No Photo Available

Last Update


This profile was last updated on .

Is this you? Claim your profile.

Wrong Todd Inskeep?

Mr. Todd Inskeep



Get ZoomInfo Grow

+ Get 10 Free Contacts a Month

Please agree to the terms and conditions

I agree to the Terms of Service and Privacy Policy. I understand that I will receive a subscription to ZoomInfo Grow at no charge in exchange for downloading and installing the ZoomInfo Contact Contributor utility which, among other features, involves sharing my business contacts as well as headers and signature blocks from emails that I receive.


Background Information

Employment History

Principal and Director - Commercial Consulting

Booz Allen Hamilton Inc

Global Security Assessments Vice President, Global Security Services

Samsung Corporation

Consumer Security Strategy

Bank of America Corporation

Research Affiliate

MIT Media Lab

Principal Consultant

Incovate Solutions

Project Manager, Deputy Branch Chief

National Security Agency


Advisory Board Member
RSA Security Inc

Institute of Electronic and Electrical Engineers

Wisegate Inc


Bachelor of Science degree

electrical engineering

West Virginia University

master's degree

strategic intelligence/signals intelligence

Joint Military Intelligence College

Web References (51 Total References)

Meet Our People | Booz Allen Hamilton [cached]

Todd Inskeep

Todd Inskeep Principal View Profile

Todd ... [cached]

Todd Inskeep

Todd Inskeep Senior Associate View Profile

How to mitigate hackers who farm their victims | CIO [cached]

Nation-states and advanced criminals and hackers have been effectively farming their targets for some time now, explains Todd Inskeep, Advisory Board Member, RSA Conference. The earliest examples were enabled by Trojan horses and backdoors that they left in a system to return for easy access time and again; it's almost hacking 101, says Inskeep.

ALSO ON CSO: The 15 worst data security breaches of the 21st century
The farming is more sophisticated now with advanced Command and Control (C&C) servers that they use to make system changes remotely, multiple backdoors in multiple systems, bogus accounts they create to sell or reuse, and sensors they leave behind to identify and harvest specific data, says Inskeep.
"'Sensors' could be code embedded in documents that phone home if they are disturbed, routines similar to chron jobs that run in the background looking for specific activities, or anything that indicates back to the attacker that something has changed," says Inskeep.
These are the activities of Advanced Persistent Threats (APT) that hang around, watching and waiting for the right time and opportunity; many actors like these will continue to treat their portfolio of assets and well-groomed targets like a crop that only becomes more valuable the longer that they nurture it, says Inskeep.
Examples, evidence, outcomes
Nation-states are playing a long game, says Inskeep, using information from their farming tactics in a strategic manner to nudge events along in their favor. "For example, though we can trace early reports of the now famous DNC hacks back to at least June of this year, we really only received the information much later than that when it could create an impact during the convention," says Inskeep.
This release of information changed the story of the first couple of days of the Democratic National Convention and changed the DNC's leadership during a crucial time in the election cycle, Inskeep insists.
As nations and the world become increasingly dependent on the internet as a utility and on its related structures, this type of farming will be the new normal and much more commonplace, posits Inskeep.
Though governments and enterprises with a lot to lose will find it difficult to do, all organizations need to establish an individualized, tailored cybersecurity policy, says Inskeep. According to Inskeep, this requires organizations to first answer questions about when to call in the government for help; what levels and agencies of the government to involve; what kinds of help to expect in what kinds of scenarios; how much you can spend on managing the risks, especially those of nation-state attacks as well as of onslaughts from other threat actors. "You have to determine where your boundaries will be and then build the relationships, processes, and capabilities to maintain those," says Inskeep.
While a few Fortune 100 companies have bigger budgets than some countries, says Inskeep, their allegiance to shareholders and Wall Street will ultimately limit their investment in cyber defenses; besides, companies shouldn't have to defend themselves from nation-states without some government help.

Todd Inskeep Director, ... [cached]

Todd Inskeep Director, Commercial Consulting, Booz Allen Hamilton

RSA Conference APJ 2016: Catching Up with Todd Inskeep

Security expert Todd ... [cached]

Security expert Todd Inskeep, who sits on the advisory board of the RSA Conference, thinks so:

"The cultural environment has changed-people are more open. This openness isn't generational, it's cultural, and applies to people of all ages," Inskeep explains.

Similar Profiles

Other People with this Name

Other people with the name Inskeep

Samantha Inskeep
The Coca-Cola Company

Gay Inskeep
Sixth Judicial Circuit

Mark Inskeep
Alsco Inc

Tami Inskeep
Express Employment Professionals

Jim Inskeep
Carmel High School

City Directory Icon

Browse ZoomInfo's Business Contact Directory by City

People Directory Icon

Browse ZoomInfo's
Business People Directory

Company Directory Icon

Browse ZoomInfo's
Advanced Company Directory