Preview Mode Links will not work in preview mode

Real-world conversations with top security execs. Prepare to be enlightened, engaged, perhaps challenged & definitely informed while getting to know the pros responsible for it all.

Jul 14, 2015

Massive database breaches have resulted in millions of user identification and authentication profiles being compromised. Identifying unauthorized attempts to access systems or accounts is a basic requirement for financial institutions, etailers, retailers, healthcare provides and other enterprises.

Knowing the difference between employee and attacker behavior is key to avoiding security alert fatigue and using scarce resources to parse the good from the bad access attempts.

Further, collecting information about rogue takeovers for forensics purposes is a a good idea. Security Current's Vic Wheatman speaks on these issues and others with Mark Seward, Vice President of Marketing for Exabeam in this sponsored podcast.