SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
Insider Threats
Tom McAndrew

1
Ninja
KU – “NINE”

Ninja
Shinobi

NO – “AND/TALENT
ONNA- “Woman”

ICHI – “ONE”

HIMEJI Castle

2
American Ninja Warrior

3
Today’s Threats
“The ongoing cyber-thefts from the networks of
public and private organizations, including Fortune
500 companies, represent the greatest transfer of
wealth in human history.”

4

http://www.nsa.gov/research/tnw/tnw194/article2.shtml
ONCIX

5
ONCIX
• Insider threats remain the top counterintelligence challenge to our community.
• Over the past century, the most damaging U.S. counterintelligence failures were perpetrated by a trusted
insider with ulterior motives.
• In each case, the compromised individual exhibited the identifiable signs of a traitor – but the signs went
unreported for years due to the unwillingness or inability of colleagues to accept the possibility of treason.
• Insiders … are people who have been lured to betray their nation for ideological reasons, a lust for
money or sex, or through blackmail.
• Mankind's methods may change – but core motivations do not.
• Insiders convicted of espionage have, on average, been active for a number of years before being
caught.
• The damage caused by malicious insiders will likely continue to increase unless we have effective
insider threat detection programs that can proactively identify and mitigate the threats before
they fully mature.

6
http://www.ncix.gov/issues/ithreat/index.php
NITTF

7
Six Recommendations from FBI
Ease of Implementation
More Technical

Less Technical

1. Use appropriate screening
processes to select new
employees.

2. Educate and regularly train
employees on security or other
protocols

3. Provide non-threatening,
convenient ways for employees
to report suspicions.

5. Routinely monitor computer
networks for suspicious activity.

4. Ensure that proprietary
information is adequately, if not
robustly, protected.

6. Ensure security (to include computer
network security) personnel have the
tools they need.

“Remind employees that reporting security concerns is vital to
protecting your company’s intellectual property, its reputation, its
financial well-being, and its future. They are protecting their own
jobs. Remind them that if they see something, to say something.”
– FBI Insider Threats
FBI: http://www.fbi.gov/about-us/investigate/counterintelligence/the-insider-threat
ONCIX: http://www.ncix.gov/issues/ithreat

8
Why we need Network Analytics?

9
Rapid Adoption of 4 “Game Changing” Technologies

10
Final Note

Thanks for listening.
Tom McAndrew
Tom.mcandrew@coalfire.com
11

Contenu connexe

Tendances (20)

Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
 
Power Point Gov
Power Point GovPower Point Gov
Power Point Gov
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Cyber war
Cyber warCyber war
Cyber war
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Hacking
HackingHacking
Hacking
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
About cyber war
About cyber warAbout cyber war
About cyber war
 

En vedette

A Survey on Balancing the Network Load Using Geographic Hash Tables
A Survey on Balancing the Network Load Using Geographic Hash TablesA Survey on Balancing the Network Load Using Geographic Hash Tables
A Survey on Balancing the Network Load Using Geographic Hash TablesIOSR Journals
 
Actividad 7 momentos claves batz socop marta maría
Actividad 7 momentos claves batz socop marta maríaActividad 7 momentos claves batz socop marta maría
Actividad 7 momentos claves batz socop marta maríaMartaBatz
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksIOSR Journals
 
Empresarismo nueva
Empresarismo nuevaEmpresarismo nueva
Empresarismo nuevaarcicol
 
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...Steven Wardell
 
CISummit 2013: Karen Gardner,
CISummit 2013: Karen Gardner, CISummit 2013: Karen Gardner,
CISummit 2013: Karen Gardner, Steven Wardell
 
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012Steven Wardell
 
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...Steven Wardell
 
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving NetworksCISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving NetworksSteven Wardell
 
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...Steven Wardell
 
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...Steven Wardell
 
The Network Approach to Change Initiatives
The Network Approach to Change InitiativesThe Network Approach to Change Initiatives
The Network Approach to Change InitiativesSteven Wardell
 
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...Steven Wardell
 
TNR2013 David Rock, The Neuroscience of Engagement
TNR2013 David Rock, The Neuroscience of EngagementTNR2013 David Rock, The Neuroscience of Engagement
TNR2013 David Rock, The Neuroscience of EngagementSteven Wardell
 
