%3CLINGO-SUB%20id%3D%22lingo-sub-1726690%22%20slang%3D%22en-US%22%3EWelcome%20to%20our%20podcast%20series%20on%20Uncovering%20Hidden%20Risks!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1726690%22%20slang%3D%22en-US%22%3E%3CP%3EWhile%20organizations%20have%20long%20prioritized%20external%20cybersecurity%20risks%2C%20many%20have%20not%20paid%20enough%20attention%20to%20the%20risks%20posed%20by%20trusted%20insiders%20in%20their%20organization.%20This%20is%20a%20mistake.%20Insiders%20often%20already%20have%20access%20to%20sensitive%20data%2C%20and%20the%20risks%2C%20whether%20malicious%20or%20inadvertent%2C%20can%20potentially%20cause%20greater%20damage%20than%20external%20cybersecurity%20risks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETwo%20years%20ago%2C%20after%20a%20conversation%20with%20our%20Chief%20Information%20Security%20Officer%20(CISO)%2C%20Bret%20Arsenault%2C%20we%20embarked%20upon%20an%20incredible%20journey%20developing%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Finsiderriskblog%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EInsider%20Risk%20Management%3C%2FA%3E%20in%20Microsoft%20365%2C%20which%20organizations%20could%20use%20to%20identify%20and%20manage%20insider%20risks.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThroughout%20our%20journey%20we%20had%20the%20opportunity%20to%20speak%20to%20individuals%20in%20different%20disciplines%20within%20organizations%20across%20a%20variety%20of%20industries.%20These%20conversations%20helped%20shape%20our%20solution%20to%20address%20the%20needs%20of%20an%20organization%20to%20collaboratively%20identify%20and%20manage%20insider%20risks%2C%20while%20maintaining%20employee%20privacy%20and%20supporting%20a%20positive%20company%20culture.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EToday%2C%20we%20invite%20you%20to%20come%20along%20on%20our%20journey%20by%20listening%20to%20Uncovering%20Hidden%20Risks%2C%20a%20series%20of%20podcasts%20with%20top%20notch%20insider%20risk%20experts!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThese%20experts%20have%20a%20unique%20and%20deep%20understanding%20of%20insider%20risks%2C%20the%20challenges%20organizations%20face%2C%20and%20the%20people%2C%20processes%20and%20technology%20being%20used%20to%20address%20them.%20We%20are%20excited%20to%20have%20you%20listen%20in%20to%20our%20conversations%20as%20we%20discuss%20a%20range%20of%20interesting%20topics%2C%20ranging%20from%20hunting%20for%20risks%20using%20artificial%20intelligence%20to%20collaborating%20with%20HR%20and%20legal%20to%20build%20an%20effective%20insider%20risk%20management%20program.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3C%2FP%3E%3CDIV%20class%3D%22video-embed-center%20video-embed%22%3E%3CIFRAME%20class%3D%22embedly-embed%22%20src%3D%22https%3A%2F%2Fcdn.embedly.com%2Fwidgets%2Fmedia.html%3Fsrc%3Dhttps%253A%252F%252Fwww.youtube.com%252Fembed%252FZdTz_MG3JrM%253Ffeature%253Doembed%26amp%3Bdisplay_name%3DYouTube%26amp%3Burl%3Dhttps%253A%252F%252Fwww.youtube.com%252Fwatch%253Fv%253DZdTz_MG3JrM%26amp%3Bimage%3Dhttps%253A%252F%252Fi.ytimg.com%252Fvi%252FZdTz_MG3JrM%252Fhqdefault.jpg%26amp%3Bkey%3Db0d40caa4f094c68be7c29880b16f56e%26amp%3Btype%3Dtext%252Fhtml%26amp%3Bschema%3Dyoutube%22%20width%3D%22400%22%20height%3D%22225%22%20scrolling%3D%22no%22%20title%3D%22YouTube%20embed%22%20frameborder%3D%220%22%20allow%3D%22autoplay%3B%20fullscreen%22%20allowfullscreen%3D%22true%22%3E%3C%2FIFRAME%3E%3C%2FDIV%3E%3CP%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EGet%20ready%20to%20hear%20some%20great%20stories%2C%20gain%20a%20better%20understanding%20of%20insider%20risks%20and%20in%20the%20process%20learn%20something%20new.