Services

Access a world-class intelligence capability tailored to your specific needs. Control a multi-million dollar program without the time or expense and solve problems both lasting and acute.

Services Overview

Insider Threat Webinar

Getting Inside Insider Threats: Response and Mitigation. Stopping malicious or simply incompetent insiders from doing damage isn't just an exercise in analyzing where the damage came from. Insider Threats aren’t just malicious employees. They can run the gamut from incompetent to accidental to theft.

Blog

Sean Weppner


Recent Posts

2 min read

Four Priorities for Aligning Your Insider Threat Program

By Sean Weppner on May 6, 2020 1:30:50 PM

Organizations based in the United States continue to deal with considerable intellectual property theft and largely do not address the issue until there is a problem. The ability to effectively monitor for negligent or malicious insider threat activity is largely dependent on four main factors:

Continue Reading
2 min read

Risk and Reward – the Importance of Knowing the Network

By Sean Weppner on Apr 21, 2020 6:17:37 PM

The CISO’s role continues to evolve with the variables that change around them - ranging from the threat landscape, to the board of directors. These directly impact who targets you, who/what those attackers target to get access, and the resources you get to protect the company. But for the CISO, the foundation that everything builds on is their knowledge of the network that they defend.

Topics: gap analysis
Continue Reading
4 min read

Disinformation in the Time of Pandemics

By Sean Weppner on Apr 15, 2020 6:33:21 PM

So here we are, caught in the middle of a pandemic stemming from some failed chiroptera cuisine and aside from all of the normal daily activities, ones which a month and a half ago would have pulled me physically in several different directions and locations, I otherwise find myself at the intersection point of these three things: (1) isolation, (2) reading (in this case, browsing the internet), and (3) lots of thinking. 

Continue Reading
2 min read

M&A should stand for “Mitigate, Not Avoid"

By Sean Weppner on Mar 20, 2020 8:09:36 AM

We’ve all read the horror stories over the past several years - the revelation of prior data breach in a target organization led to a massive decrease in the sale price, the unknown/unmitigated compromise led to a subsequent breach in the acquiring organization and massive PR fallout. It rings true to all of us in the business of cybersecurity, because the story really could be any of us. Moreover, from what I’ve seen, there are two truths to most large organizations:

  1. Bigger = More assets = larger risk surface area
  2. Growth is often achieved (and sustained) through inorganic growth
Continue Reading

Featured