Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

ISAC National Webinar: The Call is Coming From Inside the House – Understanding the Insider Threat

Previously presented on Tuesday, August 10th | 2:00 pm EDT

The risks posed by insider threats are not new. In fact, they've represented some of the most powerful storytelling elements in books, movies, folklore, and other media for centuries now. From the betrayal of Julius Caesar to data theft in Star Wars, insider threats have been a pivotal security topic that continues to be underrepresented in most organizations. This presentation will walk through the IT risks posed by insider threats, identify the common technologies and motivations that enable insider threats to be successful, and offer actionable guidance on mitigation and response options. We'll also identify the greatest insider threat movie you've probably already seen.

What attendees learned about:

  • Understand the current IT risk landscape for insider threats within SLTT entities
  • Identify the methods and motivations utilized by insider threats against SLTT technologies and data
  • Takeaway best practices and program recommendations for establishing an insider threat monitoring or response capability
View the recording below or download the slides here.


Christopher Cruz

Cybersecurity Program Manager

Cris Cruz is currently the Cybersecurity Program Manager in the Virginia Department of Emergency Management, assigned to the Office of the Secretary of Public Safety & Homeland Security in the Commonwealth of Virginia. Previously, Chris worked as an analyst, investigator, and program consultant for insider threat efforts at several Fortune 500 companies, where he led numerous incidents or projects involving theft of intellectual property, nation-state espionage, protection of trade secrets, and insider threat detection models.