SlideShare uma empresa Scribd logo
1 de 18
User Behavior Analytics
And the Organizational Benefits
2
SpectorSoft
2
• Insider threat, targeted attack, financial fraud detection
• Focused on patterns of human behavior
• Understanding normal & flagging anomalies that indicate threat
User Behavior Analytics
User Activity Monitoring
• Collection and inspection of activity data (logs)
• Hi-risk, response, investigations, post-mortems
• Rich contextual data source
3
User Behavior Analytics
3
• All about making you more secure
• Threats are not only external
• Average time to detect an insider threat?
• 32 days
• Average time to respond?
• 17 days
• Budgets are not aligned with reality
• 52% perceive negligent employees as cause
of significant damage
• 44% spend are spending 10% or less on
solutions that focus on insider threats
• Over 40% don’t even know what they
spend
Statistics taken from Insider Threats and the Need for Fast and Directed
Response - A SANS Survey.
4
Not in my backyard
4
3.8 50% $100k - $2M+
* Crowd-based research in cooperation with the 260,000+ member
Information Security Community on LinkedIn
5
Cards on the table
5
6
Cards on the table
7
What risk do your insiders pose?
7
10
5
1
8
Focus: Detection
8
9
Detect
• You are most concerned
with data leak / breach /
theft – data exfiltration
• Focus on detecting data
exfiltration potential
• Direct that focus to
where the insider
interacts with the data
© SpectorSoft 2015
10
Detect
10
5
1
User Behavior Analytics
• Detection of insider
threats
• Patterns of human
behavior
• Algorithms and
statistical analysis to
detect meaningful
anomalies –
indications of
potential threat
User Activity Monitoring
• Collection of data
focused on the
interaction between
user and resource
• Detailed and
contextual user
activity log
• Review: Alerts,
reports, playback,
and search
© SpectorSoft 2015
11
Spector 360 Recon
12
Spector 360 Recon
13
Spector 360 Recon
14
Detail
10
5
1
User Behavior Analytics
• Detection of insider
threats
• Patterns of human
behavior
• Algorithms and
statistical analysis to
detect meaningful
anomalies –
indications of
potential threat
User Activity Monitoring
• Collection of data
focused on the
interaction between
user and resource
• Detailed and
contextual user
activity log
• Review: Alerts,
reports, playback,
and search
© SpectorSoft 2015
15
Spector 360
16
Closing Thoughts
– Estimates suggest that 70% of the value of the average
business is held within information systems
– Less than 3% of all info tech & security $ are spent
protecting or safeguarding electonic or hard copy
proprietary information*
– The vast majority of these $ are spent in an effort to keep
outsiders out*
– Little is done to protect proprietary information from the
untrained or disgruntled employee.*
*Dan Smartwood, former Director of Information Safeguarding
at Walt Disney Corp, testifying before Congress
17
What next?
• Review your history of security problems
– What % were caused by external v insider?
• Look at your budget
– What % are you spending on insider security
• Review your incident response plan
– Does it have special provisions for an insider incident
• http://webinar.spectorsoft.com/insider-threats-find-early-fix-
fast
• Focus on detection
18
Benefit from UBA
Download:
www.spector360recon.com/trial/
Increasing Security & Productivity through Insider Intelligence:
http://bit.ly/1MPoIgF
“By 2018, organizations that monitor and analyze a broad spectrum or employee
activities will experience 50% fewer insider data breaches than organizations that
monitor internal communications only.”
Market Guide for Employee-Monitoring Products and Services
Andrew Walls, Research Vice President, Gartner Research, 25 February 2015

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

UX Best Practices
UX Best PracticesUX Best Practices
UX Best Practices
 
What is UX?
What is UX?What is UX?
What is UX?
 
