
Research indicates that the United States feels particularly susceptible to insider threats, followed closely by England and Germany. With ever more data being created—sensitive data included—and as employees increasingly use their own devices at work, including on the cloud, companies are seemingly more susceptible to insider breaches than ever before. Tune in to this edition of Cyber Beat Live to hear leading experts describe how companies can strengthen their security posture to mitigate insider threats:
-
What do you think would be the most extensive damage done by an insider?
-
How do we avoid hiring employees who are prone to insider threat? Are there indicators we can look for? Are these be evident in screening?
-
What roles in an organization are most likely to pose insider threats?
-
How can the human resources department and the chief information security officer (CISO) help prevent insider attacks?
-
What dangers lie in thinking about insider threats as merely a technology problem?
-
Is training the answer? What else should be done to mitigate insider threats?
-
In an age when information is so easy to steal, what can we do to prevent insider threat theft when “trust” seems inadequate?
-
How can we identify and counter external cyber threats that might be linked to insiders’ internal cyber threat activities?
-
What are the primary motivations for someone to commit insider threat?
Here are a few resources to review in preparation for this discussion:
-
Cybersecurity alert: Employee mobile devices (BYOD) make your company vulnerable to attacks
-
Chelsea Manning reveals anti-whistleblower “insider threat” surveillance program
-
DHS to launch new system for insider threat data
Join us in this live event for a discussion of cybersecurity as it relates to insider threats.
HOST
Bob Stasio is a senior product manager of cyber analysis with IBM i2 Safer Planet. He brings nearly 14 years of expertise fighting top-tier malicious actors in the intelligence community, the US military, the National Security Agency (NSA) and the commercial sector. Stasio also served on the initial staff of US Cyber Command. During the troop surge of 2007, his intelligence unit supported the detainment of more than 450 high-value targets.
GUESTS
Morgan Wright is an internationally recognized expert on cybersecurity strategy, cyber terrorism, identity theft and privacy whose landmark congressional testimony about Healthcare.gov changed how the government collected personally identifiable information. He has spoken on cybersecurity to audiences around the world in hundreds of appearances on national news programs and radio broadcasts, as well as in print and online.
Scott N. Schober, a cybersecurity expert, is president and CEO of Berkeley Varitronics Systems, Inc., a 40-year-old provider of advanced wireless radio frequency (RF) test and security solutions. Schober has overseen the development of numerous cell phone detection tools used to enforce “no cell phone” policies in corporate, correctional, law enforcement, military, secured government and university facilities. He regularly appears on Arise TV, Bloomberg TV and Canadian TV News and has made numerous appearances as a cybersecurity expert on Al Jazeera America, CCTV America, CNBC, CNN, Fox Business Channel, Fox News, Inside Edition, MSNBC, One America News (OAN), PIX11 and TheBlaze, among other outlets. Schober has also presented as a subject-matter expert (SME) discussing cybersecurity and corporate espionage at numerous conferences worldwide.
Paul Janes, CISSP, GIAC GISP is president of CoreTriad, LLC, a locally owned company that specializes in vulnerability assessments for small businesses while also developing online training for cybersecurity professionals. He has been involved as a subject-matter expert in the development of an accredited Cyber First Responder Certification and is a speaker for industry security conferences. Paul has more than 19 years of experience in IT security with a Fortune 500 company. His areas of expertise include vulnerability assessments, penetration tests, data loss prevention (DLP), risk management, project management and server management. Paul graduated with distinction from Capella University, earning a master’s degree in information assurance, and holds a bachelor’s degree in computer and information studies from Syracuse University.
Author

- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Latest Articles
Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
Blog2022.10.12Vulnerability management with Wazuh open source XDR
Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky
Subscribe
0 Comments