Mitigating Threats via Next Generation User Activity Monitoring

Logo
Presented by

Brandon Dunlap, Rick Caccia, Kim Getgen & JJ Thompson

About this talk

Never underestimate the creativity of a user trying to get a job done working in a fast paced environment. They will circumnavigate even the most complex controls if it helps them achieve their goals, regardless of the damage they may unintentionally cause. Join (ISC)2 and ArcSight for an interactive roundtable as we explore how to monitor your enterprise for suspicious behavior and mitigate the threats that can result.

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (283)
Subscribers (105095)
(ISC)² hosts regular panel discussions on hot button infosecurity topics featuring thought leaders and visionaries from the industry who answer questions from the audience.