This resource is no longer available

Correlating SIM Information to Detect Insider Threats

How does an organization detect someone who takes a piece of information he has access to, but instead of using it to do his job, he uses it illegally or unsafely?

The only way to detect such inside attacks is to correlate information from many different sources and look for patterns or indications of harm. This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.


Eric Cole Security Expert, SANS Dr. Eric Cole is an industry recognized security expert, with over 15 year's hands-on experience. Dr. Cole currently performs leading edge security consulting and works in research and development to advance the state of the art in information systems security. Dr. Cole has experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems.
Danny Banks Director of Technical Sales, SenSage, Inc. As the Director of Technical Sales at SenSage, Danny Banks applies his unique talents and capabilities to spearhead efforts to solve the enterprise information security challenges facing our customers and prospects. As a veteran of over eleven years of technical sales experience at companies such as Sybase, OnDisplay and Vignette, Danny had supported such enterprise clients as Cisco, Sun, Hewlett-Packard, McKesson, Citigroup, Bank One, Lockheed Martin and Sabre. Danny is often called upon to speak to both small and large audiences about the realities of enterprise software solutions, and how technology translates into business benefit. Danny brings extensive market-proven experience and a clear, highly-organized delivery when communicating today's most critical issues in information security management.
Hexis Cyber Solutions Inc
Jun 18, 2007, 13:00 EDT (17:00 GMT)
00:58:52 (hh:mm:ss)

This resource is no longer available.