Hi [[ session.user.profile.firstName ]]

Breach prevention by analyzing the keystroke sequences of privileged users

Traditional IT security defenses are not enough effective against APTs or insider threats. Why? Because they can be circumvented in a sophisticated APT attack, and in the case of an insider attack, they simply can’t stop a privileged user from gaining access. By using behavior analytics, we have a technology that can quickly and accurately help us identify a potential breach.
Although detecting unusual keystroke patterns might seem like sci-fi, there are already sophisticated session monitoring systems on the market that monitor privileged users, primarily for compliance purposes initially. When these systems are combined with UBA technology, we can go beyond compliance to the real-time detection and prevention of data breaches.
Recorded Nov 25 2016 31 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Péter Soproni
Presentation preview: Breach prevention by analyzing the keystroke sequences of privileged users

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
DSS ITSEC
DSS ITSEC in an annual, international and largest in the Baltic States cyber-security, data protection, privacy tech and business conference and expo from 2010, event annually brings together top ICT Security professionals from industry’s leading technology vendors, international organisations and agencies, local and regional businesses, as well as, representatives of government and public sector.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Breach prevention by analyzing the keystroke sequences of privileged users
  • Live at: Nov 25 2016 12:05 pm
  • Presented by: Péter Soproni
  • From:
Your email has been sent.
or close