From the course: Insider Threat Risk Management
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Additional tools to analyze data
From the course: Insider Threat Risk Management
Additional tools to analyze data
- [Instructor] Continuing from the previous video on tools of insider threat programs, let us start with analytics. Analytics are generally used on top of SIEM data to uncover any anonymous activity based on the correlation of different actions of the user to determine patterns or trends. In recent times, we have seen the use of user entity and behavioral analytics which uses machine learning to understand what is normal and what is deviating from normal for a user. The user is given a score and if the score exceeds a certain risk threshold, the insider threat program team is notified for investigation. Digital forensics and investigations play a key role in insider threat program. This capability within the organization needs significant investment in people, processes, and tools. Why? Because there is a skill shortage and demand for operating and managing these tools. When untrained professionals use these tools,…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.