With more years working in the Security, Risk, Privacy and Resiliency professions than she cares to say, Helen Patton enjoys managing information, cyber and privacy risk functions, and advocates using information risk, security and privacy to enable the mission of any organization.
Since July 2013 Helen has assumed the role of Chief Information Security Officer at The Ohio State University. She manages the Enterprise Security, Privacy, Disaster Recovery and Digital Accessibility teams. In her spare time she occasionally teaches classes and is an interim co-director of the Institute for CyberSecurity and Digital Trust.
Helen actively encourages collaboration across and within industries, to enable better information security and privacy practices. She believes in improving diversity in the workforce, and mentors people interested in pursuing careers in security, privacy and risk management.
Helen has a Master’s degree in Public Policy, and has earned Certified Information Systems Auditor and Certified In Risk and Systems Control certifications from ISACA. She is a member of the State of Ohio Cybersecurity Advisory Board, a founding board member of the National Technology Security Coalition, and is an advisory board member of CISOExecNet.
An Insider View of Insider Threats
Let’s face it, running an insider threat program is like being a piece of fruit trying to predict the behavior of a kangaroo. Well, maybe not that bad, but it sure isn’t easy.
In this session, we’ll work out what it means to have an insider threat program, we’ll talk about how you might structure a program, and we’ll do a case study on an existing program so you can compare notes. We’ll have a chat about who is watching the watchers, and we’ll chew on how useful these programs really are (hint: no one knows). It will be fun!