Insider Threat Prevention Strategy 1 big thing: Design and implement controls to detect the unauthorized access or transfer of data.

649 words, 2.4 minutes read. By Gerard Blokdyk Insider Threat Prevention Strategy 1 big thing: Design and implement controls to detect the unauthorized access or transfer of data. The big picture: Develop, maintain, or oversee the implementation of security technologies with a focus on security operations, incident response, forensics, vulnerability Read more…

Insider Threat Prevention Strategy 1 big thing: Participate in allocation process design sessions to help guide how to implement the process.

720 words, 2.7 minutes read. By Gerard Blokdyk Insider Threat Prevention Strategy 1 big thing: Participate in allocation process design sessions to help guide how to implement the process. The big picture: Align the Insider Threat Program to existing investigative and employee supporting functions/teams to develop the initial program strategy, Read more…

Insider Threat Prevention Strategy 1 big thing: Develop applications in languages including Java, Javascript (Angular and/or React), and similar.

573 words, 2.1 minutes read. By Gerard Blokdyk Insider Threat Prevention Strategy 1 big thing: Develop applications in languages including Java, Javascript (Angular and/or React), and similar. The big picture: Act as servant leaders to the team in ensuring that the highest priority needs of the team are met, impediments Read more…

Insider Threat Prevention Strategy 1 big thing: Maintain project budget updates and reporting, routing of project invoices.

747 words, 2.8 minutes read. By Gerard Blokdyk Insider Threat Prevention Strategy 1 big thing: Maintain project budget updates and reporting, routing of project invoices. The big picture: Coordinate with applicable points of contact from Personnel Security, CI, LE, IA, Inspector General (IG), Human Resources (HR), and other necessary Mission Read more…

Insider Threat Prevention Strategy 1 big thing: Make sure your team is involved in Agile/Scrum methodology.

693 words, 2.6 minutes read. By Gerard Blokdyk Insider Threat Prevention Strategy 1 big thing: Make sure your team is involved in Agile/Scrum methodology. The big picture: Make sure your team supports enterprise architecture, system operations and systems development, with priority, to ensure information security policy, standards and controls are Read more…