SlideShare a Scribd company logo
1 of 16
Insider threat:
tackling cyber security risk from
inside your organisation
14th October, University of Nottingham
Welcome
• Housekeeping
• East Midlands Chamber (Derbys, Notts, Leics)
• Institute of Information Security Professionals (IISP)
• UK Cyber Security Forum
• Programme for the event
East Midlands Chamber
• c4000 members across Derbys, Notts & Leics
–Largest business support organisation in East Midlands
–2nd largest Chamber UK
• A voice for business
• Supporting business
–Events & Networking
–International Trade
–Training & Recruitment
–HR/Legal Advice
East Midlands Chamber
Business Security
• Bringing businesses together to
–help themselves
–share best practice
• Source of Security Advice
• Seminars, Workshops and Conferences
Institute of Information Security Professionals (IISP)
• Professional body for those working in the
cyber security sector
• Individual and company membership
• Offers career progression, access to
resources, events and publications
• East Midlands branch run by Nexor
• Run a series of events – presentations and
networking
UK Cyber Security Forum
• Represents small companies who are
actively working in cyber security across
the UK
• Completely free to join
• Has over 350 members across the
country
• East Midlands branch hosted by Nexor
Programme for tonight
• Welcome and Introduction
• Horizon Digital Economy Research, Sue Jones
• Insider Threat – David Benford, University of Derby &
Blackstage Forensics Limited
• Networking Break
• Insider Threat - case studies from our region:
• Gill Ince, HMRC
• Simon Heron, RedScan
• Restricted Intelligence
Horizon Digital Economy Research
Hostile observations through social media
David Benford, Blackstage Forensics
Gill Ince
(Head of Security, Risk and Information at HMRC)
Simon Heron
(Chief Technical Officer at Redscan)
Restricted Intelligence
Upcoming events
• Official opening of the Cyber Demonstration Centre and
launch of the new Cyber Growth Partnership Exchange,
incorporating the UK Cyber Map
• Thursday 22nd October
• London
• http://nxr.co/UKTI-London
• Cyber Security KTP Networking and Briefing Event
• Thursday 5th November
• Coventry
• http://nxr.co/KTP-Coventry
2016 events for regional cyber security forum
• Thursday 28th January
De Montfort University, Leicester
Internet of Things security
• 20th or 21st April (provisional)
• Mid-July
• Mid-October
Cyber Security conference
14th March 2016
National Space Centre, Leicester
• Exhibition & Conference, featuring:
–Keynote presentations from industry leaders
–Product Showcases
–Training sessions
Insider threat:
tackling cyber security risk from
inside your organisation
14th October, University of Nottingham

More Related Content

What's hot

Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2Denitsa Gospodinova
 
Giving culture a helping hand: National Library of Scotland metadata and digi...
Giving culture a helping hand: National Library of Scotland metadata and digi...Giving culture a helping hand: National Library of Scotland metadata and digi...
Giving culture a helping hand: National Library of Scotland metadata and digi...Gill Hamilton
 
How to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomwareHow to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomwareIISPEastMids
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergNapier University
 
Bb20151019 trusted cloud-rennes-final
Bb20151019 trusted cloud-rennes-finalBb20151019 trusted cloud-rennes-final
Bb20151019 trusted cloud-rennes-finalJanne Järvinen
 
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...TCI Network
 
Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414Stewart Benger
 
KTN funding opportunities & networking events
KTN funding opportunities & networking eventsKTN funding opportunities & networking events
KTN funding opportunities & networking eventsDuncan Purves
 
Rosalie hoskins digital financial sustainability
Rosalie hoskins digital financial sustainabilityRosalie hoskins digital financial sustainability
Rosalie hoskins digital financial sustainabilityTheFuseBox
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Defence and Security Accelerator
 
GDPR and EA - Commissioning a web site
GDPR and EA - Commissioning a web siteGDPR and EA - Commissioning a web site
GDPR and EA - Commissioning a web siteAllen Woods
 
Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)Jaba Gvelebiani
 
Accelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the AcceleratorAccelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the AcceleratorHeather-Fiona Egan
 
Immerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing LondonImmerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing LondonCreative Economy Programme
 
