Detecting the Unknown Threats: An Identity-Driven Approach

Logo
Presented by

Kayzad Vanskuiwalla, Securonix & Dharaninath Doppalapudi, Accolite

About this talk

With our perimeters expanding beyond the confines of the typical workspace, it has become increasingly evident and critical to monitor the threats posed using insider credentials. Regardless of whether the threats are accidental or intentional, they both ultimately lead to data theft or some form of service disruptions. Major gaps in controls, logging, and monitoring cause organizations to be unaware of the different threats that already exist within their environments. Insider credentials with access to critical infrastructure and data, need to be closely monitored. The best approach to detect these scenarios is to tie anomalies to an identity using a kill chain approach to model potential threat vectors and detect proactively. Join Kayzad Vanskuiwalla, Principal Threat Hunter - Cyber Threat Analytics, Securonix and Dharaninath Doppalapudi, Senior Vice President - Cyber Security, Accolite to learn how to: • Identify gaps in logging and monitoring in order to be equipped to detect key threat vectors • Identify and continuously monitor key assets, potential insider threat entities, and privileged accounts • Detect the unknown threats via focused micro-threat models/kill chains, and shift your focus to anomalies and threats, instead of signatures • Maintain GDPR compliance while monitoring as it pertains to the European Union and European Economic Area
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (80)
Subscribers (16878)
Securonix Next-Gen SIEM delivers threat detection and response powered by flexible, cloud-native advanced analytics. Follow this channel to learn from our security experts. They will discuss threat trends, detection techniques, and SecOps topics such as cloud security, insider threat, SIEM, UEBA, and SOAR.