Event Calendar
Prev MonthPrev Month Next MonthNext Month
2018 March Northeast Chapter Meeting
142 W 57th St
New York, NY 10019
Tuesday, March 27, 2018, 8:30 AM - 12:30 PM EDT
Category: Chapter Meeting





Registration required. Breakfast is included!


Russ Berkoff – Senior Vice President, Cybersecurity, Intelligence, and Investigation Services
Russ is a graduate of the United States Military Academy at West Point, holds Master’s Degrees from Loyola University Maryland, Sellinger School of Business in Finance, and the Naval Postgraduate School in Defense Analysis. He is a graduate of the U.S. Army Command and General Staff College.

  • Overview of current cybersecurity threat landscape, trends and market
  • Executive-level thoughts on Risk Management, Governance, Compliance, and Oversight
  • Transforming investigation activities to cybersecurity functions and Enterprise Resiliency
  • The Nuix product suite and better Cybersecurity

Robert O’Leary - Principal Solutions Consultant, CFCE; DFCP
Retired New Jersey State Police, established the High Technology Crimes Unit. Developed and conducted training Technology Crime and supervised the first New Jersey Statewide Computer Crimes Task Force. He has 25 years of experience in digital evidence examination, electronic crime investigation, incident response and cyber security assessments.


Insider threats are often associated with malicious external actors however, data breaches and leaks are often the result of employee actions. They range from intentionally malicious behavior by employees, carelessness and failure to properly safeguard credentials and critical value data. There are many ways employees can compromise data and cost your company hundreds of thousands of dollars.

Insider threats can result in major security breaches and very costly to remediate. According to a 2017 Insider Threat Report, as high as 75 percent of companies feel that they are vulnerable to insider threats (source)

Insider threats can be very tough to detect and it is hard to distinguish harmful actions from regular work. It is easy for employees to cover their actions. Further, employees who exfiltrate critical value data can obfuscate their actions by editing data, deleting logs and hiding their malicious actions. Detecting malicious actions is not the end of the investigation. Proving the case can be difficult because the employee can claim it was an inadvertent error. It can be very difficult to prove such cases. In this presentation we will explore some of the methods and techniques used by insiders to exfiltrate critical value data from your systems and how to investigate these cases.