Copy of a presentation given by Professor Sir Nigel Shadbolt
Copy of a presentation given by Professor Sir Nigel Shadbolt Copy of a presentation given by Professor Sir Nigel Shadbolt
Copy of a presentation given by Professor Sir Nigel Shadbolt Ben Proctor
 
Cetis and OER, SLA SIG
Cetis and OER, SLA SIGCetis and OER, SLA SIG
Cetis and OER, SLA SIGLorna Campbell
 
The Data Lab - Open Data for Scotland
The Data Lab - Open Data for Scotland The Data Lab - Open Data for Scotland
The Data Lab - Open Data for Scotland 9903089
 

What's hot (20)

Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2
 
Giving culture a helping hand: National Library of Scotland metadata and digi...
Giving culture a helping hand: National Library of Scotland metadata and digi...Giving culture a helping hand: National Library of Scotland metadata and digi...
Giving culture a helping hand: National Library of Scotland metadata and digi...
 
How to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomwareHow to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomware
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris Berg
 
Workshop 11 - Europe - Niall Kearney
Workshop 11 - Europe - Niall Kearney Workshop 11 - Europe - Niall Kearney
Workshop 11 - Europe - Niall Kearney
 
An overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience CentreAn overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience Centre
 
Bb20151019 trusted cloud-rennes-final
Bb20151019 trusted cloud-rennes-finalBb20151019 trusted cloud-rennes-final
Bb20151019 trusted cloud-rennes-final
 
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
 
Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414
 
KTN funding opportunities & networking events
KTN funding opportunities & networking eventsKTN funding opportunities & networking events
KTN funding opportunities & networking events
 
Rosalie hoskins digital financial sustainability
Rosalie hoskins digital financial sustainabilityRosalie hoskins digital financial sustainability
Rosalie hoskins digital financial sustainability
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
 
GDPR and EA - Commissioning a web site
GDPR and EA - Commissioning a web siteGDPR and EA - Commissioning a web site
GDPR and EA - Commissioning a web site
 
Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)
 
Accelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the AcceleratorAccelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the Accelerator
 
Immerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing LondonImmerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing London
 
Copy of a presentation given by Professor Sir Nigel Shadbolt
Copy of a presentation given by Professor Sir Nigel Shadbolt Copy of a presentation given by Professor Sir Nigel Shadbolt
Copy of a presentation given by Professor Sir Nigel Shadbolt
 
Cetis and OER, SLA SIG
Cetis and OER, SLA SIGCetis and OER, SLA SIG
Cetis and OER, SLA SIG
 
The Data Lab - Open Data for Scotland
The Data Lab - Open Data for Scotland The Data Lab - Open Data for Scotland
The Data Lab - Open Data for Scotland
 
cyber policy in Latvia
cyber policy in Latviacyber policy in Latvia
cyber policy in Latvia
 

Viewers also liked

Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziKashif Semple
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider ThreatLancope, Inc.
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasuresKAMRAN KHALID
 
Malicious Insiders
Malicious InsidersMalicious Insiders
Malicious Insidersgjohansen
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection RecommendationsAlienVault
 
Snowden slides
Snowden slidesSnowden slides
Snowden slidesDavid West
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoMatt Frowert
 

Viewers also liked (11)

Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint Prezi
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
 
Insider threat
Insider threatInsider threat
Insider threat
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 
Malicious Insiders
Malicious InsidersMalicious Insiders
Malicious Insiders
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection Recommendations
 
Snowden slides
Snowden slidesSnowden slides
Snowden slides
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_Tyco
 

Similar to Insider threat event presentation

How to cyber protect your business for free
How to cyber protect your business for freeHow to cyber protect your business for free
How to cyber protect your business for freeCyber Security Partners
 
Cyber security awards
Cyber security awardsCyber security awards
Cyber security awardsKarla Jobling
 
Browne Jacobson LLP Jon Snade - London Tech Week
Browne Jacobson LLP Jon Snade - London Tech WeekBrowne Jacobson LLP Jon Snade - London Tech Week
Browne Jacobson LLP Jon Snade - London Tech WeekBrowne Jacobson LLP
 
Intro to CodeMill digital skills - September 2017
Intro to CodeMill digital skills - September 2017Intro to CodeMill digital skills - September 2017
Intro to CodeMill digital skills - September 2017CodeMill digital skills
 
