Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Splunk-New-Microsite-logo.png
Splunk

Financial Agencies: Improve Anomaly Detection and Fight Insider Threat


Event Date: August 30, 2022
Hosted By: Splunk & Carahsoft

The phrase “insider threat” often evokes not only headaches, but the mental image of a disgruntled coworker scheming on how best to bring an organization to a grinding halt. While this is absolutely an example of an insider threat, there is way more to an insider threat program than looking for web searches on “how to steal money from my employer like they did in Office Space and/or Superman 3.”


In this session, engineers from Splunk reviewed the categories of insider threat, for example: negligent, accidental, intentional insider threats, and more. Additionally, the session covered strategies for moving beyond monitoring for outright malicious “bad behavior”, to finding malicious instances of “good behavior." No conversation about an insider threat program would be complete without the discussion of anomaly detection, but part of that discussion needs to be about the fact that anomaly detection is not right for every organization. The Splunk team talked about when anomaly detection delivers and when there are other places to focus on first. The session contained both concepts and practical advice for all, whether Splunk users or not. However, attendees got to see examples illustrated in the Splunk product suite from Splunk Enterprise, and the freely available Security Essentials, to Enterprise Security, and User Behavior Analytics.


 In this webinar we will discussed:

  • The benefits from early and timely detection of advanced and insider threats

  • Detecting malicious activity within and across the cyber kill chain

  • Detecting anomalous activity with advanced statistical analysis and machine learning

  • Gaining additional context to investigations by leveraging machine learning

  • Optimizing investigations, respond to threats, and increase operational efficiency

  • Leveraging 3rd party tools for threat management


Fill out the form below to view this archived event.


Resources


No resources were found. Please try another search.