SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
Insider Threats
Tom McAndrew

1
Ninja
KU – “NINE”

Ninja
Shinobi

NO – “AND/TALENT
ONNA- “Woman”

ICHI – “ONE”

HIMEJI Castle

2
American Ninja Warrior

3
Today’s Threats
“The ongoing cyber-thefts from the networks of
public and private organizations, including Fortune
500 companies, represent the greatest transfer of
wealth in human history.”

4

http://www.nsa.gov/research/tnw/tnw194/article2.shtml
ONCIX

5
ONCIX
• Insider threats remain the top counterintelligence challenge to our community.
• Over the past century, the most damaging U.S. counterintelligence failures were perpetrated by a trusted
insider with ulterior motives.
• In each case, the compromised individual exhibited the identifiable signs of a traitor – but the signs went
unreported for years due to the unwillingness or inability of colleagues to accept the possibility of treason.
• Insiders … are people who have been lured to betray their nation for ideological reasons, a lust for
money or sex, or through blackmail.
• Mankind's methods may change – but core motivations do not.
• Insiders convicted of espionage have, on average, been active for a number of years before being
caught.
• The damage caused by malicious insiders will likely continue to increase unless we have effective
insider threat detection programs that can proactively identify and mitigate the threats before
they fully mature.

6
http://www.ncix.gov/issues/ithreat/index.php
NITTF

7
Six Recommendations from FBI
Ease of Implementation
More Technical

Less Technical

1. Use appropriate screening
processes to select new
employees.

2. Educate and regularly train
employees on security or other
protocols

3. Provide non-threatening,
convenient ways for employees
to report suspicions.

5. Routinely monitor computer
networks for suspicious activity.

4. Ensure that proprietary
information is adequately, if not
robustly, protected.

6. Ensure security (to include computer
network security) personnel have the
tools they need.

“Remind employees that reporting security concerns is vital to
protecting your company’s intellectual property, its reputation, its
financial well-being, and its future. They are protecting their own
jobs. Remind them that if they see something, to say something.”
– FBI Insider Threats
FBI: http://www.fbi.gov/about-us/investigate/counterintelligence/the-insider-threat
ONCIX: http://www.ncix.gov/issues/ithreat

8
Why we need Network Analytics?

9
Rapid Adoption of 4 “Game Changing” Technologies

10
Final Note

Thanks for listening.
Tom McAndrew
Tom.mcandrew@coalfire.com
11

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
 
Power Point Gov
Power Point GovPower Point Gov
Power Point Gov
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Cyber war
Cyber warCyber war
Cyber war
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Hacking
HackingHacking
Hacking
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
About cyber war
About cyber warAbout cyber war
About cyber war
 

Andere mochten auch

A Survey on Balancing the Network Load Using Geographic Hash Tables
A Survey on Balancing the Network Load Using Geographic Hash TablesA Survey on Balancing the Network Load Using Geographic Hash Tables
A Survey on Balancing the Network Load Using Geographic Hash TablesIOSR Journals
 
Actividad 7 momentos claves batz socop marta maría
Actividad 7 momentos claves batz socop marta maríaActividad 7 momentos claves batz socop marta maría
Actividad 7 momentos claves batz socop marta maríaMartaBatz
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksIOSR Journals
 
Empresarismo nueva
Empresarismo nuevaEmpresarismo nueva
Empresarismo nuevaarcicol
 
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...Steven Wardell
 
CISummit 2013: Karen Gardner,
CISummit 2013: Karen Gardner, CISummit 2013: Karen Gardner,
CISummit 2013: Karen Gardner, Steven Wardell
 
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012Steven Wardell
 
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...Steven Wardell
 
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving NetworksCISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving NetworksSteven Wardell
 
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...Steven Wardell
 
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...Steven Wardell
 
The Network Approach to Change Initiatives
The Network Approach to Change InitiativesThe Network Approach to Change Initiatives
The Network Approach to Change InitiativesSteven Wardell
 
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...Steven Wardell
 
TNR2013 David Rock, The Neuroscience of Engagement
TNR2013 David Rock, The Neuroscience of EngagementTNR2013 David Rock, The Neuroscience of Engagement
TNR2013 David Rock, The Neuroscience of EngagementSteven Wardell
 
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...Steven Wardell
 
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...Steven Wardell
 
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...Steven Wardell
 
TNR2013 Ron Burt, Network Advantage on How the Network Was Built
TNR2013 Ron Burt, Network Advantage on How the Network Was BuiltTNR2013 Ron Burt, Network Advantage on How the Network Was Built
TNR2013 Ron Burt, Network Advantage on How the Network Was BuiltSteven Wardell
 
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...Steven Wardell
 

Andere mochten auch (20)

A Survey on Balancing the Network Load Using Geographic Hash Tables
A Survey on Balancing the Network Load Using Geographic Hash TablesA Survey on Balancing the Network Load Using Geographic Hash Tables
A Survey on Balancing the Network Load Using Geographic Hash Tables
 
Actividad 7 momentos claves batz socop marta maría
Actividad 7 momentos claves batz socop marta maríaActividad 7 momentos claves batz socop marta maría
Actividad 7 momentos claves batz socop marta maría
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
Empresarismo nueva
Empresarismo nuevaEmpresarismo nueva
Empresarismo nueva
 
Vra core
Vra coreVra core
Vra core
 
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
CISummit 2013: Nicholas Christakis, Using Social Networks and Social Influenc...
 
