Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Insider Threat Detection & Automation by Behaviour Analytics

OWASP Foundation via YouTube

Overview

Explore insider threat detection and automation through behavior analytics in this 23-minute OWASP Foundation talk. Delve into the importance of insider threat detection, types of insiders, and User and Entity Behavior Analytics (UEBA). Learn about anomalies, volumetric analysis, and statistics in threat detection. Discover use cases, including identity theft, and examine models, data analytics, and technology used in this field. Gain valuable insights from a case study and a comprehensive overview of insider threat detection strategies.

Syllabus

Introduction
About Hima
Disclaimer
Case Study
What is Insider Threat Detection
Why Insider Threat Detection
Types of Insiders
What is UEBA
Anomalies
Volumetric Analysis
Statistics
Use Cases
Identity Theft
Models
Data Analytics
Technology
Summary

Taught by

OWASP Foundation

Reviews

Start your review of Insider Threat Detection & Automation by Behaviour Analytics

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.