User Behavior Analytics
Вставка
- Опубліковано 30 січ 2023
- UEBA: User and Entity Behavior Analytics: ibm.biz/User_Behavior_Analytics
Security starts with your organization, but what if your company has 100, 1000, or even 100,000 users? Identifying suspicious user activity simply can’t be done manually; you need a strategy for finding the “bad guys” who may be undermining your organization from within. In this video, Jeff “The Security Guy” explains how analyzing user (and entity) behaviors with UBA/UEBA tools can help cut through the haze and identify potential threats to your IT security.
Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
#AI #Software #Dev #lightboard #IBM #UEBA
This presentation was explained extremely well. Thank you!!!
I come from an ABA background, and a career in IT. This is the most fascinating thing I’ve heard in a long time. I want more content of this.
Thanks for the great feedback, Untap101! Here’s a playlist with all my videos: ua-cam.com/play/PLdw2bVqUvsk2PnreCdr5uDZ1CjwvQScKe.html
I'm also in the ABA world looking to get into IT.
I feel like you could make a comedy sketch from this:
User downloads large log data history to make ML model => User trains new model from accessed data => User goes to upgrade algorithm by loading more data into model => Model notices user accessing more data than normal => User gets fired due to heightened security risk => Model never upgraded again.
Great video, great content !
Insightful
So, create decoy anomalies and get all that has to be done from entities which can function around those anomalies, so the attention will never be drawn to them. And everything appears to fit within the square box.
thanks! helped
YOU GOT ME!
I think you shouldn't mention "rules" and "machine learning" together. then its not really machine learning, its the traditional rule based system.
Although you are correct from a Business Intelligence point of view, technically speaking there is still an initial core set of rules that defines the routine for the clustering of pathways - patterning and especially depatterning (spotting anomalies) -, soo the presenter is not entirely wrong (maybe he should've define what he meant by ''rules'').