Addressing Insider Threat Through Big Data Analytics

Nov 01, 2013

Employees with authorized access to an organization’s network infrastructure pose a significant risk for employers. Individuals within an organization, whether disgruntled or otherwise motivated, possess the potential to cause harm in a variety of ways.

  • How do we protect against such an individual who is involved in nefarious activity?
  • Someone who seeks to harm the organization or exploit information from within the organization for the purpose of political or financial gain?
  • How can we internally track the spread of information?
  • How do we determine what is normal and abnormal behavior within our computer networks?

This paper address these types of questions and presents a new approach leveraging Big Data analytics that advances the state-of-the-art for tracking a user’s behavior within a computer network system and reduces the threat of malicious insider behavior.

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
 2015 fast 50
contracts DB


  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Read More

  • Is SBA MIA on contractor fraud? Nick Wakeman

    Editor Nick Wakeman explores the puzzle of why SBA has been so silent on the latest contractor fraud scandal when it has been so quick to act in other cases. Read More