Detecting the Threat from Within
Join us for "Detecting the Threat from Within" where we'll explore an in-depth approach to Insider Threat.
Date and time
Location
2701 N Rocky Point Dr
2701 North Rocky Point Drive Suite 700 Tampa, FL 33607Agenda
3:00 PM - 3:30 PM
Welcome & Meet-and-Greet
3:30 PM - 4:00 PM
Guest Speaker: FBI Special Agent
4:00 PM - 6:00 PM
"Detect, Deter, Defeat" Insider Threat Presentation
6:00 PM - 6:30 PM
Q&A with the Expert
6:30 PM - 7:00 PM
Networking Reception
About this event
- Event lasts 4 hours
- Free venue parking
Detecting the Threat from Within!
Hosted by Quiet Professionals LLC
📅 Tuesday, June 24, 2025 | 🕒 3:00 PM – 7:00 PM EDT
📍 2701 N Rocky Point Drive, Suite 700, Tampa, FL 33607
Free onsite parking available
About the Event
Insider threats remain one of the most significant and overlooked risks to organizational security. Join Quiet Professionals LLC for an engaging and informative afternoon as we explore the critical challenge of identifying, mitigating, and preventing threats from within.
Designed for security professionals, HR leaders, IT managers, compliance officers, and organizational decision-makers, this event will provide practical tools and insights to strengthen your insider threat posture.
What to Expect:
- Expert Keynote: Hear from a Special Agent from the FBI, Charles (C.T.) McGuinness, with decades of experience in counterintelligence and insider threat mitigation.
- Interactive Presentation: Dive into the "Detect, Deter, Defeat" framework—a proven approach to managing insider risks.
- Networking & Collaboration: Connect with peers and professionals across sectors committed to building safer organizations.
Event Agenda
🕒 3:00 PM – 3:30 PM | Welcome & Meet-and-Greet
🕒 3:30 PM – 4:00 PM | Guest Speaker: FBI Special Agent
🕒 4:00 PM – 6:00 PM | "Detect, Deter, Defeat" Insider Threat Presentation
🕒 6:00 PM – 6:30 PM | Q&A with the Expert
🕒 6:30 PM – 7:00 PM | Networking Reception
Why Attend?
This event offers a rare opportunity to gain first-hand insights from federal experts, collaborate with peers, and walk away with actionable strategies to protect your organization. Whether you’re building a new program or enhancing an existing one, this event will deliver value you can apply immediately.
Reserve your seat now – space is limited!
Frequently asked questions
Insider threat in the corporate landscape refers to a risk posed by individuals within an organization who have authorized access to systems, data, or facilities and intentionally or unintentionally misuse that access to harm the organization.
Malicious Insiders: Corporate espionage, IP theft Negligent Insiders: Phishing attempts, misconfiguring systems, mishandling sensitive information Compromised Insiders: Through malware or social engineering
- Data exfiltration (e.g., customer lists, trade secrets) - Unauthorized access to restricted files or systems - Privilege abuse - Bypassing security protocols - Sabotage of systems, processes, or equipment
- Insiders typically bypass perimeter security. - They often have detailed knowledge of systems and processes. - Their actions are harder to detect using traditional external threat monitoring.
- Intellectual property theft - Financial loss - Reputational damage - Regulatory fines and compliance violations - Loss of competitive advantage
Insider threat programs combining technical monitoring, behavioral analytics, and cross-functional governance. Strict access control and least privilege policies. Clear reporting channels and support for whistleblowing. Robust data loss prevention (DLP) and identity monitoring tools.