• GCN
  • WT
  • DS

Download this event overview to learn what you missed at FCW Briefing, held during National Cybersecurity Awareness Month, held on October 22nd in Washington, DC.

This overview will update your personal and professional knowledge of the technologies and strategies in use to identify anomalous behaviors, mitigate data loss, and prosecute unauthorized insider activities. Learn how agencies are striking a balance between security, privacy, and mission requirements, and the tools and services they are deploying to improve their overall security postures.

The overview will take an in-depth look on:

  • The impact on agency operations—why to focus cyber protection on the insider threat
  • Common characteristics of insider threat actors—their psychographic profiles, and the damage they can do
  • Finding and thwarting insider threats today—practical insights from experienced professionals
  • Auditing and improving your agency insider threat protection efforts
  • Applying tools and technologies to evaluate access control and anomalous user activities and network traffic
  • Taking action when asynchronous system activity or unauthorized user behavior is identified
  • Establishing and maintaining reliable network and device cyber situational awareness

Featured Speakers:

  • Eric Chiu
  • President & Co-Founder, HyTrust, Inc.
  • Click for Bio

    Eric Chiu is a recognized security technology expert and business leader, currently serving as president and co-founder of HyTrust, the Cloud Security Automation company. He previously served in executive roles at Cemaphore Systems and MailFrontier, and was a Venture Capitalist at Brentwood (now Redpoint) and Pinnacle Ventures. He is a published author and speaks frequently at industry forums internationally.

  • Wesley Ellis
  • Principal Consultant, Professional Services-Federal, Guidance Software, Inc.
  • Click for Bio

    Wesley is an experienced information management professional. Wesley has over 14 years of experience with all phases of the litigation life cycle including assisting the customer with deployment and the use of applications designed for the collection, preservation, processing, review, production, and presentation of ESI. I have also provided customers with guidance on best practices and functionality for the use of its existing technology, Forensic Investigations, acquisition of new technology and provided recommendations for policies to govern the use and support of litigation and cyber security technology.

    Wesley has an understanding of advanced electronic discovery, cyber security and computer forensic practices, procedures and processes (metadata and fielded text extraction, native file to image conversion, OCR conversion with QC and output to document review applications), terabyte size litigation experience, coordination of document review teams and reporting of metrics related thereto, advanced skills in administrative use of local and hosted document review tools, trial presentation experience, multi-media conversion and display of audio/video controls, storage solutions, email systems, application installation, batch file construction using DOS, automated enterprise application deployment tools, Windows registry, mobile device acquisition, excellent project management skills, complex problem solving ability, verbal and written technical and litigation-related communication skills, 508 compliance, QCTC Testing, ability to work under strict deadlines, and the ability to interact with all levels of attorneys, legal and security teams and other support staff as required.

  • Kenneth Johnson
  • Senior Architect, Advanced Programs, Adobe's Public Sector
  • Click for Bio

    Ken Johnson is a Senior Architect with the Advanced Programs group within Adobe's Public Sector division. In this role, he has helped Department of Defense, Civilian, and State and Local government agencies adopt analytics solutions to protect sensitive information, drive public engagement, and improved business process efficiencies. Currently he manages Adobe's Digital Government Collaboration Platform in which cutting edge research technologies and forensic techniques are shared and applied in partnership with Federal Law Enforcement and related agencies.

    Mr. Johnson has over fifteen years of analytics and data management implementation experience focusing on Public Sector customers. He has extensive experience designing and optimizing OLAP system architectures across a range of implementation methodologies ranging from semantic ontologies to columnar databases as well as systems based on i/o optimized hierarchical or star schemas. He has helped build solutions which meet a range of customer requirements including cross-security-domain systems, multi level security databases, anti-money-laundering systems, systems for early detection of insider threat behavior, and solutions which enhance collaboration and organizational information flow.

    He holds a Master's degree in Information Systems Management from Harvard University where his capstone project described an automated solution for detecting fraud in a state government's claims processing system.

  • Patrick Reidy
  • Director of Global IT Security/Chief Information Security Officer, CSC and former Chief Information Security Officer, Federal Bureau of Investigation
  • Click for Bio

    Patrick Reidy leads CSC’s global cybersecurity business and direct strategy, including the development and management of cybersecurity technologies, services and solutions for enterprise and public sector clients. In this role, Mr. Reidy also focuses on industry-specific solutions and the development of cross-offering solutions that combine our Cyber, Big Data and Cloud capabilities to extend our market leadership and drive further innovation.

    Drawing on more than 18 years of public- and private-sector experience and leadership in information assurance and cybersecurity, Mr. Reidy ensures the delivery of next-generation technology solutions to our global clients. He has been involved extensively in the investigation, analysis and mitigation of hundreds of security events, including insider threats and computer intrusion incidents.

