bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
12:02 am, August 22, 2014

Search Result

Search Tags:  Insider threat

Insider threat program training starts with Security 101

Quite a number of insider threat incidents have happened because basic security principles were absent, overlooked or ignored. Why Jim Henderson says it's time we get back to the basics.

Tags: Jim Henderson , insider threat , Insider Threat Strategy , security , workforce , management , commentary , cybersecurity , technology

Tuesday - 08/05/2014, 06:23pm EDT

Are agency insider threat programs getting off the ground?

It's hard to tell how many agencies are actually checking all the boxes on the Obama administration's plan for detecting disgruntled or rogue employees. Agencies were supposed to have taken initial steps to set up insider threat programs by June 30, according to an update posted on Performance.gov. But it's impossible to know the number of agencies who met the initial criteria so far. The progress update says that information is classified.

Tags: Intelligence community , insider threat , security clearances , John Dillard , Big Sky Associates , continuous evaluation , Cross Agency Goals

Friday - 07/18/2014, 12:24pm EDT

Insider threat programs must find the right 'trust but verify' balance

NSA, State and nearly every other agency are developing "fixes" to protect unauthorized employees from taking data. Experts say employees need to understand why the rules are in place and how they benefit both the organization and worker. OMB says one way to improve the situation is by reducing the number of federal employees with security clearances-an initiative that already is underway.

Tags: management , insider threat , Beth Cobert , OMB , John Fitzpatrick , NARA , information sharing , Patrick Kennedy , State Department , NSA , Keith Alexander , Ed Hammersla , Raytheon , CA Technologies , Bill Harrod , Intelligence National Security Alliance , Dawn Cappelli , Rockwell Automation , Trust Redefined: Reconnecting Government and its Employees , Jason Miller

Wednesday - 05/21/2014, 03:56am EDT
Listen

Understanding psychology of insider threats could stop the next one

Everyday behavior of your coworkers could be a sign of a looming insider attack. A new report explains what to watch out for and how agencies can try and predict the next threat.

Tags: insider threat , Deloitte , Michael Gelles , Energy Department , workforce , Sean McCalley , Federal Drive

Monday - 04/28/2014, 05:40pm EDT
Listen

Dr. Mike Gelles, Director, Deloitte Consulting LLP

The government is on high alert for insider threats. From shootings on military base to cybersecurity leaks, it may seem like your officemate could turn into your agency's worst nightmare. Agencies struggle with appropriate ways to migrate threats. Mike Gelles, a former chief psychologist for the Naval Criminal Investigative Service and now with Deloitte, talked about the threats with Federal Drive hosts Tom Temin and Emily Kopp.

Tags: Mike Gelles , Deloitte , insider threat , Federal Drive , Tom Temin , Emily Kopp

Friday - 04/25/2014, 10:52am EDT
Listen

PM-ISE shepherds secure data sharing tool from validation to expansion

Through the back-end attribute exchange, agencies can have a standard way for different organizations to safely and securely share sensitive information. The Justice Department conducted a pilot earlier this year and found success with state and local law enforcement agencies accessing the Regional Information Sharing System.

Tags: technology , identity management , Mike Kennedy , Information Sharing Environment , GSA , DoJ , back-end attribute exchange , information sharing , insider threat , Jason Miller

Friday - 11/29/2013, 05:00am EST
Listen

Task force drafting strategy to prevent another WikiLeaks

The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.

Tags: technology , management , ODNI , FBI , Gordon Snow , John Swift , Rob Carey , DoD , Diana Braun , Insider Threat Task Force , White House , HSPD 12 , secure identity card , identity management , PKI , information sharing , WikiLeaks , insider threat , FOSE , Jason Miller

Thursday - 04/05/2012, 05:31am EDT
Listen

Tips for combating the insider threat

Hord Tipton, the executive director of ISC2 and the former chief information officer at the Interior Department, joined In Depth with Francis Rose to discuss the "red flags" managers should look for in the hiring process.

Tags: workforce , hiring , cybersecurity , Hord Tipton , ISC(2) , In Depth , Francis Rose , insider threat

Wednesday - 03/14/2012, 06:19pm EDT
Listen

How to combat insider fraud at agencies

Linda Springer, a former controller at the Office of Management and Budget, joined In Depth with Francis Rose to discuss what steps agencies should take to detect and root out insider fraud.

Tags: OMB , Linda Springer , In Depth , Francis Rose , best practices , insider threat , fraud , technology

Monday - 01/30/2012, 06:30pm EST
Listen

ICE not sitting on cyber laurels

Immigration and Customs Enforcement received a score of 95 on its FISMA report card in 2011. Jeff Eisensmith, the ICE CISO, said the agency is implementing continuous monitoring and increasing the training of its employees.

Tags: technology , Jeff Eisensmith , Immigration and Customs Enforcement , DHS , cybersecurity , continuous monitoring , insider threat , Ask the CIO , Jason Miller

Wednesday - 10/19/2011, 03:10pm EDT
Listen