Main Day 1

Check out everything going on at Insider Threats during Main Day 1

8:00 am - 8:50 am Registration & Breakfast

8:50 am - 9:00 am Directors Opening Remarks

9:00 am - 9:45 am A Threat on the Inside: Securing The Department of Homeland Security

Richard McComb - Chief Security Officer, Department of Homeland Security
The DHS must ensure that is protected from all security threats including those on the inside. This can range from a negligent or a malicious threat.
• Protecting your workplace from violence, fraud, waste and other workforce corruption
• Tackling legal questions and culture change at the DHS

Richard McComb

Chief Security Officer
Department of Homeland Security

9:45 am - 10:30 am Investigating the Crime Before the Crime

Shown Epley - Air Force Insider Threat Program Manager, OSCP, CISSP, Air Force
This session will decipher ways to predict a corporate crime using Artificial Intelligence. Solutions are now able to provide baselines for normal user behavior and greater
visibility into account activity.
• Using AI to create predictions about an employee’s behavior before company departure
• Understanding and evaluating the habits of a user using machine learning and analytics
• Utilizing AI to evaluate what systems are compromised and determine illicit activity

Shown Epley

Air Force Insider Threat Program Manager, OSCP, CISSP
Air Force

10:30 am - 11:00 am Morning Networking Break

11:00 am - 11:45 am Company Culture/Ethics/Ethos vs. Privacy and Security

Seth Eichenholtz - Head of EDiscovery/ Insider Threat Risk Management, MasterCard
Company Culture/Ethics/Ethos vs. Privacy and Security
• Analyzing what data points should be monitored and taken into consideration
• Understanding how to navigate the mix of personal and business, between content and network

Seth Eichenholtz

Head of EDiscovery/ Insider Threat Risk Management

11:45 am - 12:30 pm Adapting to Culture Change: From One Company to Another

Each company has its own culture that coincides with its mission statements, target market and other business initiatives. The way an insider threat is detected is
determined by the atmosphere of the organization and what policies are in place.
• Evaluating the atmosphere and employee market of your corporation
• Understanding how to successfully adapt to culture change in order to see progress in threat management

12:30 pm - 1:30 pm Lunch

• Evaluating threats posed to defense networks
• Using cloud networks to share data within an organization

Gerald Caron

Director Enterprise Network Management
Department of State

2:15 pm - 3:00 pm Cross team collaboration (building relationships with different stakeholders)

Building relationships with stakeholders throughout the company will indeed help detect an Insider Threat pre-crime. With all hands on board, malicious insiders, negligent
insiders and infiltrators will have difficulty completing the task.
• Ensuring representation from all key stakeholders inside a company to prevent a threat
• Ways to build a successful team and utilize resources from all of the organization

3:00 pm - 3:45 pm How to Connect with Human Resources and Senior Managers

Human Resources is the first department to make contact with a potential insider threat. This session will discuss the importance and ways to touch base with the HR team to balance and communication.
·         Using human resources to actively hire the right employees to mitigate security risks
·         Discuss all signs of potential breaches with human resource managers