by Jim Henderson, CISSP, CCISO
Founder / Chairman Of The National Insider Threat Special Interest Group
CEO Insider Threat Defense Group (ITDG), Inc.
As the nature of cyber threats has developed over the last 10+ years, the National Insider Threat Special Interest Group (NITSIG), founded by the author, has provided the U.S. Government and businesses with a “Central Source” of information related to Insider Threat Mitigation (ITM).
The NITSIG is a unique and specialized Information Sharing and Analysis Center, focused primarily on ITM. The NITSIG Membership is the largest network (1000+) of ITM Professionals in the U.S. and globally. The willingness of NITSIG Members to collaborate and share information among the membership, has been the driving force that has made the NITSIG very successful.
The Magnitude of Insider Threats and the far reaching costly and damaging effects, are grossly underestimated.
The NITSIG and ITDG have complied some Eye Opening Insider Threat Incidents that should be of concern to all CEO’s and security professionals.
Currently, one of the most important NITSIG events for the benefit of Cyber Security and Insider Threat Mitigation professionals and their employers, is the 2019 Insider Threat Symposium & Expo.
Overview of the 2019 Insider Threat Symposium & Expo (ITS&E)
For this year’s event, the NITSIG has lined up another group of outstanding expert speakers, all of whom have “Hands On Experience” in Insider Threat Program (ITP) Management and ITM. The broad experience of the speakers includes assignments for both government agencies and private organizations, such as Defense Intelligence Agency, Missile Defense Agency, Naval Information Warfare Center Atlantic, DoD Insider Threat Management & Analysis Center, Veriato, Dell Technologies, TransUnion, Equifax, and Oracle Corporation.
The Symposium will provide attendees with in-depth guidance on how to detect and mitigate potentially damaging conduct of employees who pose a threat to your organization, and provide the advanced knowledge (Framework / Blueprint) needed to develop, implement, manage or enhance an ITP.
In a practical sense, ITM is not just about establishing an ITP. ITM requires a foundation and culture of security, key stakeholder commitments, and business process improvements. Participants will leave the symposium with a more in-depth understanding of the many underlying and interconnected components that are required for successful ITM.
The Expo will provide attendees with an introduction and deeper understanding of proven technologies and services for Insider Threat detection and mitigation. For instance, you will learn more about Employee User Activity Monitoring / Behavioral Analytical Tools and other cutting-edge technological capabilities. Vendors exhibiting at the expo can be found on the link below.
Important Topics Covered In The ITS&E:
- How to Develop, Manage or Enhance an ITP
- The in-depth strategies needed for employee threat identification and mitigation
- Understanding the many underlying and interconnected components required for a robust Insider Threat Program
- Insider Threat Detection Tools / Employee User Activity Monitoring
- How to gather and analyze various data sources to create an accurate employee snapshot to identify potential or actual Insider Threats
- How Insider Threat Detection Tools can provide insights into employees’ actions that may pose a threat to your organization
- In addition, the ITS&E will provide attendees with access to a large network of security professionals for collaborating with on all aspects of ITM
What Knowledge Will You Take Away From The Symposium?
Attendees will leave the symposium with an in-depth understanding of how to develop, implement, manage or enhance an ITP, and have the in-depth knowledge for gathering, analyzing and correlating data sources to detect and mitigate Insider Threat risks.
The ITS&E will provide attendees with access to a large network of security professionals for collaborating with on all aspects of ITM.
The ITS&E is also very well suited for any organization or business that is not required to implement an ITP, but is concerned with employee threat identification and mitigation.
More Information / Registration
https://www.insiderthreatsymposium.us
About the Author
Jim Henderson, CISSP, CCISO
Founder / Chairman Of The National Insider Threat Special Interest Group
CEO Insider Threat Defense Group, Inc.
Insider Threat Program Development / Management Training Course Instructor
Insider Threat Analyst, Vulnerability Assessor & Mitigation Specialist with my full bio found here.
888-363-7241 / 561-809-6800
www.nationalinsiderthreatsig.org
[email protected]
www.insiderthreatdefense.us
[email protected]