Today, We Salute You, Mr. Venn Diagram Guy
This Venn diagram represents the Veritas Insider Threat Intelligence paradigm as part of a commercial or defense sector’s Insider Risk Management Program. This diagram incorporates internal and external data sources and telemetry from the domains of Insider Risk, Counterintelligence, and Counterespionage.
UnIntelligence, Ep. 15: The TD Bank Scandal
This is a condensed episode of the UnIntelligence Podcast, Episode 15, With Artemist Advisory’s Matthew Hedger and Veritas Security’s Dave Holder. In this episode, we reviewed the TD Bank scandal, the fundamentals of money laundering in organized crime, and Anti Money Laundering (AML) basics, and reviewed insights useful for practitioners involved in counterintelligence and communications security support to commercial industry.
UnIntelligence: The Corporate Counterintelligence Podcast
Unintelligence: The Corporate Counterintelligence Podcast, with cos-hosts Dave Holder & Matthew Hedger
Translator Tool: Military Management Concepts into Corporate-ese
Military to Corporate Translator Tool
Non-Cyber Threat Intel: A Core Competency for Insider Risk Management Programs?
Is Threat Intelligence just for Cyber Defense? BLUF: No, it isn’t.