Layer 7 Access Management

Developing and Implementing a Successful Insider Threat Strategy and Plan 

01-13-2017 11:15 AM

Enterprises today face the risk of attacks to their data from the outside and the inside. Employees or employee identities are typical attack vectors for a low-and-slow data exfiltration attack. In this session, CA Technologies CIO, Mahendra Durai, will explore the strategies and approaches an enterprise can adopt to create and implement a comprehensive insider-threat protection plan with user behavior analytics, "indicators of compromise" hunting strategies and red-team exercises designed to identify, detect, protect and respond to threat and risk scenarios.

Statistics
0 Favorited
1 Views
0 Files
0 Shares
0 Downloads

Tags and Keywords

Related Entries and Links

No Related Resource entered.