CISummit 2013: Karen Gardner,
CISummit 2013: Karen Gardner, CISummit 2013: Karen Gardner,
CISummit 2013: Karen Gardner,
 
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
Activate Networks - Driving Innovation Through Social Networks - Rob Cross 2012
 
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
CISummit 2013: Steve Gullans & Gregory Gallo, The BioSimilar Age: How to Prom...
 
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving NetworksCISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
CISummit: Zach Henderson, Data-tastick: A Deep Dive on Data Driving Networks
 
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
 
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
 
The Network Approach to Change Initiatives
The Network Approach to Change InitiativesThe Network Approach to Change Initiatives
The Network Approach to Change Initiatives
 
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
CISummit 2013: Ryan Marie Killoy, Real World Approaches to Handling 5 Challen...
 
TNR2013 David Rock, The Neuroscience of Engagement
TNR2013 David Rock, The Neuroscience of EngagementTNR2013 David Rock, The Neuroscience of Engagement
TNR2013 David Rock, The Neuroscience of Engagement
 
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
TNR2013 Phil Willburn, Network Challenges of Leaders at Different Levels in t...
 
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
TNR2013 Rob Cross, Where Has the Time Gone Addressing Collaboration Overload ...
 
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
TNR2013 Ted Graham, Using Email and Online Data to Discover Organizational Ne...
 
TNR2013 Ron Burt, Network Advantage on How the Network Was Built
TNR2013 Ron Burt, Network Advantage on How the Network Was BuiltTNR2013 Ron Burt, Network Advantage on How the Network Was Built
TNR2013 Ron Burt, Network Advantage on How the Network Was Built
 
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
TNR2013 Kristin Cullen & Birgit Schoeberl, Boundary-Spanning Leadership - How...
 

Ähnlich wie CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

The Insider Threat January.pptx
The Insider Threat January.pptxThe Insider Threat January.pptx
The Insider Threat January.pptxBertrandRussell6
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligenceDoing What I Do
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxFroilan Cantillo
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyDr. Lydia Kostopoulos
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesJohn Bambenek
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Dr. Tim Dosemagen
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarRaghunath G
 
Social Engineering By Rakesh Nagekar
Social Engineering By Rakesh NagekarSocial Engineering By Rakesh Nagekar
Social Engineering By Rakesh Nagekarnforceit
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat MitigationRoger Johnston
 
Insider threats
Insider threatsInsider threats
Insider threatsizoologic
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxZakiAhmed70
 

Ähnlich wie CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network (20)

The Insider Threat January.pptx
The Insider Threat January.pptxThe Insider Threat January.pptx
The Insider Threat January.pptx
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political Breaches
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
 
Social Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark ArtsSocial Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark Arts
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
 
Social Engineering By Rakesh Nagekar
Social Engineering By Rakesh NagekarSocial Engineering By Rakesh Nagekar
Social Engineering By Rakesh Nagekar
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat Mitigation
 
Insider threats
Insider threatsInsider threats
Insider threats
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 

Mehr von Steven Wardell

Wardell, Future of Digital Health, Leerink Research 2014-10
Wardell, Future of Digital Health, Leerink Research 2014-10Wardell, Future of Digital Health, Leerink Research 2014-10
Wardell, Future of Digital Health, Leerink Research 2014-10Steven Wardell
 
Steve wardell Digital Health Marketing Deck
Steve wardell Digital Health Marketing DeckSteve wardell Digital Health Marketing Deck
Steve wardell Digital Health Marketing DeckSteven Wardell
 
Steven Wardell Digital Health Landscape v1.8
Steven Wardell Digital Health Landscape v1.8Steven Wardell Digital Health Landscape v1.8
Steven Wardell Digital Health Landscape v1.8Steven Wardell
 
ASCO 2013 Social #HCP Findings for Melanoma - Sample
ASCO 2013 Social #HCP Findings for Melanoma - SampleASCO 2013 Social #HCP Findings for Melanoma - Sample
ASCO 2013 Social #HCP Findings for Melanoma - SampleSteven Wardell
 
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...Steven Wardell
 
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...Steven Wardell
 
CISummit 2013: John Larerre, Strategy and Social Networking
CISummit 2013: John Larerre, Strategy and Social NetworkingCISummit 2013: John Larerre, Strategy and Social Networking
CISummit 2013: John Larerre, Strategy and Social NetworkingSteven Wardell
 
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...Steven Wardell
 
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...Steven Wardell
 
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...Steven Wardell
 
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...Steven Wardell
 
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...Steven Wardell
 
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...Steven Wardell
 
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...Steven Wardell
 
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?Steven Wardell
 
[Webinar] "Trust, Fear and Energy"
[Webinar] "Trust, Fear and Energy"[Webinar] "Trust, Fear and Energy"
[Webinar] "Trust, Fear and Energy"Steven Wardell
 