%26nbsp%3B%20Listen%20to%20our%20show%20on%20the%20following%20platforms%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Funcoveringhiddenrisks.libsyn.com%252F%26amp%3Bdata%3D02%257C01%257CANNA.MONTALAT%2540microsoft.com%257Cab979b9e85c44b6acdbd08d85e6794c5%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637363146269030014%26amp%3Bsdata%3D4zU4KP9gT2miFGXi%252Fa%252FHFIuVKe4G0EU7e%252FkCGU9aHXY%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMain%20show%26nbsp%3Bpage%3C%2FA%3E%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fpodcasts.apple.com%252Fus%252Fpodcast%252Funcovering-hidden-risks%252Fid1532691547%26amp%3Bdata%3D02%257C01%257CANNA.MONTALAT%2540microsoft.com%257Cab979b9e85c44b6acdbd08d85e6794c5%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637363146269035005%26amp%3Bsdata%3DGs5H7lkNeKXtueKRuo%252B4alSvTIiqFGaSnED0jXyzBNc%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EApple%20Podcast%3C%2FA%3E%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fpodcasts.google.com%2Ffeed%2FaHR0cHM6Ly91bmNvdmVyaW5naGlkZGVucmlza3MubGlic3luLmNvbS9yc3M%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EGoogle%3C%2FA%3E%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fopen.spotify.com%2Fshow%2F4la3KQdaaJWbHbV51Xi5rA%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESpotify%3C%2FA%3E%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttp%253A%252F%252Fsyncup.mpsn.libsynpro.com%252Frss%26amp%3Bdata%3D02%257C01%257Cankirti%2540microsoft.com%257Cfb66eb35b1104c16586208d732f820a3%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637033913650599752%26amp%3Bsdata%3DRfBoCTan94gkRtU5aoBgYjSdc4Z1HDXmiKQnlDw9%252Bys%253D%26amp%3Breserved%3D0%2522%2520%5C%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ERSS%3C%2FA%3E%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.stitcher.com%252Fpodcast%252Funcovering-hidden-risks%26amp%3Bdata%3D02%257C01%257CANNA.MONTALAT%2540microsoft.com%257Cab979b9e85c44b6acdbd08d85e6794c5%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637363146269049978%26amp%3Bsdata%3DSbgMXZVOGWX98Eub91l07ls0GaSLniIRRUD8rTh3u5I%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EStitcher%3C%2FA%3E%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fradiopublic.com%252Funcovering-hidden-risks-WPZlA7%26amp%3Bdata%3D02%257C01%257CANNA.MONTALAT%2540microsoft.com%257Cab979b9e85c44b6acdbd08d85e6794c5%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637363146269054969%26amp%3Bsdata%3DqPHT6YyxcSFS53Eil%252FyX9VwE%252FHue5LQHOtMp7vCBAo0%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ERadio%20Public%3C%2FA%3E%26nbsp%3B%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EIf%20you%20like%20what%20you%20hear%2C%20we%E2%80%99d%20love%20for%20you%20to%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fpodcasts.apple.com%252Fus%252Fpodcast%252Funcovering-hidden-risks%252Fid1532691547%26amp%3Bdata%3D02%257C01%257CANNA.MONTALAT%2540microsoft.com%257Cab979b9e85c44b6acdbd08d85e6794c5%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637363146269035005%26amp%3Bsdata%3DGs5H7lkNeKXtueKRuo%252B4alSvTIiqFGaSnED0jXyzBNc%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESubscribe%2C%20Rate%20and%20Review%20it%20on%20iTunes%3C%2FA%3E%26nbsp%3Bor%20any%20other%20podcast%20platform%20you%20may%20use.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20look%20forward%20to%20hearing%20from%20you!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThank%20you%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERaman%20Kalyan%20and%20Talhah%20Mir%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMeet%20our%20guests%26nbsp%3Band%20join%20us%26nbsp%3Bfor%20the%26nbsp%3Bdiscussion!