Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
Defense in Depth - Tracking Anomalous Behaviors of Legitimate Identities

Tracking Anomalous Behaviors of Legitimate Identities

02/15/24 • 34 min

Defense in Depth

All links and images for this episode can be found on CISO Series.

The Verizon DBIR found that about half of all breaches involved legitimate credentials. It’s a huge attack surface that we’re only starting to get a handle of.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our guest, Adam Koblentz, field CTO, Reveal Security.

In this episode:

  • Where are we in terms of monitoring anomalous behavior of our users?
  • Why are we still struggling to understand what happens after threat actors are in our networks?
  • How are new AI-based tools helping us to scale efforts?
  • What's working and where do we need to improve?

Thanks to our podcast sponsor, Reveal Security

Reveal Security ITDR detects identity threats - post authentication - in and across SaaS applications and cloud services. Powered by unsupervised machine learning, it continuously monitors and validates the behavior of trusted human users, APIs and other entities, accurately detecting anomalies that signal an in-progress identity threat. Visit reveal.security

plus icon
bookmark

All links and images for this episode can be found on CISO Series.

The Verizon DBIR found that about half of all breaches involved legitimate credentials. It’s a huge attack surface that we’re only starting to get a handle of.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our guest, Adam Koblentz, field CTO, Reveal Security.

In this episode:

  • Where are we in terms of monitoring anomalous behavior of our users?
  • Why are we still struggling to understand what happens after threat actors are in our networks?
  • How are new AI-based tools helping us to scale efforts?
  • What's working and where do we need to improve?

Thanks to our podcast sponsor, Reveal Security

Reveal Security ITDR detects identity threats - post authentication - in and across SaaS applications and cloud services. Powered by unsupervised machine learning, it continuously monitors and validates the behavior of trusted human users, APIs and other entities, accurately detecting anomalies that signal an in-progress identity threat. Visit reveal.security

Previous Episode

undefined - Why Do Cybersecurity Startups Fail?

Why Do Cybersecurity Startups Fail?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our guest, Mike Levin, deputy CISO, 3M.

In this episode:

  • Why do security startups fail?
  • All startups are an inherently risky proposition, but what are the specific challenges for startups in our industry?
  • What's unique about cybersecurity startups?
  • What's the most common reason you've seen a cyber startup not succeed?

Thanks to our podcast sponsor, RevealSecurity!

Reveal Security ITDR detects identity threats - post authentication - in and across SaaS applications and cloud services. Powered by unsupervised machine learning, it continuously monitors and validates the behavior of trusted human users, APIs and other entities, accurately detecting anomalies that signal an in-progress identity threat. Visit reveal.security

Next Episode

undefined - When Is Data an Asset and When Is It a Liability?

When Is Data an Asset and When Is It a Liability?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is my guest, Mario Trujillo, staff attorney, Electronic Frontier Foundation.

In this episode:

  • Data is the life blood of an organization but what happens when you collect too much?
  • Do you put risk on both your organization and for any individuals that data belongs too?
  • Is it still wise to collect as much data as possible?
  • How can CISOs embrace data minimization that doesn't clash with the needs of the business?

Thanks to our podcast sponsor, Material Security

Material Security is purpose-built to stop attacks and reduce risk across Microsoft 365 and Google Workspace with unified cloud email security, data loss prevention, and posture management. Learn more at material.security.

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/defense-in-depth-132982/tracking-anomalous-behaviors-of-legitimate-identities-44943325"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to tracking anomalous behaviors of legitimate identities on goodpods" style="width: 225px" /> </a>

Copy