ConCollector
our blog
|
more on thinkst
Search:
Everything
Browse:
Speakers
Conferences
Topics
Contributors
Analytics
Folklore
About
Login
InsiderThreat 2017
March 29, 2017 to March 30, 2017, monterey,california
Event Page
Tell us about missing data
Title
Speakers
Summary
Topic Types
welcoming Remarks
Michael Sorrento
N/A
Fighting The Insider Threat: Plugging The Leak In The Digital Fence
Paul A. Vixie
N/A
Data Breaches Happen. Be Defined by How You Recover.
Antonio "Tony" Rucci
N/A
Insider Threat: The Human Inside the Machine.
Dan Dzenitis
N/A
Financial Drivers for Insider Threat
Jeffrey Huth
N/A
Inside the Cuckoo's Egg
Ryan Meeks
N/A
Modeling Resilience
Wayne Lloyd
N/A
Using Data to Thwart the Insider Threat
Jason Rowe
N/A
Open-Panel Discussion
Ellick Chan
,
Michael Lipinski
,
Gregg Seitz
,
Michael Reith
N/A
Cyber Situational Awareness
Bob Palmer
,
Timothy Evans
N/A
Opening Remarks
Timothy Evans
N/A
Using Theories of Attribution and Process Loss to Predict Conditions for Better Insider Threat Analysis
Ryan Kelly
N/A
Find the Lipsyncer in a Choir of Hundreds: Identify the Insider Threat
Neil Carmichael
N/A
Insider Threat Specialist: The New Breed of Analyst
Michael Caimona
N/A
Privileged Users, Friends or Foe: A Security & Operations Perspective
Bill Johnson
N/A
The Enemy Within: Detecting and Mitigating Insider Threats
Brian Vecci
N/A
Identity Proofing and Multi-factor Authentication to Combat Insider Threats.
Patrick Clancey
N/A
Insiders and Immune Systems- When Rules and Signatures Don’t Work.
Andrew Tsonchev
N/A
The Visible Attack Surface – What it is and Why it Matters
Kevin Flynn
N/A