Decorated Clandestine Officer & Insider Threat Expert
Intelligence poacher-turned-gamekeeper, Shawnee Delaney is a decorated Intelligence Officer, licensed Private Investigator, and an Insider Threat Expert and Founder of Vaillance Group. She deploys war stories, humor and charm to bring unrivalled insight into the nexus of espionage and the corporate world. Read More >
A certified Case Officer and alumnus of "The Farm", the CIA’s iconic training facility; Shawnee spent nearly a decade with the Defence Intelligence Agency conducting clandestine Human Intelligence (HUMINT) operations all over the world, including four combat zone tours in Iraq and Afghanistan. She will, for the right price, tell you the story of the time Al-Qaeda issued a fatwa against all female intelligence officers and tried to kidnap her. Thereafter, alongside the Department of Homeland Security, she coordinated and managed intelligence community relationships in the protection of U.S. critical infrastructure and industrial control systems.
Shawnee's civilian client back catalogue boasts industries including celebrated bêtes noires Big Pharma and Big Tech. She led the development and implementation of Uber's first ever Insider Threat program, with special focus on their autonomous vehicles program. She also led complex corporate investigations all over the globe targeting fraud, platform abuse, data exfiltration, and attribution of unauthorized disclosures.
At Merck Pharmaceuticals she created and personally delivered a cutting-edge training program to over 5,000 employees as part of their Intellectual Property and Trade Secrets protection program, setting a record for positive employee feedback that, to her knowledge, still stands to this day. There she also created interactive, multidisciplinary training packages for 45,000 employees on Insider Threat, workplace violence and active shooter awareness that had an emphasis - despite the inherently dry nature of some of the material - on engagement, impact, and fun.
Shawnee specializes in Insider Threat program management, Insider Threat vulnerability assessments, media leaks, counterintelligence operations, surveillance/counter-surveillance, cyber technologies/threats, counter-terrorism, HUMINT operations, international policy/government relations,and counter-proliferation. She holds an M.A. in International Policy Studies with a Specialization in Counter-Terrorism and Counter-Proliferation, and a M.S. in Cyber Security.
In 2019 Shawnee founded Vaillance Group, specializing in Insider Threat vulnerability assessments, program development, and training. In the fight against both malicious and unintentional threats, Vaillance leverages Shawnee’s unparalleled knowledge of Insider Threat to protect its clients’ assets, people, and information. Read Less ^
Negative Impacts of Organizational Change
Insider Threats
Why Are Insider Threats So Dangerous to Your Organizations
Mitigating Insider Threat
Human Trust Management
This presentation will provide an overview on what the term "insider threat" actually encompasses, from unintentional acts to malicious acts, and everything in between. It will provide details and case studies on malicious insider acts, psychological motivations of a malicious actor, and the Critical Pathway. The Critical Pathway, as identified by Shaw and Sellers, explains how personal predispositions, stressors, and concerning behaviors can lead up to Insider Threat-like behaviors and/or malicious acts. Read More >
In addition, this presentation will discuss: Read Less ^
Espionage is real and is all around us. Think you would never be recruited as a spy? Think again. Read More >
In this presentation you will learn from a former Case Officer - a Spy - how she used to target and recruit people just like you. From elicitation at airport gates to surveillance of unwitting people, hear the tricks and techniques she leveraged against various targets of all walks of life and how you can prepare if you suspect you are ever approached. This talk covers both human and cyber security tactics used and addresses how today’s malicious actors including hackers, nation states, and organized criminal groups, use the same techniques as spies. Read Less ^
Given by a former spy, this talk provides details on the different types of espionage and how they can affect your organization. It will cover industrial espionage, corporate espionage, and foreign espionage in detail, offering examples of motivations to conduct espionage, costs, how spies are recruited, and case studies on various threat actors.
There are a variety of motivations for conducting theft of intellectual property and/or trade secrets. This talk will cover the various types of Intellectual property theft, differences between intellectual property, trade secrets, and protected information. It will include suggestions for how to better protect this information and what threats are targeting it, including hackers, nation states, insider threats, and technical threats.
An employee’s lifecycle encompasses several stages throughout their career. This begins with recruitment and concludes with resignation, retirement, or termination. This talk addresses how organizations can establish an employment lifecycle program in order to give employees consistency throughout their careers and teaches you how to prevent insider threats as a result. It also provides a framework to understand important interdependencies, touchpoints, interactions, and gaps in insider protection strategies. Read More >
It will cover: Read Less ^
There are a variety of motivations for conducting theft of intellectual property and/or trade secrets. This talk will cover the various types of Intellectual property theft, differences between intellectual property, trade secrets, and protected information. It will include suggestions for how to better protect this information and what threats are targeting it, including hackers, nation states, insider threats, and technical threats. Read More >
In addition, this presentation will discuss: Read Less ^
In this talk Delaney covers the challenges of being an entrepreneur and how she overcame them while starting two new businesses. Drawing from her expertise in the cybersecurity and human intelligence worlds she will share techniques she used daily in her business to mitigate risks, manage the employment lifecycle, conduct research, build networks and gain other business-related skills - all tools she learned and honed while conducting espionage around the world. Finally, Delaney will review some common threats that entrepreneurs shouldn't overlook and share personal stories of her background and new challenges in starting a second new company that aims to be a disruptor in an industry that has never been addressed before!
Email Your List
You’ve reached your maximum number of speakers for this list.
Email Your List