%3C%2FSTRONG%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fin%2Fdawn-cappelli-cissp-a329505%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3EDawn%20Cappelli%3C%2FSTRONG%3E%3C%2FA%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EVP%20of%20Global%20Security%20and%20CISO%20at%20Rockwell%20Automation%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFounder%20of%20CERT%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EDawn%20is%20recognized%20as%20one%20of%20the%20world's%20leaders%20in%20insider%20threat%20mitigation.%20She%20has%20been%20working%20on%20the%20insider%20threat%20problem%20for%20three%20decades%20in%20various%20roles%20partnering%20closely%20with%20the%20Department%20of%20Defense%2C%20the%20Department%20of%20Homeland%20Security%2C%20the%20U.S.%20Secret%20Service%2C%20other%20federal%20agencies%2C%20the%20intelligence%20community%2C%20private%20industry%2C%20academia%2C%20and%20the%20vendor%20community.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Finsights.sei.cmu.edu%2Fauthor%2Fdaniel-costa%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3EDan%20Costa%3C%2FSTRONG%3E%3C%2FA%3E%3CSTRONG%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%3C%2FSTRONG%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETechnical%20Manager%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECERT%20National%20Insider%20Threat%20Center%2C%20Carnegie%20Mellon%26nbsp%3BUniversity%E2%80%99s%20Software%20Engineering%20Institute%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EDan%20leads%20the%20research%20and%20engineering%20efforts%20of%20the%20CERT%20National%20Insider%20Threat%20Center%2C%20where%20he%20and%20his%20team%20conduct%20empirical%20research%20and%20develop%20solutions%20that%20enable%20organizations%20to%20effectively%20manage%20insider%20risks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fin%2Frobert-mccann-004b407%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3ERob%20McCann%3C%2FSTRONG%3E%3C%2FA%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EPrincipal%26nbsp%3BApplied%20Researcher%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERob%20has%20over%2014%20years'%20experience%20professional%20experience%20in%20cybersecurity%20and%20software%20engineering%20and%20we%20talk%20about%20how%26nbsp%3Bnew%20advances%20in%20artificial%20intelligence%20and%20machine%20learning%20take%20on%20the%20challenge%20of%20hunting%20for%20insider%20risks.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EEpisode%201%2C%26nbsp%3B%E2%80%9CArtificial%20intelligence%20hunts%20for%20insider%20risks%E2%80%9D%3C%2FSTRONG%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20this%20podcast%20we%20have%20a%20wide-ranging%20discussion%20with%26nbsp%3B%3CSTRONG%3ERob%20McCann%3C%2FSTRONG%3E%2C%26nbsp%3B%3CSTRONG%3EPrincipal%20Applied%20Researcher%3C%2FSTRONG%3E%26nbsp%3Bat%3CSTRONG%3E%26nbsp%3BMicrosoft.%26nbsp%3B%20%3C%2FSTRONG%3ESpecifically%2C%20about%20how%20the%20power%20of%20machine%20learning%20and%26nbsp%3B%3CSTRONG%3Eartificial%20intelligence%20can%20uncover%20hidden%20risks%3C%2FSTRONG%3E%26nbsp%3Bthat%20would%20otherwise%20be%20impossible%20to%20find.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EEpisode%202%2C%20%E2%80%9CPredicting%20your%20next%20insider%20risks%E2%80%9D%3C%2FSTRONG%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20this%20podcast%26nbsp%3Bspeak%20with%26nbsp%3B%3CSTRONG%3EDan%20Costa%3C%2FSTRONG%3E%2C%26nbsp%3B%3CSTRONG%3ETechnical%20Manager%26nbsp%3B%3C%2FSTRONG%3Eof%20the%3CSTRONG%3E%26nbsp%3BCERT%20National%20Insider%20Threat%20Center%26nbsp%3B%3C%2FSTRONG%3Eat%20Carnegie%20Mellon%20University%E2%80%99s%20Software%20Engineering%20Institute.