Breach prevention by analyzing the keystroke sequences of privileged users

Presented by

Péter Soproni

About this talk

Traditional IT security defenses are not enough effective against APTs or insider threats. Why? Because they can be circumvented in a sophisticated APT attack, and in the case of an insider attack, they simply can’t stop a privileged user from gaining access. By using behavior analytics, we have a technology that can quickly and accurately help us identify a potential breach. Although detecting unusual keystroke patterns might seem like sci-fi, there are already sophisticated session monitoring systems on the market that monitor privileged users, primarily for compliance purposes initially. When these systems are combined with UBA technology, we can go beyond compliance to the real-time detection and prevention of data breaches.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (109)
Subscribers (810)
DSS ITSEC in an annual, international and largest in the Baltic States cyber-security, data protection, privacy tech and business conference and expo from 2010, event annually brings together top ICT Security professionals from industry’s leading technology vendors, international organisations and agencies, local and regional businesses, as well as, representatives of government and public sector.