by Joey Alonso | Oct 19, 2019 | Assessments, In-depth Vulnerability Assessments, Insider Threat Program Management, Insider Threats, Intellectual Property Theft Prevention, Privacy, Uncategorized, Vulnerability Assessments
With the number of incidents happening every month of not only highly-trusted but entry-level employees stealing information from their employers, I’m in awe of the lack of “give a dang” decision-makers have when we chat. It’s happening folks, in every industry...
by Joey Alonso | Mar 15, 2017 | Assessments, Behavioral and Psychological Analysis, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Security Awareness, Services, Threats, Vulnerability Assessments
With the number of incidents happening every month of not only highly-trusted but entry-level employees stealing information from their employers, I’m in awe of the lack of “give a dang” decision-makers have when we chat. It’s happening folks, in every industry and...
by Joey Alonso | Dec 12, 2016 | Assessments, Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Interviews, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Security Awareness, Threats, Trusted Business Partners, Vulnerability Assessments
Quortum recently completed an Insider Threat Vulnerability Assessment (ITVA) on Quest Knight Enterprises (QKE), a Leesburg, Virginia-based SBA-certified HUBZone Defense Contractor. Founded in 2009, QKE provides industry and government clients with mission-critical,...
by Joey Alonso | Nov 17, 2016 | Assessments, Assessments, Behavioral and Psychological Analysis, Blog, Cyber Forensics, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Privacy, Security Awareness, Services, Threats, Trusted Business Partners, Vulnerability Assessments, Workplace Violence
I enjoyed this linked article from our friends at Digital Journal, across the pond, and thought I’d share my thoughts on the 3 Organizational Insiders they addressed so well. I spend many days talking about Insider Threats and Economic Espionage with small and...
by Joey Alonso | Oct 21, 2016 | Assessments, Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Privacy, Security Awareness, Services, Threats, Trusted Business Partners, Vulnerability Assessments
At the end of this post is a link to a really good article on the practicality of the requirements imposed on Cleared Defense Contractors to have an Insider Threat Program in-place by November 30, 2016. As the folks in article said, having a program that meets DSS’...
by Joey Alonso | Oct 17, 2016 | Assessments, Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Interviews, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Privacy, Security Awareness, Services, Threats, Trusted Business Partners, Vulnerability Assessments, Workplace Violence
I had the pleasure of “Channeling Security” with Lorna Garey (@lornagarey), tech-writing guru at Channel Partners, recently and had a great opportunity to discuss what many aren’t thinking about when trying to stop Insider Threats. IT’S THE PEOPLE! Quortum partners...