1 00:00:00,100 --> 00:00:02,235 >>:In today's threat environment, the idea of 2 00:00:02,235 --> 00:00:05,472 separating the insider threat or the cyber threat from the 3 00:00:05,472 --> 00:00:08,641 insurgency threat is impossible to do. 4 00:00:08,641 --> 00:00:12,812 >>:This person is deceiving everybody - to include you. 5 00:00:12,812 --> 00:00:14,714 >>:And what do we always hear afterward? We hear that there 6 00:00:14,714 --> 00:00:17,684 was an indicator. Somebody made an outcry, provided 7 00:00:17,684 --> 00:00:20,320 information to HR or to a supervisor. But that 8 00:00:20,320 --> 00:00:22,422 information was never acted upon. 9 00:00:22,422 --> 00:00:24,257 >>:It was a matter of not bringing them all together. 10 00:00:24,257 --> 00:00:25,091 We all know that. 11 00:00:25,091 --> 00:00:26,793 We talk about connecting the dots. 12 00:00:26,793 --> 00:00:30,330 But we haven't yet had a real conversation 13 00:00:30,330 --> 00:00:32,332 about what that means. 14 00:00:32,332 --> 00:00:35,201 >>:They're paying somebody off to insert a thumb drive, 15 00:00:35,201 --> 00:00:38,405 somebody who actually works there or has normal access. 16 00:00:38,405 --> 00:00:41,007 They're not hacking anything. They're manipulating people, 17 00:00:41,007 --> 00:00:42,942 and they're able to get inside. So once they get on 18 00:00:42,942 --> 00:00:44,711 the network, they're already inside. They're already a 19 00:00:44,711 --> 00:00:46,880 trusted user. So firewall's not going to do anything. 20 00:00:46,880 --> 00:00:48,381 We're already past the firewall. 21 00:00:48,381 --> 00:00:50,950 >>:That's a warning. We would much rather check that out and 22 00:00:50,950 --> 00:00:53,987 have it lead to nothing than not get the call and have an 23 00:00:53,987 --> 00:00:55,188 incident occur. 24 00:00:55,188 --> 00:00:57,791 >>:I've always said that the easiest person to fool is 25 00:00:57,791 --> 00:00:59,659 usually yourself. 26 00:00:59,659 --> 00:01:05,064 (MUSIC)