9
THE HIDDEN VALUE OF INSIDER THREAT MANAGEMENT SOFTWARE Daniel Petri [email protected] July 2016

The Hidden Value of Insider Threat Management Software

Embed Size (px)

Citation preview

Page 1: The Hidden Value of Insider Threat Management Software

THE HIDDEN VALUE OF INSIDER THREAT MANAGEMENT SOFTWARE

Daniel Petri [email protected]

July 2016

Page 2: The Hidden Value of Insider Threat Management Software

Agenda Why log files may not be enough? How do I know what’s happening? How do I reduce the risk? If something does happen, how do I

troubleshoot? Q&A

Page 3: The Hidden Value of Insider Threat Management Software

Log files Logs are designed for debugging purposes, not with

security in mind Not all OS changes are visible through log files Not all applications have log files, which means lack

of visibility when you most need it Even if you do have logs, it’s terribly difficult to tell

what really happened Inspecting logs requires a lot of effort The time to recover using logs is long

Page 4: The Hidden Value of Insider Threat Management Software

Humans are the weak link Companies are exposed to risk caused by

privileged users – traditionally they are the first to blame

Risk comes not only be these, but also by “regular” users

Potential damage: data loss, service and application downtime, legal actions from regulators and governments, etc.

Page 5: The Hidden Value of Insider Threat Management Software

Mitigate insider threat Discover Identify Alert Educate

Page 6: The Hidden Value of Insider Threat Management Software

Create a plan to reduce human error By using ObserveIT to monitor critical

assets: Servers Desktops used by privileged users Desktops/VDI used by regular users Jump servers used by external vendors Other critical devices

Page 7: The Hidden Value of Insider Threat Management Software

It’s easy Know what users are doing, where else did

they do it, and why Ask users to justify their actions Reduce dependency on log files Efficiently launch an investigation Provide valuable and irrefutable evidence Eliminate finger pointing

Page 8: The Hidden Value of Insider Threat Management Software

Questions

Page 9: The Hidden Value of Insider Threat Management Software

Thank you

David Mai (Marketing Manager) [email protected]

Daniel Petri [email protected]