What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Final Report Presentation By Mohammad Saber Sakhizada March,26 – 2009.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
The importance of a Compliance program is to ensure that our agency meets the highest possible standards for all relevant federal, state and local regulations,
Global Marketing Overview of Supply Chain Security Assurance Certification/membership in supply chain security programs –Different programs focus on particular.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
David A. Brown Chief Information Security Officer State of Ohio
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Legal, Ethical, and Professional Issues in Information Security
Environmental Management Systems An Overview With Practical Applications.
Security Controls – What Works
WELCOME Annual Meeting & Compliance Seminar. Code of Conduct - Impact on Corporate Culture by Andy Greenstein Knight Capital Group, Inc.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Information Systems Security Officer
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Risk Assessment Frameworks
Environmental Health and Safety Radiation Control and Radiological Services.
© 2003 by Carnegie Mellon University page 1 Information Security Risk Evaluation for Colleges and Universities Carol Woody Senior Technical Staff Software.
CHDCCS Business Service Center, Information Technology and Financial Planning Employee Safety Training March 29, 2002.
Introduction to Network Defense
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
An Educational Computer Based Training Program CBTCBT.
CORPORATE COMPLIANCE Tim Timmons Vice President Compliance and Regulatory Services Health Future, LLC.
Responsible Conduct of Research (RCR) Farida Lada October 16, 2013
Joseph Kummer Terri Berry Brad White.  1. Specific instances of employee hacking and the consequences which resulted therefrom.  2. How employees utilize.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Louisiana’s 2012 Comprehensive Master Plan for a Sustainable Coast Path Forward on Nonstructural Program Implementation CPRA Meeting - October 17, 2012.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
00 CHAPTER 1 Governance, Ethics, and Managerial Decision Making © 2009 Cengage Learning.
UMBC POLICY ON ESH MANAGEMENT & ENFORCEMENT UMBC Policy #VI
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
Creating an Insider Threat Program.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
Agencies of the Executive Branch Decisions made by any agency of the Executive Branch are considered an executive order and have the power of LAW!!!
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Department of the Navy Security Enterprise Leadership Course Curriculum for Security Program Oversight 1.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Safety Management Systems Session Four Safety Promotion APTA Webinar June 9, 2016.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Law Firm Data Security: What In-house Counsel Need to Know
BruinTech Vendor Meet & Greet December 3, 2015
Information Security Program
Business Counter-Intelligence
Microsoft 365 Get help with regulatory compliance
Fraud Risk Management at Digital Insurance Market
Federal Protective Service
Chapter 8 Developing an Effective Ethics Program
Strategic threat assessment
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Office of Health, Safety and Security
Presentation transcript:

What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf of the organization, or who inadvertently commits security breaches.”

Training employees to recognize phishing and other social media threat vectors Train continuously to maintain the proper levels of knowledge skills and abilities Conduct training on and improve awareness of risk perception and cognitive biases that affect decision making Improve usability of security tools Improve usability of software to reduce the likelihood of system- induced human Enhance awareness of the unintentional insider threat Provide effective security practices (e.g. two factor authentication for access) Maintain staff values and attitudes that align with organizational mission and ethics

December 11, 2013 USDA scientist was arrested on charges of conspiring to steal a company’s legally protected rice seed.

USDA Insider Threat Plan IP security Physical security Personnel security Cyber security

Protecting IP from Insider Threat Dept. Homeland Security recommends that programs with proprietary research or IP consider implementation of a Technology Control Plan.

Technology Control Plan Monitor Detect (provide incentives and data) Deter (prevention should be an important goal) Protect (maintain operations and economics) Predict (anticipate threats and attacks React (reduce opportunity, capability, and motivation and morale for the insider)

IP Security Measures Already in Place Federal Authorities and Regulations Agreements (15USC 3710, 7USC 3318, 7USC 3291, 7USC 450, etc.) Trade Secret Act Departmental Policies Information Systems Security Policy Classified National Security Information Policy Sensitive But Unclassified Information Protection Policy Access Control Policy for protecting information systems and data Technology Transfer Policy & Procedures Security Protection for Information Technology (IT) Assets Policy Selection, Appointment, and Responsibilities of PI Policy

Office of National Programs Program Development Line Management Program Implementation Office of Technology Transfer IP Management

AgLearn Tech Transfer Training Introduction Module Agreements Module Patenting Module

DepartmentCurrent ActivitiesFuture Plans Department of Agriculture AgLearn Tutorial for Classified National Security Information for cleared employees only (3700 people) Finalizing a General Security Awareness Video for current and new on-boarding employees Developing a new Foreign National Visitor Departmental Regulation (applicable for all USDA employees) Developing an Insider Threat Program (focus is cleared personnel and Classified National Security Information) Expand the General Security Awareness Video to include Proprietary Information Evaluating expanding Foreign Travel reporting for all cleared personnel Establishing Departmental Suspicious Reporting program Health and Human Services Identifying vulnerabilities (FDA special area of emphasis) On-boarding Awareness Training for all employees Annual Awareness Training for all employees Focus both on Counterintelligence (CI) and Insider Threat Proactively identifying cases Managing cases before referral to law enforcement agency Environmental Protection Agency In key locations (labs), provide CI briefings with local FBI (goal is to visit annually) Foreign Visitor Program established Enhancing Insider Threat Program Establishing a formal foreign disclosure program (review process for what can be released to foreign nationals) Department of the Interior Annual security training for cleared personnelFocusing on Insider Threat Program implementation

DepartmentCurrent ActivitiesFuture Plans Department of Transportation Implemented a Suspicious Activity Report (SAR) Database - All employees are trained to use it Provides Insider Threat to entire department, regardless of clearance; include proprietary information in addition to classified intelligence as part of the training Established a CI hotline for employees Reaching out to their scientific community (special area of emphasis) Department of Homeland Security Teach the Trade Secrets Act (both in-person and on-line) Personal Identifiable Information course for all employees Password protect trade secret information for external s Nuclear Regulatory Commission Used the Uniformed Trade Secrets Act (national policy) and established NRC policy Includes proprietary information Education and awareness program online for all employees Also provide in-person briefings, as appropriate Will leverage Insider Threat Policy to reinforce current programs Department of EnergyPart of the Intelligence Community Maintains nearly thirty intelligence and counterintelligence offices nationwide Protects vital national security information, technologies, and intellectual property