. • Mankind's methods may change – but core motivations do not. • Insiders convicted of espionage have, on average, been active for a number of years before being caught. • The damage caused by malicious insiders will likely continue to increase unless we have effective insider threat detection programs that can proactively identify and mitigate the threats before they fully mature. 6 http://www.ncix.gov/issues/ithreat/index.php
  • 8. Six Recommendations from FBI Ease of Implementation More Technical Less Technical 1. Use appropriate screening processes to select new employees. 2. Educate and regularly train employees on security or other protocols 3. Provide non-threatening, convenient ways for employees to report suspicions. 5. Routinely monitor computer networks for suspicious activity. 4. Ensure that proprietary information is adequately, if not robustly, protected. 6. Ensure security (to include computer network security) personnel have the tools they need. “Remind employees that reporting security concerns is vital to protecting your company’s intellectual property, its reputation, its financial well-being, and its future. They are protecting their own jobs. Remind them that if they see something, to say something.” – FBI Insider Threats FBI: http://www.fbi.gov/about-us/investigate/counterintelligence/the-insider-threat ONCIX: http://www.ncix.gov/issues/ithreat 8
  • 9. Why we need Network Analytics? 9
  • 10. Rapid Adoption of 4 “Game Changing” Technologies 10
  • 11. Final Note Thanks for listening. Tom McAndrew Tom.mcandrew@coalfire.com 11