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...Steven Wardell
 
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...Steven Wardell
 
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...Steven Wardell
 
TNR2013 Ron Burt, Network Advantage on How the Network Was Built
TNR2013 Ron Burt, Network Advantage on How the Network Was BuiltTNR2013 Ron Burt, Network Advantage on How the Network Was Built
TNR2013 Ron Burt, Network Advantage on How the Network Was BuiltSteven Wardell
 
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...Steven Wardell
 

En vedette (20)

A Survey on Balancing the Network Load Using Geographic Hash Tables
A Survey on Balancing the Network Load Using Geographic Hash TablesA Survey on Balancing the Network Load Using Geographic Hash Tables
A Survey on Balancing the Network Load Using Geographic Hash Tables
 
Actividad 7 momentos claves batz socop marta maría
Actividad 7 momentos claves batz socop marta maríaActividad 7 momentos claves batz socop marta maría
Actividad 7 momentos claves batz socop marta maría
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
Empresarismo nueva
Empresarismo nuevaEmpresarismo nueva
Empresarismo nueva
 
Vra core
Vra coreVra core
Vra core
 
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
 
CISummit 2013: Karen Gardner,
CISummit 2013: Karen Gardner, CISummit 2013: Karen Gardner,
CISummit 2013: Karen Gardner,
 
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
 
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
 
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving NetworksCISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
 
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
 
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
 
The Network Approach to Change Initiatives
The Network Approach to Change InitiativesThe Network Approach to Change Initiatives
The Network Approach to Change Initiatives
 
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
 
TNR2013 David Rock, The Neuroscience of Engagement
TNR2013 David Rock, The Neuroscience of EngagementTNR2013 David Rock, The Neuroscience of Engagement
TNR2013 David Rock, The Neuroscience of Engagement
 
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
 
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
 
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
 
TNR2013 Ron Burt, Network Advantage on How the Network Was Built
TNR2013 Ron Burt, Network Advantage on How the Network Was BuiltTNR2013 Ron Burt, Network Advantage on How the Network Was Built
TNR2013 Ron Burt, Network Advantage on How the Network Was Built
 
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
 

Similaire à CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

The Insider Threat January.pptx
The Insider Threat January.pptxThe Insider Threat January.pptx
The Insider Threat January.pptxBertrandRussell6
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligenceDoing What I Do
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxFroilan Cantillo
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyDr. Lydia Kostopoulos
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesJohn Bambenek
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Dr. Tim Dosemagen
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarRaghunath G
 
Social Engineering By Rakesh Nagekar
Social Engineering By Rakesh NagekarSocial Engineering By Rakesh Nagekar
Social Engineering By Rakesh Nagekarnforceit
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat MitigationRoger Johnston
 
Insider threats
Insider threatsInsider threats
Insider threatsizoologic
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxZakiAhmed70
 

Similaire à CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network (20)

The Insider Threat January.pptx
The Insider Threat January.pptxThe Insider Threat January.pptx
The Insider Threat January.pptx
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political Breaches
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
 
Social Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark ArtsSocial Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark Arts
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
 
Social Engineering By Rakesh Nagekar
Social Engineering By Rakesh NagekarSocial Engineering By Rakesh Nagekar
Social Engineering By Rakesh Nagekar
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat Mitigation
 
Insider threats
Insider threatsInsider threats
Insider threats
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 

Plus de Steven Wardell

Wardell, Future of Digital Health, Leerink Research 2014-10
Wardell, Future of Digital Health, Leerink Research 2014-10Wardell, Future of Digital Health, Leerink Research 2014-10
Wardell, Future of Digital Health, Leerink Research 2014-10Steven Wardell
 
Steve wardell Digital Health Marketing Deck
Steve wardell Digital Health Marketing DeckSteve wardell Digital Health Marketing Deck
Steve wardell Digital Health Marketing DeckSteven Wardell
 
Steven Wardell Digital Health Landscape v1.8
Steven Wardell Digital Health Landscape v1.8Steven Wardell Digital Health Landscape v1.8
Steven Wardell Digital Health Landscape v1.8Steven Wardell
 
ASCO 2013 Social #HCP Findings for Melanoma - Sample
ASCO 2013 Social #HCP Findings for Melanoma - SampleASCO 2013 Social #HCP Findings for Melanoma - Sample
ASCO 2013 Social #HCP Findings for Melanoma - SampleSteven Wardell
 
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...Steven Wardell
 
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...Steven Wardell
 
CISummit 2013: John Larerre, Strategy and Social Networking
CISummit 2013: John Larerre, Strategy and Social NetworkingCISummit 2013: John Larerre, Strategy and Social Networking
CISummit 2013: John Larerre, Strategy and Social NetworkingSteven Wardell
 
