NITSIG INSIDER THREAT AWARENESS-RESOURCE GUIDE

By Jim Henderson | Produced By: National Insider Threat SIG

Snowden's ex-boss offers tips on stopping insider threats

Steven Bay, a former defense contractor, knows a thing or two about insider threats. For a brief period, he was the boss of Edward Snowden, the …

Insider threat health data breaches doubled in February, Protenus says

The number of healthcare security breaches caused by insiders doubled from January to February, according to the latest Protenus Breach …

Data Breach

IT admin sued by ex-employer for alleged malicious insider data theft

One IT administrator is being sued by a former employer for allegedly accessing the company's networks in his new job to gain some kind of …

Cybersecurity

Face it: Navy's 7th Fleet scandal is malignant

The Justice Department’s latest press release doesn’t do justice to what has occurred in the now-infamous “Fat Leonard” Francis case. But DoJ …

Corruption

NATIONAL INSIDER THREAT SPECIAL INTEREST GROUP

<b>INSIDER THREAT RISK MITIGATION VENDORS INSIDER THREAT NEWS - REPORTS</b><p><b>The Silent And Damaging Threat From Within - The Insider Threat</b><p><b>Why Are</b> …

Cybersecurity

INSIDER THREAT PROGRAM DEVELOPMENT TRAINING - INSIDER THREAT RISK ASSESSMENT & MITIGATION SERVICES

<b>Insider Threat Defense Trademark Notice</b><p>Insider Threat Risk Mitigation Experts<p>Welcome To Insider Threat Defense <b>™</b><p>Insider Threat Defense has become the …

NISPOM CONFORMING CHANGE 2 TRAINING - INSIDER THREAT PROGRAM

NCMS<p>Associate Member<p><b>Insider Threat Defense</b><p><b>Trademark Notice</b><p>NISPOM Conforming Change 2 Training<p>Insider Threat Program Development<p>Welcome To Insider …

Cybersecurity

US military leak exposes 'holy grail' of security clearance files

Exclusive: These security clearance applications contain sensitive personal information, and are highly valuable to foreign adversaries seeking to …

Security

I Ran Intel at the Pentagon. Here’s My Advice on Insider Threats

After last week’s posting by WikiLeaks of <b></b>thousands of pages of information purported to describe cyber intelligence-gathering tools, I have been …

Security

Plot thickens in probe of House IT contractors

A criminal investigation into IT contractors employed by dozens of House Democrats is sparking broader concerns about continuing access to sensitive government emails, amid new allegations of illicit activity beyond Capitol Hill.<p>The investigation was announced last month by the U.S. Capitol Police …

Corruption

Former NGA Employee Sentenced for Taking Classified Information

Mohan L. Nirala, 52, of Laurel, Maryland, was sentenced today to 12 months and one day in prison for willful retention of national defense …

INSIDER THREAT TRAINING ACADEMY - INSIDER THREAT RISK MITIGATION WEB BASED TRAINING

Insider Threat Training Academy <b>™</b><p>Insider Threat Defense (ITD) and the Insider Threat Management Group (ITMG) are excited to announce the Insider …

$60 Million Fraud Case Involves Hospice Patients' EHRs

<b>DOJ Alleges Records Falsified for Over-Billing</b><br>Federal prosecutors have filed criminal charges against 16 individuals who were allegedly part of a $60 …

Fraud

WikiLeaks Releases Trove of Alleged C.I.A. Hacking Documents

WASHINGTON — WikiLeaks on Tuesday released thousands of documents that it said described sophisticated software tools used by the Central Intelligence Agency to break into smart phones, computers and even Internet-connected televisions.<p>If the documents are authentic, as appeared likely at first …

WikiLeaks

Tweets & Facebook posts: Must your business save them?

Having archives of social media postings could help avoid legal trouble. But many employers think of social media as an online whiteboard, not as a …

Social Media Marketing

Verizon: Most Breaches Trace to Phishing, Social Engineering

With Verizon's data breach investigations team finding that 90 percent of breaches trace to a phishing or other social engineering attack, lead …

Data Breach

Mistakes managers make when conducting interviews

When managers conduct job interviews, they walk a fine line. They have to be polite, assertive and aware of illegal questions. Here are the five most …

Small Business

Zynga Accuses Former Employees Of Trade Secret Theft

Pfizer Sues Ex-Marketing Director Over Trade Secret Theft

Pfizer Inc. on Tuesday accused a former global marketing director who voluntarily resigned in January of misappropriating the company’s trade …

Pfizer

Dollar General arsonist sentenced to 4 to 12 years in state prison

Lisa Demar had pleaded guilty to second degree arson

Crime

Fully 84 Percent of Hackers Leverage Social Engineering in Cyber Attacks

A recent Nuix survey of 70 hackers at DEFCON 2016 found that 84 percent of respondents use social engineering as part of their attack strategy, and …

Cybersecurity

NCI controller accused of embezzling $18M over six years

COMPANIES<p>NCI Inc. has accused its controller of embezzling approximately $18 million over the last six years and has fired him.<p>The controller, who …

21st Century

Chief Security Officers Reveal True Cost of Breaches And The Actions That Organizations Are Taking

On 10th anniversary of report, classic attack vectors re-emerge; Cisco reduces "Time to Detection" to six hours<p>SAN JOSE, CA-- (Marketwired) --01/31/17-- According to theCisco®(NASDAQ: CSCO) 2017 Annual Cybersecurity Report (ACR), over one-third of organizations that experienced a breach in 2016 …

Cybersecurity

Spicer checks WH staffers' phones for leaks, vows more searches coming

As the Trump administration hunts for the source of a series of politically embarrassing leaks that have plagued the young administration, dozens of White House staffers have had their phones searched in what is being termed “recess” compared to what may be planned, two top administration officials …

Government

ESRCheck.com

Online Safe Hiring Certification Course<p><b>The Updated ESR Online Safe Hiring Certification Training Course is Available!</b><p>The Employment Screening …

Employment

Taking Threats Seriously: Establishing a Threat Assessment Team

<i>A client stares directly at a staff member and with alarming serenity says, "If you do that, I'll kill you." How should you respond? An employee</i> …

The Workplace

Email Compromises, Phishing Top Insider Threats

<b>Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses</b> …

2016 Top Security Threats and Management Issues Facing Corporate America survey

​Securitas Security Services USA, Inc. has released its 2016 <i>Top Security Threats and Management Issues Facing</i> <i>Corporate America</i> survey, which draws on …

Cybersecurity

Ex-Goldman Coder's Theft Conviction Reinstated

A New York appeals court reinstated the guilty verdict against former Goldman Sachs Group Inc. programmer Sergey Aleynikov, finding Tuesday that …

Wall Street