%20We%20discuss%20the%26nbsp%3B%3CSTRONG%3Echallenges%20of%20addressing%20insider%20threats%3C%2FSTRONG%3E%26nbsp%3Band%26nbsp%3Bhow%20organizations%20can%20improve%20their%20security%26nbsp%3Bposture%20by%20understanding%20the%20conditions%20and%20triggers%20that%20precede%20a%20potentially%20harmful%20act.%20We%20also%20explore%2C%20how%26nbsp%3B%3CSTRONG%3Etechnological%20advances%26nbsp%3B%3C%2FSTRONG%3Ein%20prevention%20and%20detection%26nbsp%3Bcan%26nbsp%3B%3CSTRONG%3Ehelp%20organizations%20stay%20safe%3C%2FSTRONG%3E%26nbsp%3Band%20steps%20ahead%20of%20threats%20from%20trusted%20insiders.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EEpisode%203%2C%26nbsp%3B%E2%80%9CInsider%20risks%20aren%E2%80%99t%20just%20a%20security%20problem%E2%80%9D%3C%2FSTRONG%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20are%20back%20with%20Dan%20Costa%20to%26nbsp%3Bexplore%26nbsp%3B%3CSTRONG%3Ehow%20partnering%20with%20Human%20Resources%26nbsp%3B%3C%2FSTRONG%3Ecan%20create%20a%3CSTRONG%3E%26nbsp%3Bstrong%20insider%20risk%20management%20program%3C%2FSTRONG%3E%2C%20a%26nbsp%3B%3CSTRONG%3Ebetter%20workplace%3C%2FSTRONG%3E%26nbsp%3Band%26nbsp%3B%3CSTRONG%3Emore%20secure%20organization.%3C%2FSTRONG%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EEpisode%204%2C%26nbsp%3B%E2%80%9CInsider%20risk%20programs%20have%20come%20a%20long%20way%E2%80%9D%3C%2FSTRONG%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20this%20podcast%20speak%20with%26nbsp%3B%3CSTRONG%3EDawn%20Cappelli%3C%2FSTRONG%3E%2C%26nbsp%3B%3CSTRONG%3EVP%20of%20Global%20Security%20and%20CISO%26nbsp%3Bat%26nbsp%3BRockwell%20Automation%26nbsp%3Band%20founder%26nbsp%3Bof%26nbsp%3BCERT.%26nbsp%3B%20%3C%2FSTRONG%3EWe%20discuss%20the%20role%20of%26nbsp%3B%3CSTRONG%3Etechnology%2C%20psychology%2C%20people%2C%20and%20cross-organizational%20collaboration%3C%2FSTRONG%3E%26nbsp%3Bto%20drive%20an%20effective%20insider%20risk%20program%20today%20and%20things%20to%20consider%20as%20we%26nbsp%3B%3CSTRONG%3Elook%20ahead%20and%20across%20an%20ever-changing%20risk%20landscape.%3C%2FSTRONG%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EEpisode%205%2C%26nbsp%3B%E2%80%9CPractitioners%20guide%20to%20effectively%20managing%20insider%20risks%E2%80%9D%3C%2FSTRONG%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%26nbsp%3Bare%20back%20with%20Dawn%20Cappelli%26nbsp%3Bto%20discuss%20about%26nbsp%3B%3CSTRONG%3Ethe%26nbsp%3Bsteps%20to%20take%20to%20set%20up%20and%20run%20an%20insider%20risk%20management%20program.%26nbsp%3B%3C%2FSTRONG%3E%26nbsp%3BWe%20talk%20about%20specific%20organizations%20to%20collaborate%20with%2C%20and%20top%20risks%20to%20address%20first.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1726690%22%20slang%3D%22en-US%22%3E%3CP%3EListen%20to%20Uncovering%20Hidden%20Risks%2C%20a%20series%20of%20podcasts%20with%20top%20notch%20insider%20risk%20experts!%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhile%20organizations%20have%20long%20prioritized%20external%20cybersecurity%20risks%2C%20many%20have%20not%20paid%20enough%20attention%20to%20the%20risks%20posed%20by%20trusted%20insiders%20in%20their%20organization.%20This%20is%20a%20mistake.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EGet%20ready%20to%20hear%20some%20great%20stories%2C%20gain%20a%20better%20understanding%20of%20insider%20risks%20and%20in%20the%20process%20learn%20something%20new.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1726690%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EInsider%20Risk%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

