October 11, 2018 | Content Aggregator - Single Slide | Security Analytics and Visualization
Building an insider threat program from scratch while deploying user behavior analytics (UBA) for the first time can be daunting. In this Ask-an-Expert written response, IANS Faculty Jake Williams offers some best practice recommendations to ensure the program gets off to a successful start.
Would UEBA add any value to a mature SOC with custom security analytics? In this Ask-an-Expert live interaction, IANS Faculty Mike Rothman says it's tough to beat mature processes and custom analytics, and that a better use of resources would be focusing on training and honing current processes.