Tracking Anomalous Behaviors of Legitimate Identities

Defense in Depth

15-02-2024 • 34 mins

All links and images for this episode can be found on CISO Series.

The Verizon DBIR found that about half of all breaches involved legitimate credentials. It’s a huge attack surface that we’re only starting to get a handle of.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our guest, Adam Koblentz, field CTO, Reveal Security.

In this episode:

  • Where are we in terms of monitoring anomalous behavior of our users?

  • Why are we still struggling to understand what happens after threat actors are in our networks?

  • How are new AI-based tools helping us to scale efforts?

  • What's working and where do we need to improve?

Thanks to our podcast sponsor, Reveal Security

Reveal Security ITDR detects identity threats - post authentication - in and across SaaS applications and cloud services. Powered by unsupervised machine learning, it continuously monitors and validates the behavior of trusted human users, APIs and other entities, accurately detecting anomalies that signal an in-progress identity threat. Visit reveal.security

You Might Like

Darknet Diaries
Darknet Diaries
Jack Rhysider
Hard Fork
Hard Fork
The New York Times
TechStuff
TechStuff
iHeartPodcasts
Acquired
Acquired
Ben Gilbert and David Rosenthal
WSJ’s The Future of Everything
WSJ’s The Future of Everything
The Wall Street Journal
Search Engine
Search Engine
PJ Vogt, Audacy, Jigsaw
The Vergecast
The Vergecast
The Verge
Well There‘s Your Problem
Well There‘s Your Problem
Justin Roczniak, Liam Anderson, Alice Caldwell-Kelly
Double Tap
Double Tap
Accessible Media Inc.
Rich On Tech
Rich On Tech
Rich DeMuro
Hacked
Hacked
Hacked