CENTRA T ECHNOLOGY, I NC. 1 5 Steps To Protect Your Company Katherine D. Mills CENTRA Technology, Inc. Insider Threat:

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Adverse Information Adverse Information:
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Annual Security Refresher Briefing. General Information Edmonds Enterprises Services (EES) and Logistics Applications Inc. (LAI) as Defense Contractors.
An introduction to Child Protection and Safeguarding
F ACILITY S ECURITY Presented by: Dela Williams. 2.
INTRODUCTION o DISCUSS ADOPTION OF FRAUD AND THEFT POLICY o ASSIGNS RESPONSIBILITY FOR REPORTING FRAUD AND THEFT o PROVIDES GUIDELINES FOR INVESTIGATIONS.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Section Nine: Reporting Requirements Note: All classified markings contained within this presentation are for training purposes only.
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
CORPORATE ESPIONAGE COUNTERMEASURES Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
The Department of Defense Intelligence Oversight Program
Espionage Indicators Briefing 1 U.S. Department of Commerce
WELCOME Annual Meeting & Compliance Seminar. Code of Conduct - Impact on Corporate Culture by Andy Greenstein Knight Capital Group, Inc.
School Safety Training
Information Systems Security Officer
Supplier Ethics: Program Checklist
Workplace Violence Research has identified factors that may increase the risk of violence at worksites. Such factors include working with the public or.
Computer Security: Principles and Practice
Ann Murphy, Office of the Chief Administrative Officer NOAA Trusted Agent Training Silver Spring, MD October 2014 National Oceanic and Atmospheric Administration.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
/0203 Copyright ©2002 Business and Legal Reports, Inc. BLR’s Safety Training Presentations Safety and Health Program.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
Cleared Employee Reporting Requirements. Reporting Regulations  Defense Security Service (DSS)  The National Industrial Security Program Operating Manual(NISPOM)1-300.
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
/0412 © Business & Legal Reports, Inc. BLR’s Human Resources Training Presentations Bereavement and the Workplace.
Presentation CIFAL PRESENTATION Date: 13 JUNE 2012 Place : Durban.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
“The Fourth Amendment protects people, not places.”
Marshall O. Combs Deputy Director, Office of Security June 4, 2003 Foreign Visits, Assignments and Travel Program.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
Information Systems Security Operational Control for Information Security.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Risk Management & Clinical Research Duke University Health System Orientation 2008 Clinical Research Coordinators Douglas Borg, MHA, ARM, CPHRM, DFASHRM.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
UNIT 15 WEEK 9 CLASS 1 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
Peter Sakaris CISSP Booz Allen Hamilton, 1299 Farnam Street Suite 1230, Omaha, NE Office The Insider Threat.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Division of Risk Management State of Florida Loss Prevention Program.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Designing Services for Security: Information Security Management throughout the Service Lifecycle Sarah Irwin & Craig Haynal 2015 Penn State Security Conference,
ACF RISK MANAGEMENT POLICIES General Induction Course.
Creating an Insider Threat Program.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
NISPOM Chapter 1 Basics General Requirements Reporting Responsibilities Steven Rivera, FSO July 10, 2013.
How To Conduct An Administrative Inquiry (AI) Due To A Security Violation
Information Protection The Personnel Security Program (PSP) & Supervisors’ Responsibilities Mr. Connolly.
P2S-HR-EMP-001 Workplace Substance Abuse for Employees1 Employee Training Drug Free Workplace Extracted from information provided by the Office of the.
Safety and Health Program Don Ebert- Risk Manager (509)
Our Club: SUPPORTS Kids Is SAFE for Kids Is FUN for Kids.
Department of the Navy Security Enterprise Leadership Course Curriculum for Security Program Oversight 1.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
HR SECURITY  EGBERT PESHA  ALLOCIOUS RUZIWA  AUTHER MAKUVAZA  SAKARIA IINOLOMBO
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Insider Threat Awareness
INSIDER THREAT AWARENESS
Forensics Week 11.
The Employee Advisory Service
Cyber security Policy development and implementation
Export Control Update Brittany Whiting Director 10/3/18
IS-907 – Active Shooter: What You Can Do
Presentation transcript:

CENTRA T ECHNOLOGY, I NC. 1 5 Steps To Protect Your Company Katherine D. Mills CENTRA Technology, Inc. Insider Threat:

CENTRA T ECHNOLOGY, I NC. 2 Introduction  5 Step Process –Creating a plan for your company  Best Practices –Transforming your company –CI Indicators

CENTRA T ECHNOLOGY, I NC. 3 Threat is Now: Recent Malicious Insiders Major Nidal Hassan – Responsible for shooting at Fort Hood Texas Aaron Alexis – Responsible for shooting at the Washington Navy Yard Bradley “Chelsea” Manning – Unauthorized disclosure to WikiLeaks Edward Snowden – Unauthorized disclosure of NSA surveillance programs

CENTRA T ECHNOLOGY, I NC. 4 Other Malicious Insiders  Telecommunications employee  Aerospace engineer  Software engineer  Chemical contractor  Search insider threat –Hundreds of examples, costing the Government and companies millions

