Главная
Study mode:
on
1
Introduction
2
About Hima
3
Disclaimer
4
Case Study
5
What is Insider Threat Detection
6
Why Insider Threat Detection
7
Types of Insiders
8
What is UEBA
9
Anomalies
10
Volumetric Analysis
11
Statistics
12
Use Cases
13
Identity Theft
14
Models
15
Data Analytics
16
Technology
17
Summary
Description:
Explore insider threat detection and automation through behavior analytics in this 23-minute OWASP Foundation talk. Delve into the importance of insider threat detection, types of insiders, and User and Entity Behavior Analytics (UEBA). Learn about anomalies, volumetric analysis, and statistics in threat detection. Discover use cases, including identity theft, and examine models, data analytics, and technology used in this field. Gain valuable insights from a case study and a comprehensive overview of insider threat detection strategies.

Insider Threat Detection & Automation by Behaviour Analytics

OWASP Foundation
Add to list