Addressing Insider Threat Through Big Data Analytics

Nov 01, 2013

Employees with authorized access to an organization’s network infrastructure pose a significant risk for employers. Individuals within an organization, whether disgruntled or otherwise motivated, possess the potential to cause harm in a variety of ways.

  • How do we protect against such an individual who is involved in nefarious activity?
  • Someone who seeks to harm the organization or exploit information from within the organization for the purpose of political or financial gain?
  • How can we internally track the spread of information?
  • How do we determine what is normal and abnormal behavior within our computer networks?

This paper address these types of questions and presents a new approach leveraging Big Data analytics that advances the state-of-the-art for tracking a user’s behavior within a computer network system and reduces the threat of malicious insider behavior.


What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close
SEARCH
contracts DB

Trending

  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Read More

  • Is SBA MIA on contractor fraud? Nick Wakeman

    Editor Nick Wakeman explores the puzzle of why SBA has been so silent on the latest contractor fraud scandal when it has been so quick to act in other cases. Read More

Webcasts

  • How Do You Support the Project Lifecycle?

    How do best-in-class project-based companies create and actively mature successful organizations? They find the right mix of people, processes and tools that enable them to effectively manage the project lifecycle. REGISTER for this webinar to hear how properly managing the cycle of capture, bid, accounting, execution, IPM and analysis will allow you to better manage your programs to stay on scope, schedule and budget. Learn More!

  • Sequestration, LPTA and the Top 100

    Join Washington Technology’s Editor-in-Chief Nick Wakeman as he analyzes the annual Top 100 list and reveals critical insights into how market trends have impacted its composition. You'll learn what movements of individual companies means and how the market overall is being impacted by the current budget environment, how the Top 100 rankings reflect the major trends in the market today and how the biggest companies in the market are adapting to today’s competitive environment. Learn More!