Inside the New Math of Behavioral Analytics for Insider and Targeted Outsider Threat Detection Focus of FileTrek CTO Stephan Jou’s Presentation of ISSA

Ottawa, ON, June 11, 2014 – Security directors, analysts, and engineers from industries such as energy and healthcare will get an inside look at how the right math can accurately detect complex insider and targeted outsider attacks, greatly reduce noise and false positives, and change the way critical data is protected at the Information Systems Security Association (ISSA) South Texas Chapter in Houston this week. FileTrek Chief Technology Officer Stephan Jou will present “Behavioral Analytics and Big Data Meet Security” on Thurs., June 12 at 11:30 a.m. at the Houston Engineering & Scientific Society (HESS) Club, 5430 Westheimer Road, Houston.

FileTrek’s Jou will cover:

  • How applying math-based behavioral analytics can more accurately detect complex and often hidden events that are the precursors to insider threats and targeted outside attacks
  • How math can compute the probability of anomalous events and apply risk scores based on the context of events and sensitivity of assets involved
  • The latest capabilities of machine learning to determine accurate baselines of system, file human and group behavior over time and identify and score deviations from these baselines
  • The future of increasingly powerful analytics and how it can be applied to security

A recent study by Ponemon Institute confirms 69% of IT security practitioners and other data custodians do not believe their organizations have the ability to identify an insider threat before it is too late. Further, some 88% said they believe the already high risk of privileged user abuse will stay the same or increase in the next 12-24 months. The only way to effectively surface and act against these threats is with new techniques in math-based threat detection that combine real-time big data collected from across an organization with advanced behavioral analytics and machine learning.

“Most detection systems are falling short because they are not looking for threats posed by humans in order to understand anomalous behaviors, nor are they applying effective mathematical and risk models in a holistic manner to detect the most risky behaviors occurring in the enterprise,” said Jou. “This is not rocket science but an important requirement for security professionals who want to understand how behavioral analytics software, when applied in a principled manner, is better able to sift through noise and identify threats to data that have been previously hidden.”

Behavioral analytics software is defined by Forrester Research as technology “that automatically builds an internal model of profile variables that describe normal, expected behavior, similar to fraud management techniques,” according to a recent report entitled “Top 15 Trend S&R Pros Should Watch: Q2 2014.”

The Information Systems Security Association (ISSA) is a not-for-profit, international professional organization of information security professionals and practitioners. It provides educational forums, publications and peer interaction opportunities that enhance the knowledge, skill and professional growth of its members. ISSA is the leading organization for information security practioners in the greater Houston area and has more than 270 members. The South Texas Chapter was awarded the Chapter of the Year in 2013.
About FileTrek
FileTrek provides efficient and effective enterprise threat detection through comprehensive event collection, advanced behavioral analytics and precise anomaly detection. FileTrek enables companies of all sizes to eliminate the noise and false positives of existing security tools and focus limited security resources on actual threats to sensitive data assets. FileTrek’s cutting-edge solution secures intellectual property, trade secrets, classified files, and other sensitive data from accidental or intentional compromise by knowledge workers, IT administrators, contractors, and partners. FileTrek solutions are deployed to protect critical data across manufacturing, life sciences, hi-tech, finance, aerospace and defense and securities brokerage industries.

Betsy Kosheff