• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Leveraging User Behavior Analytics for Inside-out Attacks

Some of the recent high-profile breaches have highlighted that organizations don’t discover a breach until long after it occurs, and furthermore, they rarely have accurate knowledge of the extent of the breach. These incidents have a devastating impact on many facets of an organization, including financially – to the tune of an estimated $400 million, industry-wide, according to the 2015 Verizon DBIR.

Organizations have to face the new reality that it is not a matter of if they will be breached, but when they will be breached. Attackers are already inside – either rightfully as an employee or contractor, or through legitimate but compromised credentials as an outside hacker. Their presence on a network wouldn’t necessarily look suspicious to IT, but their activity would likely appear anomalous. Still, users’ behavior on many internal systems is rarely monitored or analyzed. The DBIR supports this claim, stating, “the common denominator across the top four [incident classification] patterns —accounting for nearly 90% of all incidents — is people. Whether it’s goofing up, getting infected, behaving badly, or losing stuff, most incidents fall in the PEBKAC and ID-10T über-patter

Key learning points:
  • Organizations face data breaches every day
  • Attackers are already inside - employee or outside hacker
  • Session will cover stages of an inside-out incident

About Greg Gurevich

Greg Gurevich is a Supervising Systems Engineer for Varonis Systems, a leader in unstructured data protection and management, as well as secure mobile collaboration. Over the last 15 years, Greg has been involved with global deployments of Enterprise Management Frameworks, Storage Consolidation and Disaster Recovery solutions.
During the last 5 years, Greg has functioned as an ally to Varonis, working to assist many aiming to protect and manage large unstructured volumes of data.

Primary Sidebar

Details

Tuesday May 17, 2016
3:00 PM - 4:00 PM
Room 7&8
Level: Intermediate
Focus: Cybersecurity, GRC (Governance, Risk & Compliance)

Share this page

Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Share on LinkedIn
Linkedin
Buffer this page
Buffer
Email this to someone
email

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.