Presented at
Texas Cyber Summit 2019,
Oct. 12, 2019, 11:15 a.m.
(45 minutes).
**Talk Details:**
My talk will cover: Real vs. Hollywood insider threats. During the talk, I will show instances of insider threats from around the world including two specific cases I have worked over the years where I caught insider threats. We’ll talk about what they took, how they took it and how we were able to catch them. These examples will reinforce my talk with personal experiences. Case No. 1 will be the story of a rouge system administrator who was selling info to acquisition targets. Case No. 2 will review a case where an employee was trying to steal the formula for a manufacturing process and client lists, as well as trying to damage the employer by sending confidential info to employees.
Turn off your mobile phone, put down your tablet and learn about the real-world insider threats causing the greatest harm (not just the big ones that make the 5 o’clock news). How quickly could your organization be breached by malicious insiders? How can your team help find them? Threat hunters are often tasked with looking for attackers’ TTPs. But how can they look for malicious insiders? Please join our special guest, David Balcar a globally recognized security professional, as he shares his personal, real-world experience of sniffing out insider threats.
Presenters:
-
David Balcar
- Security Strategist
David Balcar is a Security Strategist at Carbon Black. David is a security veteran with over 18 years’ experience in conducting Security Research, Network Penetration testing, Incident Response and Computer Forensics. David is a regular featured speaker at Security Conferences worldwide, presenting on subjects including security trends, penetration testing, top threats and network security hardening. He is a member of the HTCIA (High Technology Crime Investigation Association), and ISSA (Information Systems Security Association). At Carbon Black, David is responsible for the presales activities of the Carbon Black portfolio that includes: CB Response, CB Protection, CB Defense, CB ThreatHunter CB LiveOps & CB ThreatSight.
Links:
Similar Presentations: