Orchestrate Your Security Defenses: Protect Against Insider Threats

January 31, 2017 from 04:00 PM – 05:00 PM UTC
|

Insider threats are responsible for about 60 percent of the security attacks facing organizations. Many of these attacks are the result of users’ credentials falling into the hands of hackers via internal employees, contractors or partners who are victims of malware-laden phishing attacks, drive-by downloads, or other techniques. The good news is these insider threats can be detected early and steps can be taken to avoid a more serious incident. By utilizing tools to develop a profile of “normal” user behavior it is possible to quickly identify significant deviations from that normal behavior, possibly signaling a breach of your environment. Once analysts are made aware of the suspicious behavior, they can take steps to investigate the activity and remediate to address it, possibly halting an attack before it becomes more serious.

In this on-demand webinar you will learn:

  • What difference an integrated Security Operation and Response strategy can make for your enterprise
  • Why hackers are able to use your employees to breach your defenses
  • How user behavior analytics can give you an early warning that “somethings not right”

Join IBM Security experts, Jason Hardy and Milan Patel, as they talk about the importance of an integrated Security Operations and Response strategy and how you can leverage user behavior analytics to stop insider threats.

Speakers

Jason Hardy

WW Market Segment Manager, Security Operations and ResponsePortfolio Marketing Professional IBM Security

Milan Patel

Program Director Security Offerings Management

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today