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...Steven Wardell
 
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...Steven Wardell
 
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...Steven Wardell
 
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...Steven Wardell
 
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...Steven Wardell
 
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...Steven Wardell
 
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...Steven Wardell
 
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?Steven Wardell
 
[Webinar] "Trust, Fear and Energy"
[Webinar] "Trust, Fear and Energy"[Webinar] "Trust, Fear and Energy"
[Webinar] "Trust, Fear and Energy"Steven Wardell
 
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"Steven Wardell
 

Plus de Steven Wardell (17)

Wardell, Future of Digital Health, Leerink Research 2014-10
Wardell, Future of Digital Health, Leerink Research 2014-10Wardell, Future of Digital Health, Leerink Research 2014-10
Wardell, Future of Digital Health, Leerink Research 2014-10
 
Steve wardell Digital Health Marketing Deck
Steve wardell Digital Health Marketing DeckSteve wardell Digital Health Marketing Deck
Steve wardell Digital Health Marketing Deck
 
Steven Wardell Digital Health Landscape v1.8
Steven Wardell Digital Health Landscape v1.8Steven Wardell Digital Health Landscape v1.8
Steven Wardell Digital Health Landscape v1.8
 
ASCO 2013 Social #HCP Findings for Melanoma - Sample
ASCO 2013 Social #HCP Findings for Melanoma - SampleASCO 2013 Social #HCP Findings for Melanoma - Sample
ASCO 2013 Social #HCP Findings for Melanoma - Sample
 
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
 
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
 
CISummit 2013: John Larerre, Strategy and Social Networking
CISummit 2013: John Larerre, Strategy and Social NetworkingCISummit 2013: John Larerre, Strategy and Social Networking
CISummit 2013: John Larerre, Strategy and Social Networking
 
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
 
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
 
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
 
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
 
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
 
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
 
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
 
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
 
[Webinar] "Trust, Fear and Energy"
[Webinar] "Trust, Fear and Energy"[Webinar] "Trust, Fear and Energy"
[Webinar] "Trust, Fear and Energy"
 
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
 

Dernier

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 

Dernier (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 

CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

  • 2. Ninja KU – “NINE” Ninja Shinobi NO – “AND/TALENT ONNA- “Woman” ICHI – “ONE” HIMEJI Castle 2
  • 4. Today’s Threats “The ongoing cyber-thefts from the networks of public and private organizations, including Fortune 500 companies, represent the greatest transfer of wealth in human history.” 4 http://www.nsa.gov/research/tnw/tnw194/article2.shtml
  • 6. ONCIX • Insider threats remain the top counterintelligence challenge to our community. • Over the past century, the most damaging U.S. counterintelligence failures were perpetrated by a trusted insider with ulterior motives. • In each case, the compromised individual exhibited the identifiable signs of a traitor – but the signs went unreported for years due to the unwillingness or inability of colleagues to accept the possibility of treason. • Insiders … are people who have been lured to betray their nation for ideological reasons, a lust for money or sex, or through blackmail. • Mankind's methods may change – but core motivations do not. • Insiders convicted of espionage have, on average, been active for a number of years before being caught. • The damage caused by malicious insiders will likely continue to increase unless we have effective insider threat detection programs that can proactively identify and mitigate the threats before they fully mature. 6 http://www.ncix.gov/issues/ithreat/index.php
  • 8. Six Recommendations from FBI Ease of Implementation More Technical Less Technical 1. Use appropriate screening processes to select new employees. 2. Educate and regularly train employees on security or other protocols 3. Provide non-threatening, convenient ways for employees to report suspicions. 5. Routinely monitor computer networks for suspicious activity. 4. Ensure that proprietary information is adequately, if not robustly, protected. 6. Ensure security (to include computer network security) personnel have the tools they need. “Remind employees that reporting security concerns is vital to protecting your company’s intellectual property, its reputation, its financial well-being, and its future. They are protecting their own jobs. Remind them that if they see something, to say something.” – FBI Insider Threats FBI: http://www.fbi.gov/about-us/investigate/counterintelligence/the-insider-threat ONCIX: http://www.ncix.gov/issues/ithreat 8
  • 9. Why we need Network Analytics? 9
  • 10. Rapid Adoption of 4 “Game Changing” Technologies 10
  • 11. Final Note Thanks for listening. Tom McAndrew Tom.mcandrew@coalfire.com 11