• GCN
  • WT
  • DS

Download this Executive Overview to learn what you missed at the Federal Focus on Insider Threat Detection & Mitigation event held on March 12th in Washington, DC.

Federal agencies are revisiting their efforts to limit the opportunities– and consequences–of potential threat actors who have access to their systems, data, and facilities as part of their daily work.

Get an insight from those who are deploying analytical tools and training programs to minimize the insider threat landscape as part of their core agency security measures.

In addition, learn from seasoned industry practitioners about the common misconceptions about insider behavior and how to leverage effective technologies within existing IT architectures that are designed to lighten the oversight burden on stretched cybersecurity professionals.

Learn more about how to:

  • Analyze processes, data, and operating norms to help your organization establish reasonable “baselines” to support prediction and interdiction of insider activity
  • Implement cyber-monitoring programs that manage risk and support productivity (versus those that threaten employee adoption and compliance)
  • Understand the “unintentional threat actor channel” that accounts for significant IT staff time and incident response costs
  • Remove staff from exposure to sophisticated threats that support a more confident and secure operating environment
  • Evaluate your agency options for supporting technologies that focus on insider threat identification and effective response

Featured Speakers:

  • Tom Blauvelt
  • Continuous Monitoring and Security Solutions Architect, Symantec
  • Click for Bio

    Tom Blauvelt is a Security Architect with Symantec where he provides technical leadership to the Continuous Monitoring program . In his 15+ year career as a security practitioner he has covered a wide variety of disciplines including work with security operations, penetration testing, solution engineering, consulting and management. Some of his more interesting roles include work as Director of Security Operations for a large credit reporting agency as well as CISO for a large, private bank. Since joining Symantec over 3 years ago, Tom has served at the pleasure of his customers helping them architect and implement solutions to effectively measure and mitigate unacceptable risk in their environments. When Tom is not focused on saving the world “one mitigating control at a time”, he enjoys being a dedicated husband and a father to three of the coolest kids on the planet.

  • Neil Carmichael, Jr.
  • Program Manager, Insider Threat Program, National Archives and Records Administration
  • Click for Bio

    Neil C. Carmichael, Jr. is currently the National Archives and Records Administration‘s (NARA) Insider Threat Program Manger. As the Insider Threat Program Manager, Neil formulates policy, best practices, and procedures on mitigating the loss of classified or sensitive information as required by Executive Order 13587. He works in concert with representatives from information assurance and security to ensure that NARA provides the appropriate protective measures on valued assets and information. Neil has a wealth of experience through his past work at the Information Security Oversight Office (ISOO) where he was immersed in practices related to national security information with federal agencies to include the White House, Department of State, Department of Defense, and the Intelligence Community. Neil’s most recent position was in the National Declassification Center (NDC) where he served as the Director of the Indexing and Declassification Review Division. While in the NDC, Neil represented both NARA internal and external partners in the North Atlantic Treaty Organization (NATO)-related matters to include attending annual NATO Archives Committee meetings and had led several NATO Archival working groups with our Allies on streamlining NATO’s Public Disclosure Program. Before coming to the NARA, Neil served in the United States Army and worked at the Department of State. Neil holds a B.A. degree in History from the University College University of Maryland.

  • Paul Christman
  • Vice President, Dell Software Public Sector
  • Click for Bio

    Paul Christmas manages Dell Software’s public sector sales and services division. His teams call of the U.S. federal government, all state and local governments, and educational institutions. In his current role, Paul oversees end-user business development, manages channel and integrator relationships, and coordinates marketing functions. He is also responsible for consulting services sales and delivery. He is in charge of long term growth and overall profitability as well as day-to-day operations.

    Paul is a nationally recognized expert on enterprise software in the domains of cybersecurity, information management, cloud services, and mobile device management. He has dedicated the past 20 year of his career to supporting the missions of public sector organizations. Paul regularly speaks at conferences about the business of government and the challenges created by the adoption of innovative technologies. He has wide ranging experience in government purchasing, contracting, consulting, and software product marketing.

    Paul joined Quest Software in 2005 (acquired by Dell in 2012) as Director of Sales, leading teams responsible for creating strategic technology relationships with state and local governments and higher education institutions nationwide. Previously, he spent four years at Veritas Software (acquired by Symantec in 2004) as National Sales Manager and Business Development Manager for state and local governments and public education customers. Prior to joining Veritas Software, Paul was a district manager for Metiom, an electronic procurement software company that focuses on automating government purchasing. Paul also held various sales and sales management positions at Microsoft and Lotus. Paul graduated with honors from Hamilton College with a degree in psychology. He serves on the board of directors of the USO of Metropolitan Washington.

