Insider Threat: Tools and Techniques to Detect and Prevent the Threat From Within
Traditionally, external threats are the obvious assailants of breaching. However, given the access within the system, malicious and negligent insider threats have recently grown in number, thus, setting more complex challenges in preventing possible security breaches. Due to this, establishing effective strategies and techniques such as developing insider threat programs, risks assessment processes and investing to develop applications in detecting and preventing threats have been a priority to companies and organizations in driving future growth in the industry.
In this LIVE Webcast, a seasoned panel of thought leaders and professionals assembled by The Knowledge Group will provide the audience with an in-depth analysis of insider threats in companies and organizations. Speakers will also present tips as well as strategic approaches when detecting and preventing threats to avoid possible risks and pitfalls.
Key issues that will be covered in this course are:
- Insider Threats – An Overview
- Insider Threat Profiling & Other Security Strategies
- Protecting Network Systems
- Protecting Data & Intellectual Property
- Effective Cyber Security Governance Policies and Procedures
- Sanctions and Liabilities
- Litigation Strategies
- Trends, Updates and What Lies Ahead
- Refining analytics to better understand the intersection between people and data
- Operationalizing CARTA as the next step in insider threat program development
- Addressing insider risk as a core business concern
- Privilege account management
- Identity and Access management
- Access control
Department of the Army
- Scale, definitions, and existing capabilities matter in program design
- Detection is only part of the effort – deterrence and mitigation
- Supervisors and employee are as important as analytical hubs
Who Should Attend:
- Chief Information Security Officers
- Chief Information Officers
- Chief Technology Officers
- Privacy and Data Security Law Attorneys
- Data Security Experts
- IT Professionals
- Compliance and Risk Officers
- In-house Counsel
- Top Level Management
- Private and Public Companies
- Other Related/Interested Professionals and Organizations
Homayun Yaqub is Forcepoint’s Senior Security Strategist. In this role, he partners with executives across various verticals to architect and deliver Forcepoint solutions to address human-centric business issues and better enable security/risk managers to safeguard their data and people assets. Homayun brings more than 20 years of security experience in the U.S. military, government, and private sector to Forcepoint.
Prior to joining Forcepoint, Homayun led JPMorgan Chase & Company’s Global Safeguard Program; a firm-wide initiative to analyze interactions between people, data, and their environment to mitigate current/emerging internal and external risks affecting the organization.
Before that, he held multiple leadership and executive roles in the Department of Defense and U.S. Intelligence Community leading specialized threat and risk management programs addressing critical national security concerns. He was also a founding member of The MASY Group, a Washington D.C. based security and risk consulting firm supporting both public and private clients. Homayun began his career as a U.S. Army Officer.
Homayun holds a Masters in Conflict analysis and Resolution from George Mason University, and a Bachelors in International Business from James Madison University. He is also a board member of the Homaira Rahman Foundation, a non-profit dedicated to creating sustainable opportunities for Afghanistan’s orphans.
Homayun Yaqub is Forcepoint’s Senior Security Strategist. In this role, he partners with executives across various verticals to architect and …
Harry Perper is a Chief Engineer for the MITRE Corporation, which operates NIST’s National Cybersecurity Federally Funded Research & Development Center (FFRDC). In his role as Chief Engineer, Harry is responsible providing quality oversight across dozens of cybersecurity lab projects and influencing the FFRDC’s forward-looking research investment opportunities.
NIST’s National Cybersecurity Center of Excellence (NCCoE), is a collaborative hub which identifies pressing cybersecurity challenges with industry and builds modular, end-to-end integration solutions using commercially available products to demonstrate standards-based cybersecurity. At the NCCoE, Harry helps guide more than 40 of cybersecurity engineers as they work through the development of cybersecurity reference designs and lab implementations.
Prior to his support of the NCCoE, Harry worked at MITRE’s Center for National Security, leading teams focused on evaluating a range of cyber technologies for the US Department of Defense. Before his career at MITRE, Harry worked in the telecommunications industry in various capacities including operations, engineering and marketing.
Harry has a bachelor's degree in Electrical Engineering from the University of Maryland and a master’s degree in Electrical Engineering from the George Washington University.
Harry Perper is a Chief Engineer for the MITRE Corporation, which operates NIST’s National Cybersecurity Federally Funded Research & Development …
COL Michael Birmingham is currently the Division Chief for Insider Threat Mitigation for the Army. In this position he is responsible for the day to day management of the Army’s Insider Threat Program and Hub, coordinating efforts across the Army’s commands and staff. Additionally, he is the director of the Army Mitigation Oversight Task Force.
COL Birmingham hails from Southbury, Connecticut and was commissioned as an Armor officer in 1994 from the United States Military Academy (USMA) at West Point. In addition to numerous assignments leading heavy combat units and planning operations, he has had a varied career including assignments focused on maintenance, civil affairs, language training development, rear detachment leadership and initial entry training. His service includes tours with the 24th and later 3rd Infantry Division, the 4th Infantry Division, the 1st Cavalry Division, III Corps and V Corps.
He has served in Germany, Baghdad, Iraq, Kabul, Afghanistan, and as an Olmsted Scholar in Cairo, Egypt. This is his second tour on the Army staff, working previously in G-3/5/7’s Operations Directorate working issues ranging from global force management to the Army’s response to unaccompanied alien children.
COL Birmingham is a graduate of the Army War College and holds a B.S. in International Relations and Middle Eastern Studies from USMA, an M.A. in International Relations from the American University of Cairo, and an M.A. in National Security Studies. His awards include the Bronze Star, the Defense Meritorious Service Medal, and the Meritorious Service Medal (3 OLCs). He is a former Arabic linguist and holds the Parachutist Badge.
COL Michael Birmingham is currently the Division Chief for Insider Threat Mitigation for the Army. In this position he is …
Print and review course materials
Method Of Presentation:
Experience in Corporate Law
NY Category of CLE Credit:
Areas of Professional Practice
Unlock All The Knowledge and Credit You Need
Leading Provider of Online Continuing Education
It's As Easy as 1, 2, 3
UNLIMITED 1 Year Pass for only $199
Department of the Army
Forcepoint is the global human-centric cybersecurity company transforming the digital enterprise by continuously adapting security response to the dynamic risk posed by the behavior of individual users and machines. Forcepoint’s solutions delivers risk-adaptive protection to continuously ensure trusted use of data and systems. Based in Austin, Texas, Forcepoint protects users and data for thousands of enterprise and government customers in more than 150 countries. For more about Forcepoint, visit www.forcepoint.com.
About NIST NCCoE
The National Cybersecurity Center of Excellence (NCCoE), a part of the National Institute of Standards and Technology (NIST), is a collaborative hub where industry organizations, government agencies, and academic institutions work together to address businesses’ most pressing cybersecurity issues. This public-private partnership enables the creation of practical cybersecurity solutions for specific industries, as well as for broad, cross-sector technology challenges.
About Department of the Army