CENTRA T ECHNOLOGY, I NC. 5 Why Consider Insider Threat?  Protect national security and corporate assets –We don’t want to be in the news  Will be required by Government –Changes to NISPOM –Required by Sponsors  Want to ensure we are taking positive steps to protect our company and assets

CENTRA T ECHNOLOGY, I NC. 6 How to Begin…  Do your research: Tons of free resources available –CERT Common Sense Guide to Mitigating Insider Threats –DSS Insider threat video and brochures –FBI website and movie “Betrayed” –ONCIX website –ASIS “Confronting the Insider Threat,” October 2013

CENTRA T ECHNOLOGY, I NC. 7 CERT  Common Sense Guide to Mitigating Insider Threats

CENTRA T ECHNOLOGY, I NC. 8 Defense Security Service  Insider Threat videos and Brochures

CENTRA T ECHNOLOGY, I NC. 9 Federal Bureau of Investigation  The Insider Threat Page –An Introduction to Detecting and Deterring an Insider Spy  Betrayed: The Trusted Insider

CENTRA T ECHNOLOGY, I NC. 10 ONCIX  National Insider Threat Task Force (NITTF)  National Insider Threat Policy and the Minimal Standards

CENTRA T ECHNOLOGY, I NC. 11 ASIS International: Security Management  Confronting the Insider Threat –By Laura Spadanuta, October 2013 of Security Management

CENTRA T ECHNOLOGY, I NC. 12 Steps to Building a Plan  Team  Assets  Procedures  Awareness  Document plan

CENTRA T ECHNOLOGY, I NC. 13 Step 1: Identify the Team  Identify team members who understand and can contribute to the mission: –COO –HR –Security –IT  Who will be responsible for: –Drafting the plan –Regular meetings –Budget approval –Reporting to sponsors and Government –Conducting an Investigation

CENTRA T ECHNOLOGY, I NC. 14 Step 2: Understand Your Assets Conduct a risk assessment Talk to management about assets: –What are the corporate jewels? –How well are they currently protected? –How sensitive are they? What is the risk if they are leaked? –Who has access to the information?

CENTRA T ECHNOLOGY, I NC. 15 Step 3: Tighten Up Procedures  Tighten procedures –Termination procedures –Unclassified data handling and access –IT system access  Document expectations to staff  Violation policy

CENTRA T ECHNOLOGY, I NC. 16 Step 4: Security Education  Free cartoons, brochures, articles available –No need to reinvent the wheel!  Incorporate insider threat into annual refresher training  Monthly security news item on reporting  Update current policies and publicize  Ensure staff understand reporting; make it easy for staff to report confidentially

CENTRA T ECHNOLOGY, I NC. 17 Step 5: Draft a Plan  Document what you have learned  Steps 1-4: –Team –What are assets and overall risk –What procedures have been impacted –Security education program  Work-in-progress

CENTRA T ECHNOLOGY, I NC. 18 Confronting the Insider Threat “It is important for each company to identify what an insider threat is and to set a policy in place on how to deal with insider threats. The policies must outline certain types of behavior that warrant scrutiny, disciplinary action, or even termination so that companies have a basis from which to work when they do identify potential threats.” ASIS: Confronting the Insider Threat by Laura Spadanuta, October 2013

CENTRA T ECHNOLOGY, I NC. 19 Encourage Reporting  Encourage employees to report  Provide confidential means of reporting  Staff holding security clearance are required to report adverse information, including potential threats  Trust your instincts, if you see something, say something!  It is better to report something that turns out to be nothing than to not report a serious security issue

CENTRA T ECHNOLOGY, I NC. 20 Detecting the Insider Post incident investigations reveal family, friends, or coworkers notice a suspect’s indicators, but they fail to report concerns “ Subjects often tell people close to them what they are doing, and sometimes even engage associates in the process. Former intimates (spouses, lovers, close friends – people with whom they spent a good deal of time) are a potentially important source of information in all investigations.”* * Source: Declassified Director of Central Intelligence Memorandum of 12 April 1990; Subject: Project Slammer Interim Report

CENTRA T ECHNOLOGY, I NC. 21 Threat Indicators  Apparent unexplained affluence or excessive indebtedness  Efforts to conceal foreign contacts, travel, or foreign interests  Access to information or IT systems without need-to-know  Exploitable behavior –criminal activity –excessive gambling –drug or alcohol abuse –problems at work  Questionable judgment or untrustworthiness

CENTRA T ECHNOLOGY, I NC. 22 Threat Indicators, cont.  Apparent mental, emotional or personality disorders(s)  Disgruntled  Working odd or late hours  Unreported foreign travel  Suspicious foreign contacts  Requesting access to information outside of official job duties including sensitive or classified information

CENTRA T ECHNOLOGY, I NC. 23 Summary of Best Practices  Know your people; recognize concerning behaviors as potential indicators  Protect your “crown jewels”  Pay close attention at termination  Monitor ingress and egress points (IT systems and physical security)  Baseline normal activity and look for anomalies  Work together across organization  Educate employees regarding potential recruitment

CENTRA T ECHNOLOGY, I NC. 24 Sources