Human Vulnerabilities in Cybersecurity: Strategies for Mitigating Social Engineering and Insider Threats Alternate title Beyond Firewalls: Understanding Human Risk in Cybersecurity
This presentation will provide an overview on what the term “insider threat” actually encompasses, from unintentional acts to malicious acts, and everything in between. It will provide details and case studies on malicious insider acts, psychological motivations of a malicious actor, and the Critical Pathway. The Critical Pathway, as identified by Shaw and Sellers, explains how personal predispositions, stressors, and concerning behaviors can lead up to Insider Threat-like behaviors and/or malicious acts. In addition, this presentation will discuss:
How the human factor impacts organizations
How your organizational culture can affect insider threat
How both spies and social engineers work similarly to target you and your employees to gain access to your organization’s most sensitive data
How one’s personal motivations and vulnerabilities can leave their organization vulnerable
How organizations can establish an employment lifecycle program in order to understand important interdependencies, touchpoints, interactions, and gaps in insider protection strategies
Inside the Shadows: A Spy's Guide to Understanding Espionage and Protecting Your Organization alternate title The Art of Espionage: Understanding the Fundamentals of Spycraft
Espionage isn’t just a plot in thrillers; it’s a real and present danger. Doubtful you could be enticed into the world of spying? Think again. Our speaker, a former Case Officer (spy), will unveil her methods for identifying and recruiting individuals across various industries—revealing tactics from casual conversations at airport lounges to sophisticated surveillance operations.
This insightful presentation dives deep into the clandestine world of espionage and its implications for your organization. Explore the intricate realms of industrial, corporate, and foreign espionage, as we dissect their motivations, the financial stakes involved, recruitment strategies, and provide vivid case studies of threat actors.
Learn about the espionage toolkit, which blends traditional human intelligence methods with cutting-edge cyber security tactics. This talk will illuminate how today’s adversaries, including hackers, nation-states, and organized crime rings, employ espionage techniques reminiscent of those used by spies. Equip yourself with the knowledge to detect and defend against espionage, whether you’re facing a human operative or a cyber threat.
Beyond Hiring and Firing: Maximizing Organizational Performance through Effective Employment Lifecycle Management Alternate title From Onboarding to Offboarding: Mastering the Art of Employment Lifecycle Management
An employee’s lifecycle encompasses several stages throughout their career. This begins with recruitment and concludes with resignation, retirement, or termination. This talk addresses how organizations can establish an employment lifecycle program in order to give employees consistency throughout their careers and teaches you how to prevent insider threats as a result. It also provides a framework to understand important interdependencies, touchpoints, interactions, and gaps in insider protection strategies.
It will cover:
What is an insider threat?
What is employment lifecycle management?
How the human factor impacts organizations
Best practices for mitigating insider threat by managing the employment lifecycle
From Espionage to Entrepreneurship: Lessons Learned as a Spy Turned Business Owner
In this talk I will cover the challenges of being an entrepreneur and how I overcame them while starting two new businesses. Drawing from my expertise in the cybersecurity and human intelligence worlds I will share techniques I use daily in my business to mitigate risks, manage the employment lifecycle, conduct research, build networks and gain other business-related skills – all tools I learned and honed while conducting espionage around the world. Finally, I will review some common threats that entrepreneurs shouldn’t overlook and share personal stories of my background and new challenges in starting a second new company that aims to be a disruptor in an industry that has never been addressed before.
Unveiling the Intersection of AI (Artificial Intelligence) and Insider Threat
Have you heard of a deep fake? Would you or your family fall for one? Dive into the dynamic world of artificial intelligence and its intricate relationship with the insider threat landscape. As AI continues to reshape industries, it simultaneously introduces new dimensions of vulnerabilities within organizations that insiders can exploit. In this engaging and insightful keynote, we’ll explore the evolving threats of AI, from deepfakes to voice cloning, and how they can impact individuals, families, and businesses. With real-world examples and case studies, I’ll break down the tactics malicious actors use and, more importantly, provide practical tips on how to protect yourself and your loved ones from these emerging dangers. By the end, you’ll not only understand the risks but walk away empowered with actionable strategies to safeguard your digital lives in an increasingly AI-driven world.
Digital Wellness: The Art of Maintaining Your Cyber Health
In this engaging keynote, “Digital Wellness: The Art of Maintaining Your Cyber Health,” taught by a former spy who knows firsthand the tactics threat actors use—because she once used them—we’ll explore the vital connection between personal health care and cyber hygiene. This isn’t your typical, boring talk on not reusing passwords. Instead, you’ll get actionable, practical advice on how to protect yourself and your family from real-world digital threats. From understanding dangers like phishing and ransomware to adopting strong cyber hygiene practices, you’ll learn how to safeguard your digital life. With insights such as treating antivirus software like your immune system and using regular updates as digital vitamins, this talk equips you to maintain a secure, healthy online presence. By the end, you’ll understand how to protect your digital well-being, just as you would your physical health—straight from someone who knows the tricks of the trade.
Please let me know if you have any questions or would like to discuss the topics any further. Every single one is for all audiences, not highly technical folks.