Critical Access Monitoring: How It’s Evolved and Why You Need It

Logo
Presented by

Daniel Fabbri, SecureLink's Chief Data Scientist

About this talk

Modern critical systems store immense amounts of sensitive information, from protected health information to financial data to sales leads. Organizations trust that their employees will utilize this information appropriately, but unfortunately, there are numerous examples where employees abuse their access privileges for malicious acts, insider trading, or snooping. To combat this risk, security and privacy officers deploy access monitoring systems to detect potential inappropriate or high-risk accesses. Over the last two decades, these monitoring systems have seen substantial changes in their methods and approaches. In this webinar our Chief Data Scientist, Daniel Fabbri, will discuss critical access monitoring systems including: regular expressions, rules, high-risk flags, anomaly detection methods, statistical outlier methods, and context-based approaches. At the end of the webinar, you will have an understanding of: - The history of critical access monitoring systems - Pros and cons of each approach - How you can adapt your monitoring program to mitigate organization-specific risks
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (70)
Subscribers (2322)
Over the past two decades, we have become the leading experts in critical access management for highly regulated enterprise organizations, technology vendors, healthcare providers, and more. Organizations of varying industries and needs continue to depend on SecureLink to secure access to their critical systems, data, IT and OT infrastructure, regulated information, and networks. Our value is more than world-class products — it’s our partnerships with every organization we work with. We understand technology, security, industries, and the vast cyber threats our customers face. We’re here to stand beside them and keep them secure.