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"Steven Wardell
 

Mehr von Steven Wardell (17)

Wardell, Future of Digital Health, Leerink Research 2014-10
Wardell, Future of Digital Health, Leerink Research 2014-10Wardell, Future of Digital Health, Leerink Research 2014-10
Wardell, Future of Digital Health, Leerink Research 2014-10
 
Steve wardell Digital Health Marketing Deck
Steve wardell Digital Health Marketing DeckSteve wardell Digital Health Marketing Deck
Steve wardell Digital Health Marketing Deck
 
Steven Wardell Digital Health Landscape v1.8
Steven Wardell Digital Health Landscape v1.8Steven Wardell Digital Health Landscape v1.8
Steven Wardell Digital Health Landscape v1.8
 
ASCO 2013 Social #HCP Findings for Melanoma - Sample
ASCO 2013 Social #HCP Findings for Melanoma - SampleASCO 2013 Social #HCP Findings for Melanoma - Sample
ASCO 2013 Social #HCP Findings for Melanoma - Sample
 
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
CISummit 2013: Luke Matthews, The Leading Edge of ONA; eData; Reorgs; Network...
 
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
 
CISummit 2013: John Larerre, Strategy and Social Networking
CISummit 2013: John Larerre, Strategy and Social NetworkingCISummit 2013: John Larerre, Strategy and Social Networking
CISummit 2013: John Larerre, Strategy and Social Networking
 
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
CISummit 2013: Bruce Landon, Clinically Integrated Networks and ACOs: Prepari...
 
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
 
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
CISummit 2013: Keith Figlioli, Measuring Progress Toward Accountable Care: Le...
 
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
CISummt 2013: Chris Ernst, Collaborate to Innovate: The Power of Boundary-Spa...
 
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
CISummit 2013: Pete DeWarn, Brigham Hyde, Mark Degatano, Breakthrough KOLs Pa...
 
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
CISummit 2013: Kristin Cullen, Leveraging Networks in Leadership and Organiza...
 
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
CISummit 2013: Rob Cross, How Trust, Energy, and Fear Either Amplify or Paral...
 
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
CISummit 2013: Albert-Laslo Barbasi, How Do You Best Control People Networks?
 
[Webinar] "Trust, Fear and Energy"
[Webinar] "Trust, Fear and Energy"[Webinar] "Trust, Fear and Energy"
[Webinar] "Trust, Fear and Energy"
 
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
[Webinar] "How to Keep Top Talent & Improve Your Bottom Line"
 

Kürzlich hochgeladen

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Kürzlich hochgeladen (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network

  • 2. Ninja KU – “NINE” Ninja Shinobi NO – “AND/TALENT ONNA- “Woman” ICHI – “ONE” HIMEJI Castle 2
  • 4. Today’s Threats “The ongoing cyber-thefts from the networks of public and private organizations, including Fortune 500 companies, represent the greatest transfer of wealth in human history.” 4 http://www.nsa.gov/research/tnw/tnw194/article2.shtml
  • 6. ONCIX • Insider threats remain the top counterintelligence challenge to our community. • Over the past century, the most damaging U.S. counterintelligence failures were perpetrated by a trusted insider with ulterior motives. • In each case, the compromised individual exhibited the identifiable signs of a traitor – but the signs went unreported for years due to the unwillingness or inability of colleagues to accept the possibility of treason. • Insiders … are people who have been lured to betray their nation for ideological reasons, a lust for money or sex, or through blackmail. • Mankind's methods may change – but core motivations do not. • Insiders convicted of espionage have, on average, been active for a number of years before being caught. • The damage caused by malicious insiders will likely continue to increase unless we have effective insider threat detection programs that can proactively identify and mitigate the threats before they fully mature. 6 http://www.ncix.gov/issues/ithreat/index.php
  • 8. Six Recommendations from FBI Ease of Implementation More Technical Less Technical 1. Use appropriate screening processes to select new employees. 2. Educate and regularly train employees on security or other protocols 3. Provide non-threatening, convenient ways for employees to report suspicions. 5. Routinely monitor computer networks for suspicious activity. 4. Ensure that proprietary information is adequately, if not robustly, protected. 6. Ensure security (to include computer network security) personnel have the tools they need. “Remind employees that reporting security concerns is vital to protecting your company’s intellectual property, its reputation, its financial well-being, and its future. They are protecting their own jobs. Remind them that if they see something, to say something.” – FBI Insider Threats FBI: http://www.fbi.gov/about-us/investigate/counterintelligence/the-insider-threat ONCIX: http://www.ncix.gov/issues/ithreat 8
  • 9. Why we need Network Analytics? 9
  • 10. Rapid Adoption of 4 “Game Changing” Technologies 10
  • 11. Final Note Thanks for listening. Tom McAndrew Tom.mcandrew@coalfire.com 11