UI & UX Design for Startups
UI & UX Design for StartupsUI & UX Design for Startups
UI & UX Design for Startups
 
UI UX Introductory session
UI UX Introductory sessionUI UX Introductory session
UI UX Introductory session
 
UX & UI Design - Differentiate through design
UX & UI Design - Differentiate through designUX & UI Design - Differentiate through design
UX & UI Design - Differentiate through design
 
UI/UX Fundamentals
UI/UX FundamentalsUI/UX Fundamentals
UI/UX Fundamentals
 
UX 101: A quick & dirty introduction to user experience strategy & design
UX 101: A quick & dirty introduction to user experience strategy & designUX 101: A quick & dirty introduction to user experience strategy & design
UX 101: A quick & dirty introduction to user experience strategy & design
 
Ux design process
Ux design processUx design process
Ux design process
 
UX RULES: 10 ESSENTIAL PRINCIPLES
UX RULES: 10 ESSENTIAL PRINCIPLESUX RULES: 10 ESSENTIAL PRINCIPLES
UX RULES: 10 ESSENTIAL PRINCIPLES
 
UX is not UI!
UX is not UI!UX is not UI!
UX is not UI!
 
The Importance of UX
The Importance of UXThe Importance of UX
The Importance of UX
 
UX/UI Design and How It Works
UX/UI Design and How It WorksUX/UI Design and How It Works
UX/UI Design and How It Works
 
What is UX?
What is UX?What is UX?
What is UX?
 
UX lesson 3: Usability First
UX lesson 3: Usability FirstUX lesson 3: Usability First
UX lesson 3: Usability First
 
Demystifying User Experience
Demystifying User ExperienceDemystifying User Experience
Demystifying User Experience
 
UI and UX Design for Startups - Matin Maleki
UI and UX Design for Startups - Matin MalekiUI and UX Design for Startups - Matin Maleki
UI and UX Design for Startups - Matin Maleki
 
UX/UI Introduction
UX/UI IntroductionUX/UI Introduction
UX/UI Introduction
 
Basics in User Experience Design, Information Architecture & Usability
Basics in User Experience Design, Information Architecture & UsabilityBasics in User Experience Design, Information Architecture & Usability
Basics in User Experience Design, Information Architecture & Usability
 
UX - User Experience Design and Principles
UX - User Experience Design and PrinciplesUX - User Experience Design and Principles
UX - User Experience Design and Principles
 
UX and UI
UX and UIUX and UI
UX and UI
 

Destaque

Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit Software
FraudBusters
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
FraudBusters
 
Full_Article_GadgetTrak_Forbes_Reduced
Full_Article_GadgetTrak_Forbes_ReducedFull_Article_GadgetTrak_Forbes_Reduced
Full_Article_GadgetTrak_Forbes_Reduced
Tripwire
 
Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
FraudBusters
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
FraudBusters
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a Fraudster
FraudBusters
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
FraudBusters
 

Destaque (20)

SplunkLive! Customer Presentation – Virtustream
SplunkLive! Customer Presentation – VirtustreamSplunkLive! Customer Presentation – Virtustream
SplunkLive! Customer Presentation – Virtustream
 
User behavior analytics
User behavior analyticsUser behavior analytics
User behavior analytics
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit Software
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
 
Fraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and moreFraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and more
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
 
Adapt or Die: The Evolution of Endpoint Security
Adapt or Die: The Evolution of Endpoint SecurityAdapt or Die: The Evolution of Endpoint Security
Adapt or Die: The Evolution of Endpoint Security
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
 
How to prevent cyber attack with big data & intelligence(sfis170222)
How to prevent cyber attack with big data & intelligence(sfis170222)How to prevent cyber attack with big data & intelligence(sfis170222)
How to prevent cyber attack with big data & intelligence(sfis170222)
 
Full_Article_GadgetTrak_Forbes_Reduced
Full_Article_GadgetTrak_Forbes_ReducedFull_Article_GadgetTrak_Forbes_Reduced
Full_Article_GadgetTrak_Forbes_Reduced
 
Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a Fraudster
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
 
