Hi [[ session.user.profile.firstName ]]

e-StepControl – solution for identification of suspicious activities of IT syste

The presentation outlines main features of
“e-StepControl” solution, its architecture and general approach which enable identification of suspicious activities of IT system users. Procedures for creation of individual / group user profiles are being provided based on the audit trails of user activities. Appropriate graph-based methods for monitoring and validating user sessions against these profiles are presented. This enables prevention of information theft and unauthorized use.
Recorded Nov 25 2016 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Vitaly Zabiniako
Presentation preview: e-StepControl – solution for identification of suspicious activities of IT syste

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
DSS ITSEC
DSS ITSEC in an annual, international and largest in the Baltic States cyber-security, data protection, privacy tech and business conference and expo from 2010, event annually brings together top ICT Security professionals from industry’s leading technology vendors, international organisations and agencies, local and regional businesses, as well as, representatives of government and public sector.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: e-StepControl – solution for identification of suspicious activities of IT syste
  • Live at: Nov 25 2016 12:25 pm
  • Presented by: Vitaly Zabiniako
  • From:
Your email has been sent.
or close