What’s In ‘Abnormal Behavior Detection In The Enterprise‘?

Attackers are continuously changing their tactics when it comes to the methods they use to disguise their techniques. It’s becoming increasingly harder to find these attacks, and the standard detection on signatures and large copious amounts of data is no longer adequate for prevention and detection. Abnormal patterns are based on techniques that attackers use in order to compromise an organization and perform post exploitation scenarios.

This paper covers a different way of thinking about defense, and baselining your organization from a known-good strategy. As the perimeter continues to shrink, cloud infrastructure, and the mobile workforce of today – it’s never been more important to identify abnormal patterns within multiple layers.

abnormal behavior

Get the Whitepaper

About the Presenter

Dave Kennedy is a founder and the Chief Technology Officer at Binary Defense and founder and principal security consultant of TrustedSec.

Prior to Binary Defense and TrustedSec, Dave was a Chief Security Officer (CSO) for Diebold Incorporated, a Fortune 1000 company located in over 80 countries with over 20,000 employees.

Kennedy is a regular featured speaker at a number of security related conferences nationwide. He has been interviewed by several news organizations including CNN, Fox News, MSNBC, CNBC, Katie Couric, and BBC World News. He has testified in front of Congress on the threats we face in security and in the government space. He is a co-author of the book “Metasploit: The Penetration Testers Guide,” the creator of the Social-Engineer Toolkit (SET), and Artillery.

Binary Defense - Dave Kennedy