Mitigating the risks of insider threats with UEBA

Logo
Presented by

Ashok Chokalingam CISSP, Senior Sales Engineer & Mohan Raj, Enterprise Sales Manager

About this talk

To avoid a data breach, your organisation must detect and respond quickly to anomalous activity. The Verizon Data Breach Investigations Report, 2017 states that user-based threats are on the rise: • 69% of organisations report incidents of attempted data theft — by internal threats. • 81% of breaches involve stolen or weak credentials. • 91% of firms report inadequate insider threat detection programs. User and entity behaviour analytics (UEBA) can help you monitor for known threats and behavioural changes in user data, providing critical visibility to uncover user-based threats that might otherwise go undetected. In this on-demand webinar, Mohan Raj and Ashok Chokalingam from our iMETA team at LogRhythm,l outline the various types of insider threats, the risk they pose to an organisation, the various contributors that may lead to this threat and how to identify and mitigate the risks.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (87)
Subscribers (18990)
We know your job isn’t easy. That’s why we combine log management, machine learning, SOAR, UEBA, and NDR to give you broad visibility across your environment so you can quickly uncover threats and minimise risk. But a mature SOC doesn’t just stop threats. With LogRhythm, you’ll easily baseline your security operations program and track your gains — so you can easily report your successes to your board. Hear best practices, see technology demos, listen to speaker panels on our European BrightTALK channel. Visit our website for more information: http://www.logrhythm.com/