Critical Access Monitoring: How It’s Evolved and Why You Need It
Modern critical systems store immense amounts of sensitive information, from protected health information to financial data to sales leads. Organizations trust that their employees will utilize this information appropriately, but unfortunately, there are numerous examples where employees abuse their access privileges for malicious acts,
insider trading, or snooping.
To combat this risk, security and privacy officers deploy access monitoring systems to detect potential inappropriate or high-risk accesses. Over the last two decades, these monitoring systems have seen substantial changes in their methods and approaches.
In this webinar our Chief Data Scientist, Daniel Fabbri, will discuss critical access monitoring systems including: regular expressions, rules, high-risk flags, anomaly detection methods, statistical outlier methods, and context-based approaches. At the end of the webinar, you will have an understanding of:
- The history of critical access monitoring systems
- Pros and cons of each approach
- How you can adapt your monitoring program to mitigate organization-specific