Overview & Course Learning Objectives
In today’s globally connected environment it’s more important than ever to maintain the security of our data. This applies to both corporate and personal data. There is no “easy button”, magic software to protect us, or one person or position for protection. It’s incumbent on all to be aware of the problem and be part of the solution. Most focus tends to be on external threats. However, there are equal, if not greater concerns, with insider threats. Our discussion aims to break down fundamental weaknesses that are frequently exploited, to address proactive measures, and to create a mindset to safeguard our data.
Through participation in this course, participants will:
- Describe security threats- both cyber and insider
- Know what fundamental weaknesses are exploited for insider threats.
- Take proactive measures for insider threats
5:30 PM – Check In
6:00 PM – Dinner & Presentation
7:15 PM – Networking
Members & Guests:
$40.00 – Dinner & Meeting
Students & Educators:
$35.00 – Dinner & Meeting
Ted Swailes has over twenty-one (21) years of investigative and technical security experience working with major corporations, law firms and insurance companies. He holds his bachelor's degree in Business Administration from LeTourneau University and received his Masters in Security Management for Executives from the University of Houston-Downtown, graduating from both magna cum laude. In addition, Mr. Swailes is adjunct faculty at the University of Houston-Downtown in the same program he graduated from teaching Computer Forensics. He has brought technical expertise and support services to Swailes & Company engagements in computer crimes and breaches, asset tracking, Internet fraud, civil and criminal investigations, workers compensation, insurance fraud and background investigations. Mr. Swailes has assisted many corporations, law firms, individuals, and law enforcement agencies in the proper forensic acquisition of computer files and data. Using scientific tools and methodologies that are accepted industry practices, he has developed proper storage techniques and reporting procedures for acquired data relative to its use in criminal, civil and administrative matters. In addition, Mr. Swailes supervises personnel and oversees operations in the areas of TSCM, Mobile Surveillance Teams and Covert Operations. This includes the management and implementation of Technical Surveillance and Countermeasures (TSCM) programs for corporations, executives and small businesses. TSCM is a security specialty designed to identify clandestine devices (bugs) in residences, offices, boardrooms or vehicles. Mr. Swailes has been very "creative" in the building of covert camera and recording devices in support of investigative operations. He also has experience in the application of tracking devices to monitor fleet vehicles, equipment, and personnel in support of our client's national and international shipping and freight forwarding operations.