1. Introduction
Problem Identification and Investigations
2. The challenges of Insider threat
3. A new threat assessment methodology and a tool
Research prototype
Detecting privilege-abuse attacks
4. State of research down the road
Who & Why?
Intelligence Analyst
TS/SCI eligibility
Emotional instability
5. Security Violations
Personal and government IT
Behavioral Problems/Assault
6. Poor security practices in unit
How to Detect (Mal proactive)?
What to do?
7. Threat Analysis Algorithms

Each topic is covered in a two-hour meeting for a total of 14 hours.