While organizations have long prioritized external cybersecurity risks, many have not paid enough attention to the risks posed by trusted insiders in their organization. This is a mistake. Insiders often already have access to sensitive data, and the risks, whether malicious or inadvertent, can potentially cause greater damage than external cybersecurity risks.

 

Two years ago, after a conversation with our Chief Information Security Officer (CISO), Bret Arsenault, we embarked upon an incredible journey developing Insider Risk Management in Microsoft 365, which organizations could use to identify and manage insider risks. 

 

Throughout our journey we had the opportunity to speak to individuals in different disciplines within organizations across a variety of industries. These conversations helped shape our solution to address the needs of an organization to collaboratively identify and manage insider risks, while maintaining employee privacy and supporting a positive company culture.

 

Today, we invite you to come along on our journey by listening to Uncovering Hidden Risks, a series of podcasts with top notch insider risk experts!

 

These experts have a unique and deep understanding of insider risks, the challenges organizations face, and the people, processes and technology being used to address them. We are excited to have you listen in to our conversations as we discuss a range of interesting topics, ranging from hunting for risks using artificial intelligence to collaborating with HR and legal to build an effective insider risk management program. 

 

 

Get ready to hear some great stories, gain a better understanding of insider risks and in the process learn something new.  Listen to our show on the following platforms:

 

If you like what you hear, we’d love for you to Subscribe, Rate and Review it on iTunes or any other podcast platform you may use.

 

We look forward to hearing from you!

 

Thank you,

 

Raman Kalyan and Talhah Mir

 

Meet our guests and join us for the discussion! 

 

Dawn Cappelli 

VP of Global Security and CISO at Rockwell Automation  

Founder of CERT 

 

Dawn is recognized as one of the world's leaders in insider threat mitigation. She has been working on the insider threat problem for three decades in various roles partnering closely with the Department of Defense, the Department of Homeland Security, the U.S. Secret Service, other federal agencies, the intelligence community, private industry, academia, and the vendor community.

 

Dan Costa                                                  

Technical Manager  

CERT National Insider Threat Center, Carnegie Mellon University’s Software Engineering Institute 

 

Dan leads the research and engineering efforts of the CERT National Insider Threat Center, where he and his team conduct empirical research and develop solutions that enable organizations to effectively manage insider risks.

 

Rob McCann 

Principal Applied Researcher 

Microsoft 

 

Rob has over 14 years' experience professional experience in cybersecurity and software engineering and we talk about how new advances in artificial intelligence and machine learning take on the challenge of hunting for insider risks.

 

Episode 1, “Artificial intelligence hunts for insider risks” 

In this podcast we have a wide-ranging discussion with Rob McCannPrincipal Applied Researcher at Microsoft.  Specifically, about how the power of machine learning and artificial intelligence can uncover hidden risks that would otherwise be impossible to find. 

 

Episode 2, “Predicting your next insider risks” 

In this podcast speak with Dan CostaTechnical Manager of the CERT National Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute. We discuss the challenges of addressing insider threats and how organizations can improve their security posture by understanding the conditions and triggers that precede a potentially harmful act. We also explore, how technological advances in prevention and detection can help organizations stay safe and steps ahead of threats from trusted insiders. 

 

Episode 3, “Insider risks aren’t just a security problem” 

We are back with Dan Costa to explore how partnering with Human Resources can create a strong insider risk management program, a better workplace and more secure organization. 

 

Episode 4, “Insider risk programs have come a long way” 

In this podcast speak with Dawn CappelliVP of Global Security and CISO at Rockwell Automation and founder of CERT.  We discuss the role of technology, psychology, people, and cross-organizational collaboration to drive an effective insider risk program today and things to consider as we look ahead and across an ever-changing risk landscape. 

 

Episode 5, “Practitioners guide to effectively managing insider risks” 

We are back with Dawn Cappelli to discuss about the steps to take to set up and run an insider risk management program.  We talk about specific organizations to collaborate with, and top risks to address first.