INSIDER THREAT DETECTION TOOL EXPO

Produced By: Insider Threat Defense & Insider Threat Management Group

 

 

      

   

 

Home

 


 

About Us

 


 

Contact Us

 


 

 

Detecting Insider Threats

 


Detecting Insider Threats On Computers And Networks

  • Many government agencies and businesses have developed and implemented Insider Threat Programs and are now looking to gain better visibility into employee actions on their computers and networks. Enhanced visibility of employee actions can be achieved using a variety of security tools.

  • Is your organization considering the purchase of a User Activity Monitoring (UAM) solution, or similar tool for the detection of malicious or non-malicious employee activities? If so, we encourage you to read the following information below.

 

Vendor Fatigue – So Many Choices

  • Insider Threat Detection Tool vendors may use other names when marketing their tools; Employee Monitoring, User Entity Behavior Analytics, Behavioral Analytics, Big Data, Data Loss Prevention, Digital Rights Managements, Network Endpoint Protection, Security Information Event Management, etc.

  • With such a large variety of tools on the market, with many different names and features, and each vendor claiming they have the best tool, a potential buyer can quickly get confused as to what tool best suits their organizations requirements and price point.

  • The “traditional” approach of calling each vendor and setting up meetings and demonstrations is very time consuming for organizations. Organizations also do not want to be pressured into purchasing a tool that they have not thoroughly evaluated against other tools.

  • Their are numerous market research reports that attempt to help companies evaluate vendors, but they are are expensive and superficial. They are filled with a technical jargon and do not give the reader an adequate comparison of the capabilities of different tools. Most importantly, you don’t get a chance to see the tool in action.

  • You could attend a security conference and expo to do research on available tools. But you will most likely only get 5 minutes with the vendor, because 5000+ other people are attending the event and looking for information.
     

The Solution – Insider Threat Detection Tool Expo

  • To give potential buyers a much broader and enhanced view of tools, the Insider Threat Detection Tool Expo (ITDTE) was created. This 1 day event (August 16, 2018-Laurel, ND) is the first its kind, where vendors will be challenged to prove to attendees their tools can successfully detect and mitigate Insider Threat related activities.

  • We have selected the "Top 10 Vendors" in the Insider Threat Detection Tool (ITDT) marketplace and will put them to the test - LIVE. Each vendor will demonstrate to attendees how they can detect common and advanced "Insider Threat Scenarios" on IT systems and networks;

  • IT Systems / Network Access (Who, Why, When, Doing What?)

  • Data Theft / Breaches (Sensitive Business Information, Copyright. Trademark, Intellectual Property, PII)

  • File / Folder Activates

  • Printing / E-Mai Activities

  • Portable Storage Media Activities

  • Cloud Storage Activities

  • Web Activities (Sites Visited, Searches, Uploads, Downloads)

  • Dark Web Activities

  • Privileged User Actions

  • IT / Network Sabotage

  • Remote Access Activities

  • Software Usage Of Concern (Encryption, Steganography, Etc.)

  • Fraud

  • Phishing

  • Violation Of Security Policies / Procedures

  • Compliance / Productivity Concerns

  • And More......................
     

What Will The ITDTE Provide Attendees?

  • An opportunity to see tool features in action using "real world" Insider Threat cases.  (Malicious Insider Playbook Vs. Insider Threat Detection Tools)

  • A "no pressure environment," where you can ask questions, compare tools features, make informed purchasing decisions, and obtain the insight you want and need.

  • An opportunity to gain valuable knowledge and resources to thoroughly evaluate vendor capabilities.

 

What Is Included?

  • Insider Threat Detection And Mitigation Handbook
    The Handbook Includes;

  • Workplace Privacy And Employee Monitoring Guidance

  • Insider Threat Detection Tool Evaluation Criteria Checklist

  • Insider Threat Detection Tool Vendor Overview Brochures

  • Employee Computer-Network User Activity Monitoring - Types Of Events To Monitor

  • Insider Threat Red Flags Checklist - Attack Vectors From Actual Insider Threat Attacks

  • Comprehensive Listing Of Data-Information Exfiltration Methods And Risk Mitigation Techniques

 

Who Should Attend This Event?

