Go Back

Identifying and Mitigating Risks from Within

Monday, September 28, 2015 4:30 PM - 5:30 PM
Location: 204B
Education Level: Advanced

From violence and embezzlement to theft of trade secrets and espionage, insider threats are an inevitable challenge to any organizational security program. Review the causes of insider threats and how security professionals can build programs to effectively and systemically deal with the problem. Discuss the role of background checks, strategies to build an insider threat mitigation program, techniques to continuously evaluate potential threats, the use of data to anticipate and pinpoint vulnerabilities, training and education, the application of counterintelligence approaches to security, and best practices for staffing insider threat programs to ensure a proper mix of skill sets.

Learning Objectives
Define insider threats by type and examples,including potential indicators and risk factors for Insider Threats.

Understand and explain underlying principles for Insider Threat Detection and utilize those principles to formulate a strategy to deal with Insider Threats.

Clearly understand legal compliance and "landmines" when implementing an Insider Threat Program.


Lester Rosen
Attorney at Law
Employment Screening Resources, Inc.

Michael Dorsey
Executive Director
Dell Global Security

John Wetzel
Independent Consultant

Michael Gelles
Deloitte Consulting, LLP

Mike Stehn
Astrella Corporation