Examining the challenges presented by the disappearance of the perimeter and how UEBA technology can defend a company’s most-prized possession - its data - to remain competitive, compliant and secure.
2. Background
JonnyTennyson
Head of CustomerSuccess
• Spun out of Napier University Edinburgh by CEO& Founder DrJamie Graves in 2011
• Multiple awardsfor CyberInnovation, Best Product, Best StartUp
• Global customers – ZoneFox Headquarters in Edinburgh
• Startup toscale up - 3 people to30+
• Growth driven byinnovation anddifferentiation
• Now a company
3. Who are we?
ZoneFox is an award winning market leader in User
Behaviour Analytics, providing critical insights around
data-flow that you need to secure against theInsiderThreat.
A few of our reference customers…
4. Cyber Security - traditional methods
Intrusion Detection
Perimeter Protection
Anti Virus
Firewalls
Application Whitelisting
Network Packet Inspection
Encryption
Next Generation Anti Virus
Log aggregation & SIEM
6. Why such a risk in business today?
People working from home “a threat to
Cyber Security” charities warned
Neil Sinclair, London Digital Security Centre
7. So what is Insider Threat
?
• People –asset and a liability
• Accidental, malicious, careless, collusion
• Causes - lackof training, lack of controls, lackof visibility, easy to
bypass controls
10. Sandra the Spy
• Financial Pressures
• Personal Matters that may lead
to blackmail
• Disgruntled – Show of defiance
11. Careless Caroline
• Ignorant of Security Policy
• Not been Trained
• Under Pressure
• Trying to get her job done
• Victim of Phishing/Social
Engineering
13. Relevance to the Enterprise
Job titles that didn’t really exist 3 years ago;
• Head of Insider Threat Deloitte
• Insider Threat Consultant EY
• Insider Cyber Risk Assessor Barclays
• Insider Threat Analyst BAE Systems
• Director of Insider Threat GE
• Head of Investigation & Insider Threat Worldpay
• VP of Insider Threat Citizens Bank
• Insider Risk Manager Lloyds BG
• Head of Data – Insider Risk HSBC
Source - LinkedIn Sept 2018
14. Telecom giant accuses employee
of data theft - May 2016
“Company insiders are behind 1 in
every 4 data breaches” The Register,
April 2018
15. Analyze. Detect. Protect.
Conclusion
• People / Employees are the perimeter
• Partners are the perimeter
• Supply chain is the perimeter
• Is there really a perimeter?