Protecting the confidentiality of information is a critical security task. While relatively easy to defend against insiders lacking access to certain intellectual property (IP), it is often the very employees who create the IP that are most likely to steal it. In this session, we look at analytic techniques effective at protecting information from those who already have legitimate access to it.
- Understand overlooked need to protect IP from those who create it or legitimately interact with it
- Provide a practical framework for choosing between various monitoring strategies and data sources
- Learn how to construct a defensive perimeter to effectively detect precursors to actual data theft
Dr. Richard Ford
Ford has over 25 years’ experience in computer security, having worked with both offensive and defensive technology solutions. During his career, Ford has held positions with Virus Bulletin, IBM Research, Command Software Systems, and NTT Verio. In addition to work in the private sector, he has also worked in academia, having held an endowed chair in Computer Security, and worked as Head of the Computer Sciences and Cybersecurity Department at the Florida Institute of Technology. Under his leadership, the University was designated a National Center of Academic Excellence in Cybersecurity Research by the DHS and NSA. He has published numerous papers and holds several patents in the security area.
Ford holds a Bachelor’s, Master’s and D.Phil. in Physics from the University of Oxford. In addition to his work, he is an accomplished jazz flutist and Instrument Rated Pilot.