Combating Risky User Behavior
Can we secure our environments from risky behavior without ruining the user experience? What are the reportable metrics that show success in combating risky user behavior?
(Security Controls Covered – IAM, UEBA, Awareness, Email Security, Micro-segmentation, and Endpoint Security)
For years now users of our systems and data have not been solely employees and contractors. The business has extended nearly all internal systems to our customers and third parties. We have little or no control of how they get in, as the business wants access to frictionless and always on. With the recent pandemic, work-from-home has become the new work standard requiring remote access entirely. Attackers are well aware of this and have put significant effort into exploits that target the user, the devices they use, and the software employed to interact with applications.
Knowing that the user is often the weakest link in our security defense, how do you develop solutions that secure systems and data while making the user experience as “frictionless” as possible? The industry has responded with controls in the spaces of Identity and Access Management, User and Entity Behavior Analytics, Awareness, Email Security, Micro-segmentation, and Endpoint Security, to name a few.
We may also provide contact information in connection with our meetings to exhibitors and sponsors of these meetings. The use of this information is limited to contact in connection with such meetings. By registering for the event you agree to opt in for the sharing of this contact data.