Reviews Write New Review
Location
Booking Fee
Fee: $##,###Get Pricing
Virtual Fee: $##,###Get Pricing
[email protected]
Shawnee Delaney is the founder and CEO of Vaillance Group. With a robust background as a decorated Clandestine Services Officer, Delaney has extensive experience from her near-decade tenure with the Defense Intelligence Agency (DIA), where she conducted human intelligence (HUMINT) operations globally. Her service record includes four combat zone tours in Iraq and Afghanistan, fulfilling roles as a Case Officer and Detachment Chief, and a tenure as a Supervisory Branch Chief in Europe.
After her time with the DIA, Delaney continued to contribute to national security by supporting the Department of Homeland Security (DHS), focusing on the protection of U.S. critical infrastructure and industrial control systems as part of the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). In the private sector, she has developed Insider Threat programs for major Fortune 500 companies, leveraging her expertise in cybersecurity and industrial control systems. Delaney's academic credentials include an M.A. in International Policy Studies with a Specialization in Counter-Terrorism and Counter-Proliferation, a M.S. in Cyber Security, and she is currently pursuing a third Masters in Industrial-Organizational Psychology.
Delaney is also an accomplished speaker, delivering keynotes on a range of topics including cybersecurity, espionage, and insider threats. Her presentations, such as "Beyond Firewalls: Understanding Human Risk in Cybersecurity" and "The Hidden Enemy: Detecting and Preventing Insider Threats to Intellectual Property," combine her intelligence background with practical strategies for business and security leadership. She has been cited in and has written for publications such as the Cipher Brief, Fox Business, Yahoo Finance, Business Insider, the Hill, and the Financial Times. Delaney’s ability to connect with her audience through real-life stories and her in-depth knowledge makes her a sought-after speaker in national security and business circles. She recently spoke at Harvard Kennedy School on a panel about careers in National Security, showcasing her insights from a female leader's perspective.
Videos
Speech Topics
Human Vulnerabilities in Cybersecurity: Strategies for Mitigating Social Engineering and Insider Threats
This presentation will provide an overview on what the term "insider threat" actually encompasses, from unintentional acts to malicious acts, and everything in between. It will provide details and case studies on malicious insider acts, psychological motivations of a malicious actor, and the Critical Pathway. The Critical Pathway, as identified by Shaw and Sellers, explains how personal predispositions, stressors, and concerning behaviors can lead up to Insider Threat-like behaviors and/or malicious acts. In addition, this presentation will discuss:
How the human factor impacts organizations
How your company's culture can affect insider threat
How both spies and social engineers work similarly to target you and your employees to gain access to your organization's most sensitive data
How one's personal motivations and vulnerabilities can leave their organization vulnerable,
How organizations can establish an employment lifecycle program in order to understand important interdependencies, touchpoints, interactions, and gaps in insider protection strategies
The Art of Espionage: Understanding the Fundamentals of Spycraft
Espionage is real and is all around us. Think you would never be recruited as a spy? Think again. In this presentation you will learn from a former Case Officer - a Spy - how she used to target and recruit people just like you. From elicitation at airport gates to surveillance of unwitting people, hear the tricks and techniques she leveraged against various targets of all walks of life and how you can prepare if you suspect you are ever approached. This talk covers both human and cyber security tactics used and addresses how today’s malicious actors including hackers, nation states, and organized criminal groups, use the same techniques as spies.
Stealing Innovation: Understanding the Threat of Corporate Espionage and Intellectual Property Theft
Given by a former spy, this talk provides details on the different types of espionage and how they can affect your organization. It will cover industrial espionage, corporate espionage, and foreign espionage in detail, offering examples of motivations to conduct espionage, costs, how spies are recruited, and case studies on various threat actors.
The Hidden Enemy: Detecting and Preventing Insider Threats to Intellectual Property
There are a variety of motivations for conducting theft of intellectual property and/or trade secrets. This talk will cover the various types of Intellectual property theft, differences between intellectual property, trade secrets, and protected information. It will include suggestions for how to better protect this information and what threats are targeting it, including hackers, nation states, insider threats, and technical threats.
From Onboarding to Offboarding: Mastering the Art of Employment Lifecycle Management
An employee’s lifecycle encompasses several stages throughout their career. This begins with recruitment and concludes with resignation, retirement, or termination. This talk addresses how organizations can establish an employment lifecycle program in order to give employees consistency throughout their careers and teaches you how to prevent insider threats as a result. It also provides a framework to understand important interdependencies, touchpoints, interactions, and gaps in insider protection strategies.
It will cover:
- What is an insider threat?
- What is employment lifecycle management?
- How the human factor impacts organizations
- Best practices for mitigating insider threat by managing the employment lifecycle
From Creation to Protection: Navigating the Complexities of Intellectual Property and Trade Secrets in the Age of Cybercrime
There are a variety of motivations for conducting theft of intellectual property and/or trade secrets. This talk will cover the various types of Intellectual property theft, differences between intellectual property, trade secrets, and protected information. It will include suggestions for how to better protect this information and what threats are targeting it, including hackers, nation states, insider threats, and technical threats.
In addition, this presentation will discuss:
- How the human factor impacts organizations
- Psychological aspects of a malicious actor
- How both spies and social engineers work similarly to target you and your employees to gain access to your organization's most sensitive data.