Threat Hunting with Splunk
Threat Hunting with Splunk Threat Hunting with Splunk
Threat Hunting with Splunk
 
Operational Security
Operational SecurityOperational Security
Operational Security
 

Semelhante a User Behavior Analytics And The Benefits To Companies

SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud Detection
Splunk
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
AkramAlqadasi1
 
Insider Threat_BAH_Turner
Insider Threat_BAH_TurnerInsider Threat_BAH_Turner
Insider Threat_BAH_Turner
Bob Turner
 

Semelhante a User Behavior Analytics And The Benefits To Companies (20)

How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
 
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric ColeObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud Detection
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
insider threat research
insider threat researchinsider threat research
insider threat research
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Insider Threat_BAH_Turner
Insider Threat_BAH_TurnerInsider Threat_BAH_Turner
Insider Threat_BAH_Turner
 
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian RainsburghEndpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
 

Último

Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Último (20)

WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 

User Behavior Analytics And The Benefits To Companies

  • 1. User Behavior Analytics And the Organizational Benefits
  • 2. 2 SpectorSoft 2 • Insider threat, targeted attack, financial fraud detection • Focused on patterns of human behavior • Understanding normal & flagging anomalies that indicate threat User Behavior Analytics User Activity Monitoring • Collection and inspection of activity data (logs) • Hi-risk, response, investigations, post-mortems • Rich contextual data source
  • 3. 3 User Behavior Analytics 3 • All about making you more secure • Threats are not only external • Average time to detect an insider threat? • 32 days • Average time to respond? • 17 days • Budgets are not aligned with reality • 52% perceive negligent employees as cause of significant damage • 44% spend are spending 10% or less on solutions that focus on insider threats • Over 40% don’t even know what they spend Statistics taken from Insider Threats and the Need for Fast and Directed Response - A SANS Survey.
  • 4. 4 Not in my backyard 4 3.8 50% $100k - $2M+ * Crowd-based research in cooperation with the 260,000+ member Information Security Community on LinkedIn
  • 5. 5 Cards on the table 5
  • 7. 7 What risk do your insiders pose? 7 10 5 1
  • 9. 9 Detect • You are most concerned with data leak / breach / theft – data exfiltration • Focus on detecting data exfiltration potential • Direct that focus to where the insider interacts with the data © SpectorSoft 2015
  • 10. 10 Detect 10 5 1 User Behavior Analytics • Detection of insider threats • Patterns of human behavior • Algorithms and statistical analysis to detect meaningful anomalies – indications of potential threat User Activity Monitoring • Collection of data focused on the interaction between user and resource • Detailed and contextual user activity log • Review: Alerts, reports, playback, and search © SpectorSoft 2015
  • 14. 14 Detail 10 5 1 User Behavior Analytics • Detection of insider threats • Patterns of human behavior • Algorithms and statistical analysis to detect meaningful anomalies – indications of potential threat User Activity Monitoring • Collection of data focused on the interaction between user and resource • Detailed and contextual user activity log • Review: Alerts, reports, playback, and search © SpectorSoft 2015
  • 16. 16 Closing Thoughts – Estimates suggest that 70% of the value of the average business is held within information systems – Less than 3% of all info tech & security $ are spent protecting or safeguarding electonic or hard copy proprietary information* – The vast majority of these $ are spent in an effort to keep outsiders out* – Little is done to protect proprietary information from the untrained or disgruntled employee.* *Dan Smartwood, former Director of Information Safeguarding at Walt Disney Corp, testifying before Congress
  • 17. 17 What next? • Review your history of security problems – What % were caused by external v insider? • Look at your budget – What % are you spending on insider security • Review your incident response plan – Does it have special provisions for an insider incident • http://webinar.spectorsoft.com/insider-threats-find-early-fix- fast • Focus on detection
  • 18. 18 Benefit from UBA Download: www.spector360recon.com/trial/ Increasing Security & Productivity through Insider Intelligence: http://bit.ly/1MPoIgF “By 2018, organizations that monitor and analyze a broad spectrum or employee activities will experience 50% fewer insider data breaches than organizations that monitor internal communications only.” Market Guide for Employee-Monitoring Products and Services Andrew Walls, Research Vice President, Gartner Research, 25 February 2015

Notas do Editor

  1. Founded in 1998 User Activity Monitoring and User Behavior Analytics Thousands of corporate, government, and non-profit customers; millions of endpoints
  2. If you are not looking, you simply do not know. Don’t be lulled into a false sense of security because you have not detected a insider threat UNLESS you have focused efforts on insider threat detection. Known knows, known unknowns, unkown unknows. Survey also showed that the
  3. 56% of respondents who answered “yes” we have had an attack or “no” we have not – said yes we have. Average of 3.8 attacks per org. 50% of those who could put a number on remediation estimated between $100k and over $2M.
  4. Disgruntled: Ricky Joe Mitchell sentenced to 4 years in Fed prison. Admitted that he reset all network servers to factory settings intentionally when he heard he was to be fired. EverVest was unable to fully communicate or conduct business for 30 days, and spent hundreds of thousands of dollars trying to recover historical data. Also ordered to pay $428k in restitution. Entitled: So common amongst sales and “creators” (for example: marketing, coders, strategic direction setters). Surveys show that 1 out of 2 employees think it’s OK to take corporate data with them when they leave, and a full 40% of those that says it’s OK further think it’s OK to use it at their next position. Ours and Symantec. Ringleader: Lyft. Late last year. COO allegedly took strategic product plans, financials, forecasts – and went to Uber! No word @ last look how he physically got there … which service he used. No specific insight into this one but presents as classic case of insider who felt entitled to information that he had a hand in creating (signed off on) and would be of use to him down the road. Imposter: Anthem. Jan 2015. source of breach seemed to be a compromised login credential. Attacker(s) ran a database query using sys admin credentials. Then they uploaded data to a cloud storage service. How many document file-sharing services are used in your company? Official and shadow? Do you know how they are used? Mole: CME Group software engineer – last name Yang – worked at company 11 years. Sometime late in the 10th year / early in the 11th year – working in concert with 2 unnamed business partners (not employees) he planned to start a rival company. Downloaded more than 10,000 files containing source code to his work computer, transferred them to USB, and walked them out. Think he would have been flagged as behaving anomalously?
  5. What risk do your insiders pose? (click) Think about the positions in your company – each one comes with some level of risk . Think of one or two now and assign them a risk value. TO help you assess your risk, remember: 1) Everyone has risk - Can be the low level clerk in acctg with access to credit card data, all the way up to the VP of sales with access to all your customer records – and everything in between. (next slide)
  6. That your organization currently has an insider threat of some sort is a near certainty. Therefore, you have to approach security with the assumption that an insider threat has already compromised you and focus your energy on detection. Preventing insider attacks is important and a key part of security; however, organizations often fool themselves into believing that they can stop all such attacks. Repeat the following sentence three times: “Your organization is and will be compromised by insiders.” Insiders—whether malicious or merely negligent—are a continuous and constant problem for IT security; thinking otherwise is naïve. Dr. Eric Cole, SAMS Faculty Fellow. Recognized security expert. 20 patents. Former CTO McAfee and Chief Scientist for Lockheed Martin.
  7. Lower risk – UBA Higher risk – UBA and UAM
  8. Our approach to User Behavior Analytics, or UBA, focuses on detecting data exfiltration potential, so you can prevent it. We’ve worked hard to make UBA usable … no big professional services bills, no steep learning curves, and no difficulty tuning the solution to fit your needs. As you can see, getting started is as simple as selecting the users or groups you want to analyze behavior for, highlighting the specific behaviors you are most interested in,
  9. And tuning the alert sensitivity to align to your requirements. Here the red dots represent the number of alerts you would receive based on each sensitivity setting. (next slide)