Io t roadmapping 11-12 july 2012 - welcome pres by tsb v1 maurizio pilu
Io t roadmapping   11-12 july 2012 - welcome pres by tsb v1 maurizio pilu Io t roadmapping   11-12 july 2012 - welcome pres by tsb v1 maurizio pilu
Io t roadmapping 11-12 july 2012 - welcome pres by tsb v1 maurizio pilu grahamhitchen
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016Dale Butler
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceDale Butler
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnettsegughana
 
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...APNIC
 
DASA: FASS 2: Overview of DASA
DASA: FASS 2: Overview of DASADASA: FASS 2: Overview of DASA
DASA: FASS 2: Overview of DASAHeather-Fiona Egan
 
Parallel session: security
Parallel session: securityParallel session: security
Parallel session: securityJisc
 
Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Ray Bugg
 
FCF June 2014 - 04 evolving our forum
  FCF June 2014 - 04   evolving our forum  FCF June 2014 - 04   evolving our forum
FCF June 2014 - 04 evolving our forum#TheFraudTube
 
Cyber Academic Startup Accelerator Programme
Cyber Academic Startup Accelerator ProgrammeCyber Academic Startup Accelerator Programme
Cyber Academic Startup Accelerator ProgrammeDuncan Purves
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Smart Cities: Secure & Ethical by Design - Smart Cities Summit 2018 - Algiers
Smart Cities: Secure & Ethical by Design  - Smart Cities Summit 2018 - AlgiersSmart Cities: Secure & Ethical by Design  - Smart Cities Summit 2018 - Algiers
Smart Cities: Secure & Ethical by Design - Smart Cities Summit 2018 - AlgiersSmart Algiers
 

Similar to Insider threat event presentation (20)

How to cyber protect your business for free
How to cyber protect your business for freeHow to cyber protect your business for free
How to cyber protect your business for free
 
NWCSC March 2022 event.pptx
NWCSC March 2022 event.pptxNWCSC March 2022 event.pptx
NWCSC March 2022 event.pptx
 
NWCSC Manchester region event
NWCSC Manchester region event NWCSC Manchester region event
NWCSC Manchester region event
 
Cyber Security Conference 2017
Cyber Security Conference 2017Cyber Security Conference 2017
Cyber Security Conference 2017
 
Cyber security awards
Cyber security awardsCyber security awards
Cyber security awards
 
Browne Jacobson LLP Jon Snade - London Tech Week
Browne Jacobson LLP Jon Snade - London Tech WeekBrowne Jacobson LLP Jon Snade - London Tech Week
Browne Jacobson LLP Jon Snade - London Tech Week
 
Intro to CodeMill digital skills - September 2017
Intro to CodeMill digital skills - September 2017Intro to CodeMill digital skills - September 2017
Intro to CodeMill digital skills - September 2017
 
Io t roadmapping 11-12 july 2012 - welcome pres by tsb v1 maurizio pilu
Io t roadmapping   11-12 july 2012 - welcome pres by tsb v1 maurizio pilu Io t roadmapping   11-12 july 2012 - welcome pres by tsb v1 maurizio pilu
Io t roadmapping 11-12 july 2012 - welcome pres by tsb v1 maurizio pilu
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
 
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
 
DASA: FASS 2: Overview of DASA
DASA: FASS 2: Overview of DASADASA: FASS 2: Overview of DASA
DASA: FASS 2: Overview of DASA
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Parallel session: security
Parallel session: securityParallel session: security
Parallel session: security
 
Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Digital Energy 2018 Day 2
Digital Energy 2018 Day 2
 
FCF June 2014 - 04 evolving our forum
  FCF June 2014 - 04   evolving our forum  FCF June 2014 - 04   evolving our forum
FCF June 2014 - 04 evolving our forum
 
Cyber Academic Startup Accelerator Programme
Cyber Academic Startup Accelerator ProgrammeCyber Academic Startup Accelerator Programme
Cyber Academic Startup Accelerator Programme
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Smart Cities: Secure & Ethical by Design - Smart Cities Summit 2018 - Algiers
Smart Cities: Secure & Ethical by Design  - Smart Cities Summit 2018 - AlgiersSmart Cities: Secure & Ethical by Design  - Smart Cities Summit 2018 - Algiers
Smart Cities: Secure & Ethical by Design - Smart Cities Summit 2018 - Algiers
 

