19
Insider Threat Management by Gaby Friedlander CTO & Founder

Insider Threat Summit - The Future of Insider Threat Detection

Embed Size (px)

Citation preview

Page 1: Insider Threat Summit - The Future of Insider Threat Detection

Insider Threat Managementby Gaby Friedlander

CTO & Founder

Page 2: Insider Threat Summit - The Future of Insider Threat Detection

2007

Page 3: Insider Threat Summit - The Future of Insider Threat Detection

2016

Page 4: Insider Threat Summit - The Future of Insider Threat Detection

People Are Responsible for 90% of Security Incidents *

Business users

Contractors

IT users

* Verizon 2015 Data Breach Investigations Report

Page 5: Insider Threat Summit - The Future of Insider Threat Detection

Bad Actors Negligent Users

There is No Patch for People

Page 6: Insider Threat Summit - The Future of Insider Threat Detection

Insider Threat Stories

Page 7: Insider Threat Summit - The Future of Insider Threat Detection

VS

Existing Security Solution Were Designed With Hacker in Mind and Not Trusted

People

Page 8: Insider Threat Summit - The Future of Insider Threat Detection

Bad Actor

Negligent User

Insider Threat Attack Chain

Tipping Point - Going From Good to Bad

1

Searching for Data2

Capture and Hide the Data3

Data Exfiltration4

***

Page 9: Insider Threat Summit - The Future of Insider Threat Detection

Monitor employee behavior across the enterprise.

Packaged analytics detects early indicators of Insider Threat.

Calculate and prioritize risky users to investigate.

Detect

Page 10: Insider Threat Summit - The Future of Insider Threat Detection

Irrefutable Evidence

Page 11: Insider Threat Summit - The Future of Insider Threat Detection

Insider Threat Requires a Proactive Approach

Page 12: Insider Threat Summit - The Future of Insider Threat Detection

Behavior Shaping

Page 13: Insider Threat Summit - The Future of Insider Threat Detection

Homes With Security Stickers and Signs are 80% Less Likely to be Targeted

Page 14: Insider Threat Summit - The Future of Insider Threat Detection

Prevent Unauthorized Behavior

Page 15: Insider Threat Summit - The Future of Insider Threat Detection

Suspicious Behaviors Are Often Observable Before Insiders Become a

Threat

Page 16: Insider Threat Summit - The Future of Insider Threat Detection

Bad Actor

Negligent User

Detect Negligent Behavior1

Inform User of Security Policy2

Enforce Behavior Change3

Behavior Shaping - Educate

Page 17: Insider Threat Summit - The Future of Insider Threat Detection

Notify Users of Out of Policy Behavior

Centrally Manage Security Policies

Notify users of out-of-policy behavior

Educate employees of acceptable behavior

Educate

Page 18: Insider Threat Summit - The Future of Insider Threat Detection

ITMLifecycle

Proactive

Reactive

Insider Threat Management Core Components

DETERED

UCATE

DETECT

INVESTIGATE

Page 19: Insider Threat Summit - The Future of Insider Threat Detection

Be Proactive - Get Rid of the Haystack