Main Day 2

Check out everything going on at Insider Threats during Main Day 2 (December 8th). All times are in ET.

11:30 am - 12:45 pm Registration & Networking

12:55 pm - 1:00 pm Director's Opening Remarks

1:00 pm - 1:30 pm Moving Forward: From an Insider Threat Program to a Counter-Insider Threat Mission

Stephanie L. Jaros - Director of Research, DoD Counter-Insider Threat Program

• Designing a comprehensive counter-insider threat effort 

• Addressing both individual and organizational factors that contribute to insider threat incidents 

• Integrating prevention principles into the fabric of an organization

img

Stephanie L. Jaros

Director of Research
DoD Counter-Insider Threat Program

• Designing a comprehensive counter-insider threat effort 

• Addressing both individual and organizational factors that contribute to insider threat incidents 

• Integrating prevention principles into the fabric of an organization

1:30 pm - 2:00 pm Best Practices for Implementing an Insider Threat Program

Craig Cooper - SVP Customer Success & COO, Gurucul

Insider threats are a serious concern, and they are on the rise. Detecting them and mitigating the risk requires a specialized technology platform and a set of best practices that differ from the usual approach of detecting external threats. Over the years, Gurucul has worked with many companies globally of all sizes, and in different verticals, to help them implement successful insider threat programs. Attend this session for details on our best practice recommendations based on that experience. With our proven strategies and tactics, organizations can get to the point where they are able to remediate insider threats in real-time or at least before data is exfiltrated.



img

Craig Cooper

SVP Customer Success & COO
Gurucul

10:30 am - 11:00 am Networking Break

This presentation focuses on the importance of understanding human behavior in the mitigation of insider threat. Dr. Gallagher will discuss the conceptual and practical challenges with identification and utilization of behavioral indicators as way of attempting to predict future malicious behavior. He will then present an alternative approach rooted in behavioral science that demonstrates the psychological and behavioral pathway a person follows as they transition from a trusted insider to a threat.  

img

Robert Gallagher

Senior Behavioral Advisor
DOD Insider Threat Management and Analysis Center (DITMAC)

3:00 pm - 3:30 pm Using Available Technology to Assess Existing Threats

Dr. Jonathan Roginski - Program Manager, Insider Threat, US Army

• Working with cyber platforms to prevent information infiltration

• Backing up access points with physical and digital credentials

• Evaluating security measures for remote access points

img

Dr. Jonathan Roginski

Program Manager, Insider Threat
US Army

3:30 pm - 3:45 pm Director's Closing Remarks

3:45 pm - 6:15 pm Post Conference Networking