December 04 - 06, 2019 | Washington, D.C.

Main Day 2

8:00 am - 8:50 am Registration & Breakfast

8:50 am - 9:00 am Directors Opening Remarks

9:00 am - 9:45 am Keeping Humans in the World of Technology

Technology has become a significant part in detecting threats, but the human connection and being open carries weight. This session will dive into the importance of maintaining a relationship between security officials and team members in order to relieve tension and gain useful knowledge.
·         Relieving employee anxiety with visibility to security teams
·         How providing effective training to employees can lead to minimal mistakes 

9:45 am - 10:30 am Investigating the Crime Before the Crime

This session will decipher ways to predict a corporate crime using artificial intelligence. Solutions are now able to provide baselines for normal user behavior and greater visibility into account activity.
·         Using AI to create predictions about an employees behaviors before company departure
·         Understanding and evaluating the habit of a user using machine learning and analytics
·         Utilizing AI to evaluate  what systems are compromised  and determine illicit activity 

10:30 am - 11:30 am Morning Networking Break

11:30 am - 12:15 pm Microsegmenting to Narrow your Threats

Some companies may look at insider threats using a broad lens, but what would happen if it were narrowed? This session will go into analyzing employees in sections and determining who is more capable of a threat.
·         Developing interventions for employees who are capable of the most damage
·         Determine what forms of threats will cause the most damage to a company
·         Creating tailored actions to a set of employees 

12:15 pm - 1:00 pm Training your Employees to Detect an Insider Threat

Training your employees on how to detect warning signs of insider threats is great way to limit future issues from occurring. The session will go into different methods of training and  how to effectively get across the importance of noticing suspicious signs.
·         Learn how to Implement  a management system that provides knowledge to employees
·         Adapt ways to educate your employees on email risks
·         Utilizing interactive trainings to establish the importance of insider threat management 

1:00 pm - 2:00 pm Lunch

2:00 pm - 2:45 pm Increasing Application Development Success with Security Training

Ensuring a company is maintaining application security to prevent a future attack is beneficial to the longevity of an organization. Speakers in this session will discuss way to successfully bounce back from a crime.
·         Knowing how to identify high risk applications that can affect the company
·         Utilizing secure software across teams to which will help cross-team collaboration
·         Engaging all teams with programs that align with security policies 

2:45 pm - 3:30 pm Cross team collaboration (building relationships with different stakeholders)

Building relationships with stakeholders throughout the company will indeed help detect an insider threat pre-crime. With all hands on board, malicious insiders, negligent insiders, and infiltrator swill have difficulty completing the task.
·         Ensuring representation from all key stakeholder inside a company to prevent a threat
·         Ways to build a successful team and utilize resources from all of the organization 

3:30 pm - 4:15 pm How to Connect with Human Resources and Senior Managers

Human Resources is the first department to make contact with a potential insider threat. This session will discuss the importance and ways to touch base with the HR team to balance and communication.
·         Using human resources to actively hire the right employees to mitigate security risks
·         Discuss all signs of potential breaches with human resource managers