Insider Threats (InT): Hindsight and Foresight
08-11, 10:30–11:30 (US/Pacific), Main Stage

Fact vs Fiction: Starting at zero how to approach and handle an InT incident from a real-world use case, and then an overview of how InT is both the same and yet different from a traditional incident.

Foe vs Friend: For the right peas of mind, a primer on using a post-mortem to shift into preparation to proactively manage InT risks, plus how to preclude the usual pitfalls to promote positive reinforcement and minimize paranoia.


Fact vs Fiction: Starting at zero how to approach and handle an InT incident from a real-world use case, and then an overview of how InT is both the same and yet different from a traditional incident.

Foe vs Friend: For the right peas of mind, a primer on using a post-mortem to shift into preparation to proactively manage InT risks, plus how to preclude the usual pitfalls to promote positive reinforcement and minimize paranoia.

Plug started his journey in computer security in 1996 when he discovered a 2600 magazine, eventually leading him to his first LA2600 meeting in 1998. From that point forward, he has been involved in computer security. He is a Sr. Defcon Blue Team Village member and leads detection and observability at a tech company. In his free time, he enjoys building Legos and playing with synthesizers, and when possible, he volunteers his time to computer security events.

This speaker also appears in:
This speaker also appears in: