Presentation is loading. Please wait.

Presentation is loading. Please wait.

USER ACTIVITY MONITORING: MITIGATING USER-BASED RISK Presented by XXXX.

Similar presentations


Presentation on theme: "USER ACTIVITY MONITORING: MITIGATING USER-BASED RISK Presented by XXXX."— Presentation transcript:

1 USER ACTIVITY MONITORING: MITIGATING USER-BASED RISK Presented by XXXX

2 RISK ASSETS SystemsAppsInformation Users PEOPLE

3 INFRASTRUCTURE FIREWALLS ACCESS CONTROL SIEM (LOG DATA) INFRASTRUCTURE FIREWALLS ACCESS CONTROL SIEM (LOG DATA) USERS MITIGATE RISK APPS, SYSTEMS, INFORMATION EMPLOYEE / CUSTOMER DATA INTELLECTUAL PROPERTY REGULATED SERVERS IDENTIFY MANAGE INFLUENCE BEHAVIOR INFER USER ACTIONS ASSETS PEOPLE ? X

4 76% OF DATA BREACHES INVOLVE ACCOUNTS WITH ACCESS TO SENSITIVE DATA Source: Data Breach Investigations Report Verizon

5 WE FORGOT ABOUT OUR USERS!

6 External Vendors USER-BASED RISK Business UsersIT Users

7 USER-BASED SECURITY Securing Enterprises will require a shift to User Activity Monitoring Source: Prevention is Futile in 2020, Gartner

8 WHO’S DOING WHAT? Detect and Respond to User- based Risks Apps KeystrokesClicks

9 Sessi on activ ity alert s Session alert summary

10 Alert indication per screenshot on the timeline Alert indicati on per activity Message suspicious users, and terminate sessions

11 ADD USER CONTEXT TO YOUR ECOSYSTEM User Context SIEMIAMITSM

12 OVER 1,200 CUSTOMERS

13 DO YOU KNOW YOUR USER-RISK PROFILE? Business Users 84% of Insider based breaches involve users with no admin rights 2 69% of reported breaches involved a trusted users 1 IT Users 62% of admin-caused breaches due to human error 3 1 Verizon DBIR 2013 2 2014 IBM/Ponemon Cost of Data Breach Report 3 ibid 4 The 2014 Target Stores breach, not included in the VDBIR14 report Contractors Breaches involving contractors have significantly higher data loss and severity 4

14 THANK YOU


Download ppt "USER ACTIVITY MONITORING: MITIGATING USER-BASED RISK Presented by XXXX."

Similar presentations


Ads by Google