Problem Identification and Investigations
2. The challenges of Insider threat
3. A new threat assessment methodology and a tool
Detecting privilege-abuse attacks
4. State of research down the road
Who & Why?
5. Security Violations
Personal and government IT
6. Poor security practices in unit
How to Detect (Mal proactive)?
What to do?
7. Threat Analysis Algorithms
Each topic is covered in a two-hour meeting for a total of 14 hours.