Have you ever wondered what your organizations network would tell you if it could talk? Would it tell you it feels safe, heathy and secure? Would it tell you that its feeling a bit exposed? Would it whisper to you that it has a few secrets and it hopes the world doesn't discover them? Or perhaps it might tell you that it feels good, but that its end-users keep doing things that undermine its security protocols? The concept of "End-User Behavioral Analytics" (EUBA) is designed not only to give your infrastructure a voice, but also to convert that voice into corrective actions that ultimately have a positive impact on the organizations ability to monitor and manage IT risk. In this presentation we explore real-world applications for EUBA and how it can have a positive impact on an organizations ability to strengthen and defend its overall IT security infrastructure.
Over 24 years experience as a governance, risk management and compliance management professional. For 8 of these years I served on the executive team of the largest global tier 1 supplier to the automotive industry. In addition to that I’ve held the positions as the Director of Information Technology at enterprise sized organizations in medical, legal and insurance industries. I've owned an operated a consulting organization for 6 years developing customized data management solutions as well as eCommerce and automated middle-ware based websites. Routinely speak at IT security events and continue to contribute to social media forums on a variety of IT GRC & security topics. Conducted many compliance and security audits for fortune 500 organizations. I have also been a project manager or acted as the technical lead on many of these installations. For the past 14 years I've been the Director of the GRC practice at Creative Breakthroughs, Inc. Specialties: The ability to lead a highly specialized team of professionals in examining an organizations overall level of operational risk, security and compliance. The ability to design and implement the associated business processes and supporting technologies required to obtain and maintain required levels of enterprise security, risk management and compliance.
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek