From the course: Insider Threat Risk Management

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Additional tools to analyze data

Additional tools to analyze data

- [Instructor] Continuing from the previous video on tools of insider threat programs, let us start with analytics. Analytics are generally used on top of SIEM data to uncover any anonymous activity based on the correlation of different actions of the user to determine patterns or trends. In recent times, we have seen the use of user entity and behavioral analytics which uses machine learning to understand what is normal and what is deviating from normal for a user. The user is given a score and if the score exceeds a certain risk threshold, the insider threat program team is notified for investigation. Digital forensics and investigations play a key role in insider threat program. This capability within the organization needs significant investment in people, processes, and tools. Why? Because there is a skill shortage and demand for operating and managing these tools. When untrained professionals use these tools,…

Contents