    In July 2013, Mr. Reidy joined CSC, serving as director of Global Information Assurance and chief information security officer. Prior to CSC, he was chief information security officer at the Federal Bureau of Investigation (FBI) between 2011 and 2013, and a unit chief between 2008 and 2011. While at the FBI, Mr. Reidy led the development of the FBI’s Information Assurance and Advanced Cyber Adversary Protection programs focused on insider misuse. He also served as principal information security engineer at the MITRE Corp., chief engineer at Trident Data Systems (Veritec Inc.), and InfoSec engineer at Trusted Information Systems.

    Mr. Reidy has a master’s degree in Information Security from Eastern Michigan University and a Master of Science in Strategic Intelligence from the National Intelligence University. He also holds several industry certifications including a CISSP.

  • Michael Theis
  • Chief Counterintelligence Expert and Senior Member, Technical Staff, CERT Insider Threat Center Software Engineering Institute, Carnegie Mellon University
  • Click for Bio

    Mr. Michael C. Theis (pronounced Tice) uses his 25+ years as a Counterintelligence Supervisory Special Agent supporting the US Intelligence Community along with his 30+ years of concurrent computer systems engineering experience to aid the CERT Insider Threat Center further its research and development of socio-technical controls in Computational Endoparacology (insider threats). He is also a Senior Member of the Technical Staff and the technical lead for the Insider Threat Research Team. Previously, Mr. Theis was the first-ever Cyber-Counterintelligence Program Manager for the National Reconnaissance Office, where he served as the Chief for Cyber-CI investigations and operations for over six years. In 2006, he was named one of the Premier 100 IT Leaders in the nation by COMPUTERWORLD Magazine. Mr. Theis is a frequent keynote speaker at government, private industry, and academic conferences, where he is a recognized thought leader for cyberspace intelligence and security issues. He has also guest lectured at Harvard and MIT on the challenges and opportunities of modeling human behavior in cyberspace.

  • James Trainor
  • Deputy Assistant Director, Cyber Division, Federal Bureau of Investigation, Department of Justice
  • Click for Bio

    James C. Trainor, Jr. is a Deputy Assistant Director in the Cyber Division at FBI Headquarters. Mr. Trainor entered the Senior Executive Service (SES) in 2010 and most recently served as the Special Agent in Charge of the Intelligence Division for the FBI in New York.

    Mr. Trainor entered on duty as a Special Agent with the FBI in July 1996. Upon completion of training at the FBI Academy in Quantico, Virginia, he was assigned to the FBI's Chicago Division. While there, he worked on a variety of criminal investigative matters for the first year until his eventual assignment to the Foreign Counterintelligence Squad. During that time, Mr. Trainor received numerous commendations for his outstanding performance in conducting counterintelligence operations.

    In February 2001, Mr. Trainor was promoted to Supervisory Special Agent at FBI Headquarters in Washington, D.C., where he supervised investigations involving espionage and economic espionage. He was reassigned to the New Haven Division in March 2003, where as the supervisor for the Foreign Counterintelligence Squad, he was responsible for all national security investigations conducted in Connecticut.

    Mr. Trainor was named Assistant Special Agent in Charge of the Boston Division in July 2007. In that role, he was responsible for intelligence operations in New Hampshire, Maine, Massachusetts, and Rhode Island.

    Mr. Trainor was born in Washington, D.C. and raised in Massachusetts. He is a graduate of Assumption College in Worcester, Massachusetts; obtained a Masters in Public Administration from the University of Connecticut in Storrs, Connecticut; and is currently pursuing a certification as a Chief Information Security Officer (CISO) from Carnegie Mellon University, Pittsburgh, Pennsylvania. Prior to joining the FBI, he was a military intelligence officer for the U.S. Army.

  • Dan Waddell
  • Director of Government Affairs, (ISC)2
  • Click for Bio

    Mr. Waddell has over 20 years of experience in information technology, information assurance, and cybersecurity, with over 15 of those years in management. He is an experienced cybersecurity program manager and subject-matter expert for multiple disciplines and skill areas including CISO/CSO advisory services, secure cloud computing, privacy, data loss prevention, regulatory compliance, threat and vulnerability assessments, incident response, disaster recovery/business continuity and risk management. He is currently the co-chair of both the (ISC)² North American Advisory Board and the Government Advisory Board for Cyber Security, providing guidance and expertise on pressing information security policies and trends and recommendations regarding (ISC)² professional certification and education programs. Mr. Waddell is also a frequent speaker, contributor and volunteer on several cybersecurity-related initiatives including our Safe and Secure Online program, and is a 2013 (ISC)² President’s Award recipient.

Presented By

Sponsored By