Insider Threats Overview – Going Beyond The Norm, Part 2 – Jim Henderson – SCW #86
Defining Insider Threats / Going Beyond Traditional Definitions (What Is Really Happening Behind Firewalls)
How Damaging And Costly An Insider Threat Incident Can Be? (Eye Opening Examples From 10+ Years Of Research)
Creating An Insider Threat Mitigation Framework
Segment Resources:
INSIDER THREAT INCIDENTS E-MAGAZINE
2014 To Present
The Insider Threat Incidents E-Magazine contains the largest publicly available source of Insider Threat incidents (2,700+ Incidents).
View On This Link. Or Download The Flipboard App To View On Your Mobile Device
https://flipboard.com/@cybercops911/insider-threat-incidents-magazine-resource-guide-tkh6a9b1z
INSIDER THREAT INCIDENT POSTINGS WITH DETAILS
(500+ Incidents)
https://www.insiderthreatdefense.us/category/insider-threat-incidents/
Incident Posting Notifications
Enter your e-mail address in the Subscriptions box on the right of this page.
https://www.insiderthreatdefense.us/news/
INSIDER THREAT INCIDENTS COSTING $1 MILLION TO $1 BILLION +
https://www.linkedin.com/post/edit/6696456113925230592/
INSIDER THREAT INCIDENT POSTINGS ON TWITTER
https://twitter.com/InsiderThreatDG
Follow Us On Twitter: @InsiderThreatDG
CRITICAL INFRASTRUCTURE INSIDER THREAT INCIDENTS
https://www.nationalinsiderthreatsig.org/crticial-infrastructure-insider-threats.html
Announcements
In an overabundance of caution, we have decided to flip this year’s SW Unlocked to a virtual format. The safety of our listeners and hosts is our number one priority. We will miss seeing you all in person, but we hope you can still join us at Security Weekly Unlocked Virtual! The event will now take place on Thursday, Dec 16 from 9am-6pm ET. You can still register for free at https://securityweekly.com/unlocked.
Don't forget to check out our library of on-demand webcasts & technical trainings at securityweekly.com/ondemand.
Guest

Mr. Henderson has over 15 years of experience protecting classified information up to the Top Secret SCI Level, with hands-on experience in the development, implementation and management of; Insider Threat Programs, Cyber Security-Information Systems Security Programs, Information Assurance Programs, for U.S. Government Agencies (Department of Defense (DoD), Intelligence Community (IC) Agencies, Defense Contractors, State Governments, large and small businesses.
Mr. Henderson has held numerous high level security positions working as a contractor for the following government agencies; U.S. Special Operations Command, Central Intelligence Agency, Defense Intelligence Agency, DoD Insider Threat Counterintelligence Group, Defense Security Services, Department Of Energy and Health And Human Services.
Mr. Henderson’s has a background in many different security disciplines (Physical Security, Data Loss Prevention, Information Assurance, Computer Forensics, Certification & Accreditation Of Information Systems / Networks, Cyber Security, Electronic Covert Spy Devices, etc.) that drove him to create the ITDG 2009.
Hosts