- How one's personal motivations and vulnerabilities can leave their organization vulnerable
- How organizations can establish an employment lifecycle program in order to understand important interdependencies, touchpoints, interactions, and gaps in insider protection strategies
From Espionage to Entrepreneurship: Lessons Learned as a Spy Turned Business Owner
In this talk I will cover the challenges of being an entrepreneur and how I overcame them while starting two new businesses. Drawing from my expertise in the cybersecurity and human intelligence worlds I will share techniques I use daily in my business to mitigate risks, manage the employment lifecycle, conduct research, build networks and gain other business-related skills - all tools I learned and honed while conducting espionage around the world. Finally, I will review some common threats that entrepreneurs shouldn't overlook and share personal stories of my background and new challenges in starting a second new company that aims to be a disruptor in an industry that has never been addressed before!
The Enemy Within: Navigating the Complexities of Extremism and Insider Threat
This talk provides an in-depth analysis of extremism and insider threat, exploring the causes, characteristics, and consequences of these phenomena. The course will cover different types of extremism, such as religious, political, and ideological extremism, and examine their commonalities and differences. I will share case studies of extremist groups and malicious insiders, including their motivations, tactics, and ideologies. Topics covered in the talk include:
Theoretical perspectives on extremism and insider threat
Historical and contemporary examples of extremism and insider threat
Causes and consequences of extremism and insider threat
Identification and mitigation of extremist and insider threats
By the end of this talk, audiences will have gained an understanding of the nature of extremism and insider threat, and be equipped with practical strategies for identifying and mitigating these risks.
Locked Out: Navigating the Growing Threat of Ransomware Attacks
This course is designed to provide a comprehensive understanding of ransomware, a type of malware that encrypts victim's files and demands a ransom payment in exchange for the decryption key. Ransomware has become one of the most pervasive and damaging forms of cybercrime, with attacks on individuals, businesses, and governments on the rise.
Audiences will learn about the various types of ransomware, how they work, and the methods used by attackers to deliver and spread ransomware. The talk will also cover prevention strategies and best practices for identifying and mitigating insider threats, detecting and preventing ransomware infections, and responding to ransomware attacks.
Under Pressure: The Hidden Link Between Stress and Insider Threats
Stress is a common factor in our daily lives, and it can have significant impacts on our emotional, mental, and physical well-being. However, stress can also have unintended consequences in the workplace, including creating an environment that fosters insider threats. This talk will explore the relationship between stress and insider threats, and strategies for mitigating this often-overlooked risk.
Through a combination of real-world examples, research studies, and case studies, attendees will gain a deeper understanding of how stress can lead to insider threats, including unintentional and malicious insider behavior. The talk will examine the factors that contribute to stress in the workplace, including job dissatisfaction, work overload, and lack of support. Attendees will also learn about the different types of insider threats, the warning signs of insider threats, and the damage they can cause to organizations.
The talk will conclude with practical strategies for mitigating insider threats caused by stress. Attendees will learn about best practices for identifying and addressing workplace stress, promoting employee well-being, and creating a positive work environment that reduces the risk of insider threats. The talk will also cover the importance of creating a culture of awareness and vigilance to help prevent and detect insider threats before they cause harm.
Overall, this talk will provide attendees with valuable insights into the often-overlooked relationship between stress and insider threats. Attendees will gain practical strategies for mitigating this risk, helping them to create a more secure and productive workplace for their organizations.
Related Speakers View all
Scott Augenbaum
Retired FBI Agent & Expert in Cyber Security
|
|
Brett Johnson
"Original Internet Godfather" & Former United States...
|
|
James Lawler
Author & National Security Consultant; Former CIA Op...
|
|
Peter Warmka
Founder of Counterintelligence Institute, Former CIA...
|
|
Nicole Perlroth
NYT Best Selling Cybersecurity Author & CISA Advisor
|
|
Sylvia Acevedo
Engineer, Rocket Scientist & Technology Leader; Earl...
|
|
Bryan Seely
Cyber Security Expert, Ethical Hacker, Author
|
|
Peter Diamandis
Founder & Executive Chairman of the XPRIZE Foundatio...
|
|
Ryan Hillsberg
Senior Director of Corporate Security at Seagen; Aut...
|
|
David Charney
Founder and Medical Director of Roundhouse Square Co...
|
|
Kim Zetter
Award-Winning Investigative Journalist & Author of "...
|
|
FC (Freaky Clown)
Ethical Hacker, Co-founder of Cygenta, Former Head o...
|
|
Marc Randolph
Entrepreneur, Co-Founder of Netflix, Executive Mento...
|
|
Brian Krebs
Cybercrime Investigative Reporter, Author of "Spam N...
|
|
Walter O'Brien
CEO and Founder, Scorpion Computer Services
|
|
Avi Rubin
Professor of Computer Science & Technical Director o...
|
|
Erik Qualman
Artificial Intelligence & Digital Transformation Exp...
|
|
Daymond John
"Shark Tank" Investor; Founder & CEO of FUBU; Presid...
|
|
Gregory D. Evans
Leader in Hi-tech Cyber Security, Computer Security,...
|
|
Anthony Levandowski
Co-Founder & CEO of Pronto; Founder & CEO of Pollen ...
|