Intelligence poacher-turned-gamekeeper Shawnee Delaney is a decorated Intelligence Officer and licensed Private Investigator who has conducted thousands of public and private investigations. She is an Insider Threat expert who deploys war stories, humour and charm to bring unrivalled insight into the nexus of espionage and the corporate world.
A certified Case Officer and alumni of “The Farm”, the CIA’s iconic training facility; Shawnee spent nearly a decade with the Defense Intelligence Agency conducting clandestine Human Intelligence (HUMINT) operations all over the world, including four combat zone tours in Iraq and Afghanistan. On occasion she tells the story of the time Al-Qaeda issued a fatwa against all female intelligence officers and tried to kidnap her. Thereafter, alongside the Department of Homeland Security, she coordinated and managed intelligence community relationships in the protection of U.S. critical infrastructure and industrial control systems.
Shawnee’s civilian client back catalogue boasts industries including celebrated big Pharma and big Tech. She led the development and implementation of Uber’s first ever Insider Threat program, with special focus on their autonomous vehicles program. She also led complex corporate investigations all over the globe targeting fraud, platform abuse, data exfiltration, and attribution of unauthorized disclosures.
At Merck Pharmaceuticals Shawnee Delaney created and personally delivered a cutting-edge training program to over 5,000 employees as part of their Intellectual Property and Trade Secrets protection program. She set a record for positive employee feedback which, to her knowledge, still stands to this day. Creating interactive, multidisciplinary training packages for 45,000 employees on Insider Threat, workplace violence and active shooter awareness that had an emphasis on engagement, impact, and fun.
Shawnee specializes in Insider Threat program management, Insider Threat vulnerability assessments, media leaks, counterintelligence operations, surveillance/counter-surveillance, cyber technologies/threats, counter-terrorism, HUMINT operations, international policy/government relations, and counter-proliferation. She holds an M.A. in International Policy Studies with a specialization in Counter-Terrorism and Counter-Proliferation, and a M.S. in Cyber Security.
In 2019 Shawnee Delaney founded Vaillance Group, focusing on Insider Threat vulnerability assessments, program development, and training. In the fight against both malicious and unintentional threats, Vaillance Group leverages Shawnee’s unparalleled knowledge of Insider Threat to protect its clients’ assets, people, and information.
This presentation will provide an overview on what the term “insider threat” actually encompases, from unintentional acts to malicious acts, and everything in between. It will provide details and case studies on fraud, IT sabotage, espionage, trusted third parties, the Critical Pathway, and red flag indicators.
The Critical Pathway, as identified by Shaw and Sellers, explains how personal predispositions, stressors, and concerning behaviors can lead up to Insider Threat-like behaviors and/or malicious acts.
In addition, this presentation will discuss how one’s personal motivations and vulnerabilities can leave their organization vulnerable, how your company’s culture can affect insider threat, and how both spies and social engineers work similarly to target you and your employees to gain access to your organization’s most sensitive data.
An employee’s lifecycle encompasses several stages throughout their career. This begins with recruitment and concludes with resignation, retirement, or termination.
This talk addresses how organizations can establish an employment lifecycle program in order to give employees consistency throughout their careers and teaches you how to prevent insider threats as a result. It also provides a framework to understand important interdependencies, touchpoints, interactions, and gaps in insider protection strategies.
This presentation will provide an overview on what the term “insider threat” actually encompases, from unintentional acts to malicious acts, and everything in between. It will provide details and case studies on malicious insider acts, psychological motivations of a malicious actor, and the Critical Pathway. The Critical Pathway, as identified by Shaw and Sellers, explains how personal predispositions, stressors, and concerning behaviors can lead up to Insider Threat-like behaviors and/or malicious acts. In addition, this presentation will discuss:
Collin’s dictionary defines “behavior pattern” as “a recurrent way of acting by an individual or group toward a given object or in a given situation.” One of the key mechanisms of mitigating risky insider acts is for an organization to both understand and recognize how behavior patterns can impact cyber – and enterprise – security. While your employees are your greatest asset, they are also your largest vulnerability.
This presentation will provide an overview on what the term “insider threat” actually encompases, from unintentional acts to malicious acts, and everything in between. It will provide details and case studies on fraud, IT sabotage, espionage, trusted third parties, the Critical Pathway, and red flag indicators. The Critical Pathway, as identified by Shaw and Sellers, explains how personal predispositions, stressors, and concerning behaviors can lead up to Insider Threat-like behaviors and/or malicious acts. In addition, this presentation will discuss how one’s personal motivations and vulnerabilities can leave their organization vulnerable, how your company’s culture can affect insider threat, and how both spies and social engineers work similarly to target you and your employees to gain access to your organization’s most sensitive data.
An employee’s lifecycle encompasses several stages throughout their career. This begins with recruitment and concludes with resignation, retirement, or termination. This talk addresses how organizations can establish an employment lifecycle program in order to give employees consistency throughout their careers and teaches you how to prevent insider threats as a result. It also provides a framework to understand important interdependencies, touchpoints, interactions, and gaps in insider protection strategies.
It will cover:
· What is an insider threat?
· What is employment lifecycle management?
· How the human factor impacts organizations
· Best practices for mitigating insider threat by managing the employment lifecycle
This talk provides details on the different types of espionage and how they can affect your organization. It will cover industrial espionage, corporate espionage, and foreign espionage in detail, offering examples of motivations to conduct espionage, costs, how spies are recruited, and case studies on various threat actors.
There are a variety of motivations for conducting theft of intellectual property and/or trade secrets. This talk will cover the various types of Intellectual property theft, differences between intellectual property, trade secrets, and protected information. It will include suggestions for how to better protect this information and what threats are targeting it, including hackers, nation states, insider threats, and technical threats.
There are a variety of motivations for conducting theft of intellectual property and/or trade secrets. This talk will cover the various types of Intellectual property theft, differences between intellectual property, trade secrets, and protected information. It will include suggestions for how to better protect this information and what threats are targeting it, including hackers, nation states, insider threats, and technical threats.
In addition, this presentation will discuss:
Show More
Contact us to get Shawnee Delaney's fees and availability for your next event
One of our consultants will get back to you soon
We use cookies to ensure that we give you the best experience on our website. By continuing to use this website you are giving consent to cookies being used.