Download presentation
Presentation is loading. Please wait.
Published byJemimah Allison Modified over 9 years ago
1
USER ACTIVITY MONITORING: MITIGATING USER-BASED RISK Presented by XXXX
2
RISK ASSETS SystemsAppsInformation Users PEOPLE
3
INFRASTRUCTURE FIREWALLS ACCESS CONTROL SIEM (LOG DATA) INFRASTRUCTURE FIREWALLS ACCESS CONTROL SIEM (LOG DATA) USERS MITIGATE RISK APPS, SYSTEMS, INFORMATION EMPLOYEE / CUSTOMER DATA INTELLECTUAL PROPERTY REGULATED SERVERS IDENTIFY MANAGE INFLUENCE BEHAVIOR INFER USER ACTIONS ASSETS PEOPLE ? X
4
76% OF DATA BREACHES INVOLVE ACCOUNTS WITH ACCESS TO SENSITIVE DATA Source: Data Breach Investigations Report Verizon
5
WE FORGOT ABOUT OUR USERS!
6
External Vendors USER-BASED RISK Business UsersIT Users
7
USER-BASED SECURITY Securing Enterprises will require a shift to User Activity Monitoring Source: Prevention is Futile in 2020, Gartner
8
WHO’S DOING WHAT? Detect and Respond to User- based Risks Apps KeystrokesClicks
9
Sessi on activ ity alert s Session alert summary
10
Alert indication per screenshot on the timeline Alert indicati on per activity Message suspicious users, and terminate sessions
11
ADD USER CONTEXT TO YOUR ECOSYSTEM User Context SIEMIAMITSM
12
OVER 1,200 CUSTOMERS
13
DO YOU KNOW YOUR USER-RISK PROFILE? Business Users 84% of Insider based breaches involve users with no admin rights 2 69% of reported breaches involved a trusted users 1 IT Users 62% of admin-caused breaches due to human error 3 1 Verizon DBIR 2013 2 2014 IBM/Ponemon Cost of Data Breach Report 3 ibid 4 The 2014 Target Stores breach, not included in the VDBIR14 report Contractors Breaches involving contractors have significantly higher data loss and severity 4
14
THANK YOU
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.