  • Adam Cohn
  • Director, Government Affairs & Public Policy, Splunk
  • Gustavo Coronel
  • Security Engineer, Check Point Software Technologies
  • Click for Bio

    Gustavo Coronel is a Senior Security Engineer with Check Point Software Technologies and has been involved with network security for over 20 years. His first foray into network security was deciding between Check Point Firewall-1, Raptor Systems Eagle, and TIS Gauntlet to serve as the US Department of Transportation’s first firewall in late 1994. Firewall Administration, Intrusion Detection, Vulnerability Assessments, SIEM, Protocol Analysis, Incidence Response, Forensics and Secure Network Design projects quickly followed. He moved to Nokia’s Security Division in 1999 to support their Service Provider and Telecommunications Division. Gustavo spent 10 years at Nokia helping secure some of the world’s largest Telco networks. He joined Check Point’s Federal Group in 2009 after CP acquired Nokia’s Security Appliance Division.

  • Robert Dix
  • Vice President, Global Government Affairs & Public Policy, Juniper Networks
  • Click for Bio

    Bob Dix has led the global government affairs and public policy practice for Juniper Networks since its inception in 2006. During his career, he has served in senior leadership roles in industry and government, including serving as Staff Director for the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, House Government Reform & Oversight Committee during the 108th Congress.

    Based on his extensive experience, Mr. Dix is a strong proponent of public and private sector collaboration to address challenges of emergency preparedness, business continuity, cybersecurity, and the security and resilience of critical infrastructure. He is frequently invited as a presenter at conferences and events globally. In addition, his portfolio includes issues such as data protection & privacy; tax reform; immigration; energy & environment; and domestic & global competitiveness; among many others.

    Dix has represented Juniper as the Industry Executive Point of Contact for the President's National Security Telecommunications Advisory Committee (NSTAC) since 2006. He served as a founding member of the Information Technology Sector Coordinating Council (IT SCC) in 2005 and as Chair from 2008 – 2010. He remains a member of the Executive Committee. In May, 2011, Mr. Dix was elected as Chair of the Partnership for Critical Infrastructure Security ( PCIS ), and re-elected to succeeding terms in 2012 and 2013.

    Dix also serves on the National Security Task Force for the U. S. Chamber of Commerce and is a member of the AFCEA Cyber Security Committee. He served for two years as Chair for the Telecommunications Industry Association (TIA) Cyber Security Committee. Mr. Dix formerly chaired the Cyber Security Legislative Subcommittee for TechAmerica and also served in leadership positions with the Industry Advisory Council (IAC), including a two-year term on the Executive Committee.

    Mr. Dix has advocated for greater private sector participation in government-sponsored efforts to test capabilities for protection, preparedness, and resilience of our nation’s critical infrastructure. He served as Chair of the National Private Sector Working Group for National Level Exercises in 2010 and 2011. In 2007 and 2009, Dix was honored with a prestigious Federal 100 Award, and was recognized in March, 2010 as the Industry recipient of the annual Federal 100 Eagle Award.

    Dix also served as a local government elected official in Fairfax County for 12 years. He is a community leader, and also coaches AAU/Showcase girls basketball at the national level.

  • Prem Jadhwani
  • Chief Technology Officer, Government Acquisitions
  • Click for Bio

    Prem Jadhwani, chief technology officer (CTO), brings 18 years of experience working in the enterprise IT space with both commercial and Federal customers to Government Acquisitions, Inc. (GAI). As CTO, Mr. Jadhwani provides solution vision, strategy, thought leadership, and subject matter expertise around data centers, networking, cyber security, cloud computing, data analytics, and other emerging technologies.

    Mr. Jadhwani has served as a Commissioner for TechAmerica Cloud and Big Data Commission. He holds an MS in Computer Science from Illinois Institute of Technology, an MBA in Marketing & Strategy from Stuart School of Business in Chicago, and has completed coursework for a Ph.D. in Cyber Security from George Mason University. He also holds 100+ reputable certifications including CISSP, CISM, CISA, CEH, CCNP, VCP, ITIL, GCIH, and GSLC.

