Tom Cross Unveils Insider Threat Hunting Strategies at SOURCE Security Conference 2013 πŸ”

Discover how Tom Cross addresses the challenges of detecting insider threats and safeguarding organizations from authorized malicious activities in this insightful session from the SOURCE Security Conference Boston 2013.

Tom Cross Unveils Insider Threat Hunting Strategies at SOURCE Security Conference 2013 πŸ”
Big Brain Security
8 views β€’ Sep 9, 2017
Tom Cross Unveils Insider Threat Hunting Strategies at SOURCE Security Conference 2013 πŸ”

About this video

Tom Cross | Insider Threat Hunting for Authorized Evil | SOURCE Security Conference Boston 2013

The prevalence of Insider Threat is often a subject of disagreement and unsourced statistical assertions. Many approaches to addressing the problem are both ineffective and overbearing at the same time. Complicating the issue as well is the need to detect the use of legitimate access credentials by external attackers. This talk will review academic research into Insider Threats, discussing the frequency and impact of the attacks and who does them and why. The talk will then cover strategies for managing the problem from both a business and technical point of view, discussing different techniques for identifying suspicious activity in large collections of data.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

8

Duration

48:58

Published

Sep 9, 2017

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.

Trending Now