Cyber Beat Live: I'm In! When insiders threaten our security
How does your organization work to prevent insider threats? Listen as leading cybersecurity experts discuss the following questions while describing how companies can reorient their security posture to thrive in an age in which trust seems inadequate:
• How much damage could an insider do?
• How can we avoid hiring employees who are likely to pose an insider threat? What indicators should we look for? Are these evident in screening?
• What organizational roles are most likely to be sources of insider threat?
• How can the human resources department and the chief information security officer help prevent insider attacks?
• What are the dangers of thinking about insider threats as merely a technological problem?
• Can training alone prevent insider threats? What more can we do to mitigate insider threats?
• In an age when information can be disconcertingly easy to steal, and in which trust seems inadequate, how can we prevent insider threats?
• How can we identify and counter external cyber threats that might be linked to insiders’ internal cyber threat activities?
• What primary motivations drive people to pose an insider threat?
Bob Stasio is a senior product manager for cyber analysis with IBM i2 Safer Planet. He draws on nearly 14 years of expertise fighting top-tier malicious actors in the intelligence community, the US military, the National Security Agency and the commercial sector. Stasio also served as an initial member of the US Cyber Command staff. During the troop surge of 2007, his intelligence unit supported the detention of more than 450 high-value targets.
Morgan Wright is an internationally recognized expert on cybersecurity strategy, cyber terrorism, identity theft and privacy whose landmark congressional testimony about Healthcare.gov changed how the government collected personally identifiable information. He has spoken about cybersecurity to audiences around the world in hundreds of appearances on national news programs and radio broadcasts, as well as in print and online.
Scott N. Schober, a cybersecurity expert, is president and CEO of Berkeley Varitronics Systems, Inc., a 40-year-old provider of advanced wireless radio frequency test and security solutions. Schober has overseen the development of numerous cell phone detection tools used to enforce “no cell phone” policies in corporate, correctional, law enforcement, military, secured government and university facilities. He regularly appears on Arise TV, Bloomberg TV and Canadian TV News and has made numerous appearances as a cybersecurity expert on Al Jazeera America, CCTV America, CNBC, CNN, Fox Business Channel, Fox News, Inside Edition, MSNBC, One America News (OAN), PIX11 and TheBlaze, among other outlets. Schober has also presented as a subject-matter expert discussing cybersecurity and corporate espionage at numerous conferences worldwide.
Paul Janes, CISSP, GIAC GISP is president of CoreTriad, LLC, a locally owned company that specializes in vulnerability assessments for small businesses while also developing online training for cybersecurity professionals. He has been involved as a subject-matter expert in the development of an accredited Cyber First Responder Certification and is in demand as a speaker at industry security conferences. Paul draws on more than 19 years of experience in IT security with a Fortune 500 company. His areas of expertise include vulnerability assessments, penetration tests, data loss prevention (DLP), risk management, project management and server management. Paul graduated with distinction from Capella University, earning a master’s degree in information assurance, and holds a bachelor’s degree in computer and information studies from Syracuse University.