  • Insider Threat Program Managers

  • Insider Threat Program Senior Officials / Facility Security Officers

  • Insider Threat Analysts / Investigators

  • Data Loss Prevention Managers

  • General Data Protection Regulation Security Professionals

  • Controlled Unclassified Information Security Professionals

  • Health Insurance Portability-Accountability Act Security Professionals

  • Chief Security Officers

  • Chief Risk Officers

  • Chief Information Security Officers

  • Chief Information Officers

  • Network Security / IT Security Personnel

  • Information System Security Managers / Officers

  • Information Assurance Managers / Officers

  • Computer Security Incident Response Team Leads

  • Counterintelligence Investigators

  • Fraud Investigators


Cost
Early Bird:

$195  (Till June 15, 2018)

 

Discount:

$295  (Till July 31, 2018)

 

Standard Rate:

$395  (Till August 9, 2018)

 

Government Employee:

$99  (Till August 9, 2018)

(Requires Current Govt. Agency ID - No Contractors)


Registration Link

 

Insider Threat Damages
Having a hard time convincing senior management how costly and damaging an "Insider Threat Incident" can be. The National Insider Threat Special Interest Group (NITSIG) has compiled some "Eye Opening" reports, surveys and incidents related to the Insider Threat problem
 

 


About Insider Threat Defense / Insider Threat Management Group
The ITDTE was created by two leading Insider Threat Subject Matter Experts, Jim Henderson CEO of Insider Threat Defense (ITD), and Founder / Chairman of the National Insider Threat Special Interest Group (NITSIG), and Shawn Thompson CEO of the Insider Threat Management Group, and NITSIG Board Member / Attorney-Legal Advisor. (Bio’s)

ITD, ITMG and the NITSIG have provided Insider Threat Program Development-Management Training and related guidance and services to over
1700+ security professionals.

This extensive network of security professionals and collaborative environment of information sharing, have given both Mr. Henderson and Mr. Thompson the opportunity to hear firsthand from their clients and NITSIG members, the "frustration" involved in evaluating Insider Threat Detection Tools, and making an informed purchasing decision. (Thus The ITDTE Was Created)
 


 

For More Information Please Call Or E-Mail:

 

Jim Henderson, CISSP, CCISO
CEO Insider Threat Defense, Inc.
Insider Threat Program Development / Management Training Course Instructor

Insider Threat Vulnerability Assessor & Mitigation Specialist

Founder / Chairman Of The National Insider Threat Special Interest Group
888-363-7241 / 561-809-6800
james.henderson@insiderthreatdefense.us

www.nationalinsiderthreatsig.org
jimhenderson@nationalinsiderthreatsig.org

 


Keywords
Insider, Threat, Program, Risk, Mitigation, User, Activity, Monitoring, UAM, Tools, Tools, Vendors, Vendor, Computer, Network, IT, Behavior, Behavioral, Action, Actions, Visibility, Entity, Analytics, Analysis, Analytical, UEBA, Big, Data, Loss, Breach, Prevention, Protection, DLP, Digital, Rights, Management, DRM, Network, Endpoint, Security, Database, Information, Event, Management, SIEM, Logs, Intelligence, Discovery, Correlation, Risk, Scoring, Fraud, Detection, Malicious, Embezzlement, Theft, Steal, Exfiltration, Exfiltrate, Sabotage, Evaluate, Evaluation, Compare, Comparison, Demonstrations, Capabilities, Features, General, Data, Protection, Regulation, GDPR, HIPPA, Controlled, Unclassified, Information, Copyright, Trademark, Trade, Secret, Secrets, Intellectual Property, PII, Nispom, Conforming, Change, 2

 

shopify site analytics
 
 

      Copyright © 2017 - INSIDER THREAT DEFENSE - All Rights Reserved- Legal Notice