  • Jay Lambke
  • President, Government Acquisitions
  • Click for Bio

    Jay Lambke, president, brings over 20 years’ experience leading various organizations specializing in the IT needs of the Federal, State, Local, and Education markets. As President, Mr. Lambke is responsible for leveraging his experience and relationships to maneuver Government Acquisitions, Inc. (GAI) through its ongoing operations, providing advisory and strategy support.

    Prior to joining GAI, Mr. Lambke was president of Prism Pointe Technologies and GovConnection. At GovConnection, Mr. Lambke was responsible for turning around the company following the loss of their Federal GSA Schedule and negative earnings. Mr. Lambke has also held executive roles at Gateway, Inc., Ingram Micro, and Tech Data.

  • Brian Peretti
  • Financial Services Critical Infrastructure Program Manager, Office of Critical Infrastructure Protection and Compliance, Department of the Treasury
  • Click for Bio

    Brian J. Peretti is the Director for the Office of Critical Infrastructure Protection and Compliance Policy at the United States Department of the Treasury located in Washington, D.C.

    At the Department of the Treasury, Mr. Peretti supervises the planning, evaluating and implementation of information security, information assurance, and risk management policies related to critical infrastructure protection, cyber security and homeland security. He leads the efforts of the Financial and Banking Information Infrastructure Committee (FBIIC), an interagency organization chartered under the President's Working Group for Financial Markets composed of 18 federal and state financial regulatory agencies.

    He is the relationship manager to the Departments of Homeland Security, Energy, Transportation, Justice, Defense and the Intelligence Community Homeland Security issues. He represents the Treasury on various interagency groups, including Cyber Interagency Planning Committee (Cyber –IPC), the National Cyber Response Coordination Group, and the National CIP R & D draft group. He is the emergency coordinator for the Treasury’s Domestic Finance area where he leads efforts in the areas of business continuity and disaster recovery. He directs the Treasury’s effort to implement a Research and Development agenda, created in coordination with the financial services sector, to address technology issues.

    He has lectured extensively and has authored six books on topics related to financial institutions, including, most recently, co-authoring with Barkley Clark and Mark Hargrave Compliance Guide to Payment Systems: Law and Regulations.

    Prior to joining the Treasury Department, Mr. Peretti was an associate in Shook, Hardy & Bacon’s Corporate Banking and Finance Section in Washington, D.C. Prior to that position, Mr. Peretti was General Counsel for the Wright Patman Congressional Federal Credit Union, which serves the U.S. House of Representatives and associated groups.

    Mr. Peretti received his B.A. from Rider University (cum laude) in 1989 and his J.D. from American University, Washington College of Law (cum laude) in 1992.

  • Michael Theis
  • Chief Counterintelligence Expert and Senior Member, Technical Staff, CERT Insider Threat Center Software Engineering Institute (an FFRDC), Carnegie Mellon University
  • Click for Bio

    Mr. Michael C. Theis (pronounced Tice) uses his 25+ years as a Counterintelligence Supervisory Special Agent supporting the US Intelligence Community along with his 30+ years of concurrent computer systems engineering experience to aid the CERT Insider Threat Center further its research and development of socio-technical controls in Computational Endoparacology (insider threats). He is also a Senior Member of the Technical Staff and the technical lead for the Insider Threat Research Team. Previously, Mr. Theis was the first-ever Cyber-Counterintelligence Program Manager for the National Reconnaissance Office, where he served as the Chief for Cyber-CI investigations and operations for over six years. In 2006, he was named one of the Premier 100 IT Leaders in the nation by COMPUTERWORLD Magazine. Mr. Theis is a frequent keynote speaker at government, private industry, and academic conferences, where he is a recognized thought leader for cyberspace intelligence and security issues. He has also guest lectured at Harvard and MIT on the challenges and opportunities of modeling human behavior in cyberspace.

  • Joseph Demarest
  • Assistant Director, Cyber Division, Federal Bureau of Investigation, Department of Justice
  • Mike Maraya
  • Deputy Chief Information Security Officer, Department of Energy

Additional Resources

Even though the pass-the-hash (PtH) attack was originally published by Paul Ashton in 1997 and several white papers and tech briefs have been written on the topic, these types of attacks have recently come to the forefront again. After providing a quick overview of what a hash is and how PtH attacks work, this paper discusses the mitigation strategies recommended by Microsoft and the National Security Agency (NSA) and explains how two solutions from Dell Software can help your organization implement those mitigations.

Presented By

Sponsored By

In Partnership With

  • Premier Partner:
  • Strategic Partners: