FB pixel

Defense Strategies Institute’s Insider Threat Symposium

 

Defense Strategies Institute’s Insider Threat Symposium
“Establishing Effective Insider Threat Programs to Protect Organizational Security”
October 10-11, 2017
Mary M. Gates Learning Center, Alexandria, VA

DSI’s 2017 Insider Threat Symposium will focus on the efforts to develop insider threat programs across government agencies and private sector industry in order to provide them with the information and tools they need to identify, contain, and combat insider threats.

Topics to be Covered at the Symposium:

– Protecting the Nation from Intelligence and Security Threats
– Defending the Nation’s Interests and Industrial Base from Insider Threats
– Managing Legal Challenges and Protecting Civil Liberties while Combatting Insider Threat
– Creating a DoD Enterprise Hub to Combat Insider Threat
– Establishing Effective Insider Threat Programs Across the IC
– Leveraging Identity & Access Management to Support Insider Threat Efforts Across the IC
– Leveraging Advanced Analytics to Detect Behavioral Anomalies
– FBI’s Efforts to Combat Insider Threat: Law Enforcement & Interagency Cooperation Efforts
– Improving Background Checks to Mitigate Risk of an Insider Threat

Why You Should Attend This Symposium

DSI’s Insider Threat Symposium will bring together leaders from the IC, DoD, Federal Agencies, Private Industry, and Academia to discuss the efforts to develop and integrate successful insider threat programs in order to protect organizational security.

An insider threat comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization’s security practices, data and computer systems. These threats are, as the name suggests, internal in nature and focus on trusted employees or contactors. This Symposium will focus on how to counter these threats. The solutions are both technical, including monitoring software and increased data security; as well as human, such as enhanced screening processes and behavioral analytics. Many agencies are working to stand up their insider threat programs and are learning how to identify, contain, and combat insider threat.

The Symposium will examine successful programs, challenges in setting up programs, legal issues that program insider threat face, and the latest analytics methods being utilized to identify insider threats.

Join us for this year’s Insider Threat Symposium as we discuss the various opportunities and challenges that the IC, DoD, and private industry face as they develop and integrate insider threat programs into their organizations.

Learn more & register today!

Article Topics

 |   | 

Latest Biometrics News

 

AI agents operating continuously at machine speed are breaking human-centric IAM

New research commissioned by Ping Identity and compiled by KuppingerCole Analysts shows that “agents are being deployed into production faster…

 

Criticism follows inclusion of Madras Security Printers in Sri Lanka digital ID bids

Civil society group the People’s Struggle Alliance (PSA) has raised concerns regarding the inclusion of Madras Security Printers (MSP) in…

 

Malaysia’s MyDigital ID adds 29 partners as adoption grows

Twenty-nine organizations have joined MyDigital ID, the Malaysian government’s decentralized digital ID system, in what a report calls “a significant…

 

authID looks to raise $4M in private placement as challenging transition continues

authID is looking to raise $4 million less expenses in bridge loan financing for “working capital and general corporate purposes.”…

 

Checkr launches sharable profiles, integrates Socure into Checkr Trust

Biometric background check provider Checkr has launched Checkr Profiles for verified credentials. According to a release, the product allows individuals…

 

Germany launches program to bring open source maintainers into standards bodies

Tech experts who lead open source digital infrastructure projects rarely get to participate in developing technical standards, even though three-quarters…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events