Overview
Syllabus
Intro
Presentation Overview
Evolution of the IA Program
The Approach
Misunderstood Threat
Knucklehead Problem
Insider Threat
Case Statistics
Carnegie Mellon Insider Threat Tree
The Evil sysadmin
The Problem
Intrusion Kill Chain
Recruitment Tipping Point
Silver Bullets
Legal Issues
Multidisciplinary Approach
Knowing Your People
Psychosocial Indicators
Reverse Targeting
Asset Control
Return on Investment
Deterrence
Crowdsourcing Security
USB Devices
User Interaction
Data Overload
User Base
Data Sources
Predicting Events
Insider Threat Continuum
The Problem with Prediction
How do you do it
Behavioral Detection
Behavioral Analytics
Gaussian Curve
Behavior Analytics
Summary
Actions made
Taught by
Black Hat