To avoid a data breach, your organisation must detect and respond quickly to anomalous activity. The Verizon Data Breach Investigations Report, 2017 states that user-based threats are on the rise:
• 69% of organisations report incidents of attempted data theft — by internal threats.
• 81% of breaches involve stolen or weak credentials.
• 91% of firms report inadequate insider threat detection programs.
User and entity behaviour analytics (UEBA) can help you monitor for known threats and behavioural changes in user data, providing critical visibility to uncover user-based threats that might otherwise go undetected.
In this on-demand webinar, Mohan Raj and Ashok Chokalingam from our iMETA team at LogRhythm,l outline the various types of insider threats, the risk they pose to an organisation, the various contributors that may lead to this threat and how to identify and mitigate the risks.