Chocolate Bar Bounty – SCW #86
Full Audio
View Show IndexSegments
1. Insider Threats Overview – Going Beyond The Norm, Part 1 – Jim Henderson – SCW #86
Defining Insider Threats / Going Beyond Traditional Definitions (What Is Really Happening Behind Firewalls) How Damaging And Costly An Insider Threat Incident Can Be? (Eye Opening Examples From 10+ Years Of Research) Creating An Insider Threat Mitigation Framework
Segment Resources:
INSIDER THREAT INCIDENTS E-MAGAZINE 2014 To Present The Insider Threat Incidents E-Magazine contains the largest publicly available source of Insider Threat incidents (2,700+ Incidents).
View On This Link. Or Download The Flipboard App To View On Your Mobile Device https://flipboard.com/@cybercops911/insider-threat-incidents-magazine-resource-guide-tkh6a9b1z
INSIDER THREAT INCIDENT POSTINGS WITH DETAILS (500+ Incidents) https://www.insiderthreatdefense.us/category/insider-threat-incidents/
Incident Posting Notifications Enter your e-mail address in the Subscriptions box on the right of this page. https://www.insiderthreatdefense.us/news/
INSIDER THREAT INCIDENTS COSTING $1 MILLION TO $1 BILLION + https://www.linkedin.com/post/edit/6696456113925230592/
INSIDER THREAT INCIDENT POSTINGS ON TWITTER https://twitter.com/InsiderThreatDG Follow Us On Twitter: @InsiderThreatDG
CRITICAL INFRASTRUCTURE INSIDER THREAT INCIDENTS https://www.nationalinsiderthreatsig.org/crticial-infrastructure-insider-threats.html
Announcements
Don't miss any of your favorite Security Weekly content! Visit https://securityweekly.com/subscribe to subscribe to any of our podcast feeds and have all new episodes downloaded right to your phone! You can also join our mailing list, Discord server, and follow us on social media & our streaming platforms!
InfoSec World 2021 is proud to announce its keynote lineup for this year’s event! Hear from Robert Herjavec plus heads of security at the NFL, TikTok, U.S. Department of Homeland Security, Stanford University, and more… Plus, Security Weekly listeners save 20% on Digital Pass registration! Visit https://securityweekly.com/isw2021 to register now!
Guest
Mr. Henderson has over 15 years of experience protecting classified information up to the Top Secret SCI Level, with hands-on experience in the development, implementation and management of; Insider Threat Programs, Cyber Security-Information Systems Security Programs, Information Assurance Programs, for U.S. Government Agencies (Department of Defense (DoD), Intelligence Community (IC) Agencies, Defense Contractors, State Governments, large and small businesses.
Mr. Henderson has held numerous high level security positions working as a contractor for the following government agencies; U.S. Special Operations Command, Central Intelligence Agency, Defense Intelligence Agency, DoD Insider Threat Counterintelligence Group, Defense Security Services, Department Of Energy and Health And Human Services.
Mr. Henderson’s has a background in many different security disciplines (Physical Security, Data Loss Prevention, Information Assurance, Computer Forensics, Certification & Accreditation Of Information Systems / Networks, Cyber Security, Electronic Covert Spy Devices, etc.) that drove him to create the ITDG 2009.
Hosts
2. Insider Threats Overview – Going Beyond The Norm, Part 2 – Jim Henderson – SCW #86
Defining Insider Threats / Going Beyond Traditional Definitions (What Is Really Happening Behind Firewalls) How Damaging And Costly An Insider Threat Incident Can Be? (Eye Opening Examples From 10+ Years Of Research) Creating An Insider Threat Mitigation Framework
Segment Resources:
INSIDER THREAT INCIDENTS E-MAGAZINE 2014 To Present The Insider Threat Incidents E-Magazine contains the largest publicly available source of Insider Threat incidents (2,700+ Incidents).
View On This Link. Or Download The Flipboard App To View On Your Mobile Device https://flipboard.com/@cybercops911/insider-threat-incidents-magazine-resource-guide-tkh6a9b1z
INSIDER THREAT INCIDENT POSTINGS WITH DETAILS (500+ Incidents) https://www.insiderthreatdefense.us/category/insider-threat-incidents/
Incident Posting Notifications Enter your e-mail address in the Subscriptions box on the right of this page. https://www.insiderthreatdefense.us/news/
INSIDER THREAT INCIDENTS COSTING $1 MILLION TO $1 BILLION + https://www.linkedin.com/post/edit/6696456113925230592/
INSIDER THREAT INCIDENT POSTINGS ON TWITTER https://twitter.com/InsiderThreatDG Follow Us On Twitter: @InsiderThreatDG
CRITICAL INFRASTRUCTURE INSIDER THREAT INCIDENTS https://www.nationalinsiderthreatsig.org/crticial-infrastructure-insider-threats.html
Announcements
Don't forget to check out our library of on-demand webcasts & technical trainings at securityweekly.com/ondemand.
In an overabundance of caution, we have decided to flip this year’s SW Unlocked to a virtual format. The safety of our listeners and hosts is our number one priority. We will miss seeing you all in person, but we hope you can still join us at Security Weekly Unlocked Virtual! The event will now take place on Thursday, Dec 16 from 9am-6pm ET. You can still register for free at https://securityweekly.com/unlocked.
Guest
Mr. Henderson has over 15 years of experience protecting classified information up to the Top Secret SCI Level, with hands-on experience in the development, implementation and management of; Insider Threat Programs, Cyber Security-Information Systems Security Programs, Information Assurance Programs, for U.S. Government Agencies (Department of Defense (DoD), Intelligence Community (IC) Agencies, Defense Contractors, State Governments, large and small businesses.
Mr. Henderson has held numerous high level security positions working as a contractor for the following government agencies; U.S. Special Operations Command, Central Intelligence Agency, Defense Intelligence Agency, DoD Insider Threat Counterintelligence Group, Defense Security Services, Department Of Energy and Health And Human Services.
Mr. Henderson’s has a background in many different security disciplines (Physical Security, Data Loss Prevention, Information Assurance, Computer Forensics, Certification & Accreditation Of Information Systems / Networks, Cyber Security, Electronic Covert Spy Devices, etc.) that drove him to create the ITDG 2009.