this post was submitted on 17 Feb 2024
4 points (100.0% liked)

Security CPE

368 readers
1 users here now

Video and audio media that count towards your CPE (Continuing Professional Education) requirements for GIAC, CISSP, CISM, CRISC, CCSP, CompTIA certs.

Mostly conference talks and podcasts.

FAQ

founded 2 years ago
MODERATORS
 

Defense in Depth podcast - Tracking Anomalous Behaviors of Legitimate Identities

The Verizon DBIR found that about half of all breaches involved legitimate credentials. It’s a huge attack surface that we’re only starting to get a handle of.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our guest, Adam Koblentz, field CTO, Reveal Security.

In this episode:

  • Where are we in terms of monitoring anomalous behavior of our users?

  • Why are we still struggling to understand what happens after threat actors are in our networks?

  • How are new AI-based tools helping us to scale efforts?

  • What's working and where do we need to improve?

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here