Edward Snowden provided a clear example of what can happen, even for some of the most security conscious organizations like the NSA, when the insider threat is not taken seriously. Simply put, Snowden was able to collect, extract and disseminate highly classified national security information primarily based on the trust that was provided. Just as with many corporate employees, there is a high sense of trust in which access is granted to some of the company's most valued information assets- including intellectual property, legal and financial files. While the vast majority of employees are loyal and trustworthy, every company still needs to be capable of defending against the potential rogue employee or contractor who is highly motivated and has access to the "crown jewels."
Our panel of experienced specialist will discuss the leading practices that make them vulnerable to the insider threat and emerging solutions that provide proactive monitoring and detection of risky personnel.
Glen E. Day - Ernst & Young America's Information Security Leader for Technology
Glen Day is a Principal in the Advisory Services practice of Ernst & Young LLP and is the America’s Information Security Leader for Technology. He has over twenty years experience consulting with and working in various industries with a focus on security. He assists clients in developing comprehensive approaches for managing and maturing their information security and privacy programs to strategically protect their critical information assets, reduce business risk and address complex compliance mandates.
Chuck Kelly – Staff Manager, Global Cyber Security & Threat Management, Qualcomm
Chuck Kelly joined Qualcomm in 2000 and has held various positions in the global information security and risk management organization during his tenure. Chuck and team are responsible for the global management of threats to systems and information including information asset protection, systems protection, network and systems monitoring, vulnerability management, advanced malware analysis and reverse engineering, threat intelligence and research, application security, counter threat analytics, incident response, investigations, and e-discovery across all of the company's diverse business operations on six continents. Chuck also contributes to related areas such as brand protection, cloud security, identity and access management, mobile device security, product security, physical security, and secure government solutions. Prior to joining Qualcomm, Chuck held various positions in information technology, engineering and systems development at ADC Telecommunications, Scientific Atlanta, and GE Aerospace.
Leslie K. Lambert- Chief Strategy Officer, GuruCul Solutions, LLC
Leslie K. Lambert is the Chief Strategy Officer for GuruCul Solutions, LLC and is responsible for company and product strategy, executive relations, strategic partnerships, as well as chairing the GuruCul Executive Advisory Council. Most recently, Lambert was the CISO for Juniper Networks, with responsibility for information security, IT risk and compliance, including the development and deployment of policies, standards, and procedures. She oversaw Juniper’s security practice of incident management, intrusion detection, the prevention/protection against spam and malware attacks, security awareness, threat vulnerability assessments and mitigation.
Perry Viscounty- Partner, Latham & Watkins LLP
Perry Viscounty is the former Chair of the global Intellectual Property Litigation Practice and the Orange County office's Litigation Department. His practice focuses on intellectual property, advertising, class actions and other complex litigation. He has handled a variety of matters throughout the world including trademark, patent, copyright, trade secret, domain name, right of publicity, unfair competition, false advertising and defamation cases, as well as internet related issues.
Light appetizers and parking will be provided.
When & Where