Location: Towson University
Please join CIO members and invited guests at the November roundtable plus!
At this roundtable plus meeting, an in-depth look at insider threats and external threats will be examined. First, Dawn Cappelli, Technical Manager of the Insider Threat Center and the Enterprise Threat and Vulnerability Management team in the CERT Program at Carnegie Mellon University's Software Engineering Institute, will present “Hiding in Plain Sight: The Insider Threat”. “What do you think of when you hear the term “insider threat”? If you are in the financial sector perhaps you think of fraud. If you rely on inventions, patents, or strategic business development, then perhaps you think of espionage. In my experience, most of you probably do not think of massive deletion of information or sabotage of operational systems – but you should! The purpose of this presentation is to raise awareness to the types of insider threats you should be concerned about, based on our collection and analysis of approximately 800 actual insider threat cases. You will leave this presentation armed with questions you can take back to your organization to determine your own preparedness to prevent, detect, and respond to malicious insider activity.” (Cappelli, 2012)
In the second half of the meeting, Jeremy Willingham, Director of Advanced Cyber Training, Telecommunications Systems, Inc., will provide an update on cyber security risks and strategies. “Businesses in all markets, and of all purposes, now share one common goal: protecting the information that is important and relevant to their business goals. Hackers also have a goal: gain access to that sensitive information. Why do they want that info? Many reasons: to embarrass a company they think has wronged them, to highlight a problem that needs to be addressed, to further their own financial situations, or even just to prove that they can. Cyber security is an issue for people of all markets, and there are many tools and strategies that can be utilized to develop a comprehensive security posture. In this talk I will explain the importance of cyber security, describe various tools and strategies that can be used in the creation of a cyber security posture, and use as examples real world case studies of cyber breaches and their implications.”(Willingham, 2012)
The Forum welcomes a re-initialization of the security managers network. Any security specialists from Forum member organizations attending this meeting and wishing to participate in the network are invited to join a kickoff meeting of the network right after lunch.
This meeting is a Roundtable Plus meeting. Only CIO members, guest CIOs and guests invited by CIO members for this roundtable will be attending. The roundtable format will be used and all participants will have signed a non-disclosure agreement. (NDA).
Please join our members at the meeting! The meeting starts at 8:00 AM and ends by 1PM. Brunch and lunch are provided. Pre-registration is required. Meeting logistics including agenda, directions to the meeting place and parking information will be emailed to you after you register. For registration for this meeting, please contact: Bonnie Lawson at email@example.com or 410-704-4252.