More from IISPEastMids

Ransomware - Mark Chimely
Ransomware - Mark ChimelyRansomware - Mark Chimely
Ransomware - Mark ChimelyIISPEastMids
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...IISPEastMids
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...IISPEastMids
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways IISPEastMids
 
Qonex - Securing the IoT
Qonex - Securing the IoTQonex - Securing the IoT
Qonex - Securing the IoTIISPEastMids
 
Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything IISPEastMids
 
Econocom - identifying funding for success
Econocom - identifying funding for successEconocom - identifying funding for success
Econocom - identifying funding for successIISPEastMids
 
Redscan - Insider threat case study
Redscan - Insider threat case studyRedscan - Insider threat case study
Redscan - Insider threat case studyIISPEastMids
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesIISPEastMids
 
Managing and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspectiveManaging and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspectiveIISPEastMids
 
IISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentationIISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentationIISPEastMids
 

More from IISPEastMids (11)

Ransomware - Mark Chimely
Ransomware - Mark ChimelyRansomware - Mark Chimely
Ransomware - Mark Chimely
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
 
Qonex - Securing the IoT
Qonex - Securing the IoTQonex - Securing the IoT
Qonex - Securing the IoT
 
Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything
 
Econocom - identifying funding for success
Econocom - identifying funding for successEconocom - identifying funding for success
Econocom - identifying funding for success
 
Redscan - Insider threat case study
Redscan - Insider threat case studyRedscan - Insider threat case study
Redscan - Insider threat case study
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
Managing and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspectiveManaging and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspective
 
IISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentationIISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentation
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

Insider threat event presentation

  • 1. Insider threat: tackling cyber security risk from inside your organisation 14th October, University of Nottingham
  • 2. Welcome • Housekeeping • East Midlands Chamber (Derbys, Notts, Leics) • Institute of Information Security Professionals (IISP) • UK Cyber Security Forum • Programme for the event
  • 3. East Midlands Chamber • c4000 members across Derbys, Notts & Leics –Largest business support organisation in East Midlands –2nd largest Chamber UK • A voice for business • Supporting business –Events & Networking –International Trade –Training & Recruitment –HR/Legal Advice
  • 4. East Midlands Chamber Business Security • Bringing businesses together to –help themselves –share best practice • Source of Security Advice • Seminars, Workshops and Conferences
  • 5. Institute of Information Security Professionals (IISP) • Professional body for those working in the cyber security sector • Individual and company membership • Offers career progression, access to resources, events and publications • East Midlands branch run by Nexor • Run a series of events – presentations and networking
  • 6. UK Cyber Security Forum • Represents small companies who are actively working in cyber security across the UK • Completely free to join • Has over 350 members across the country • East Midlands branch hosted by Nexor
  • 7. Programme for tonight • Welcome and Introduction • Horizon Digital Economy Research, Sue Jones • Insider Threat – David Benford, University of Derby & Blackstage Forensics Limited • Networking Break • Insider Threat - case studies from our region: • Gill Ince, HMRC • Simon Heron, RedScan • Restricted Intelligence
  • 9. Hostile observations through social media David Benford, Blackstage Forensics
  • 10. Gill Ince (Head of Security, Risk and Information at HMRC)
  • 11. Simon Heron (Chief Technical Officer at Redscan)
  • 13. Upcoming events • Official opening of the Cyber Demonstration Centre and launch of the new Cyber Growth Partnership Exchange, incorporating the UK Cyber Map • Thursday 22nd October • London • http://nxr.co/UKTI-London • Cyber Security KTP Networking and Briefing Event • Thursday 5th November • Coventry • http://nxr.co/KTP-Coventry
  • 14. 2016 events for regional cyber security forum • Thursday 28th January De Montfort University, Leicester Internet of Things security • 20th or 21st April (provisional) • Mid-July • Mid-October
  • 15. Cyber Security conference 14th March 2016 National Space Centre, Leicester • Exhibition & Conference, featuring: –Keynote presentations from industry leaders –Product Showcases –Training sessions
  • 16. Insider threat: tackling cyber security risk from inside your organisation 14th October, University of Nottingham