Logrhythm CISOs Investigate User Behavior Analytics Whitepaper 2016

TABLE OF CONTENTS Table of Contents INTRODUCTION.......................................................................................................................................................................................................4 A CISO LOOKS AT THE HISTORY OF UBA.....................................................................................................................................................................5 TECHNOLOGY OVERVIEW...............................................................................................................................................................................................8 UBA Core Features...........................................................................................................................................................................................8 A Deeper Dive into UBA..................................................................................................................................................................................9 Key Considerations..........................................................................................................................................................................................9 To Deploy or Not to Deploy.........................................................................................................................................................................10 SELLING TO THE C-SUITE..............................................................................................................................................................................................11 Reducing Potential Losses from a Breach.............................................................................................................................................12 UBA’s Role in the Defense-in-Depth Approach ...................................................................................................................................12 Maintaining Compliance through UBA....................................................................................................................................................13 Staffing Implications.....................................................................................................................................................................................15 When UBA May Have Stopped Real World Breaches............................................................................................................................16 Beyond Security: Other Business Cases for UBA................................................................................................................................17 MARKET ASSESSMENT...................................................................................................................................................................................................19 KEY TAKEAWAYS...............................................................................................................................................................................................................23 First Takeaway – A Win-Win for CISOs.......................................................................................................................................................23 Second Takeaway – Effective Across Industries.....................................................................................................................................25 Third Takeaway – A Natural Fit for Risk-based Security....................................................................................................................26 SUSTAINABILITY........................................................................................................................................................................................................................27 WHEN UBA DOESN’T WORK.........................................................................................................................................................................................29 S U M M A R Y ..................................................................................................................................................................................30 CISO CONTRIBUTIONS...................................................................................................................................................................................................31 Actian Corporation........................................................................................................................................................................................31 A e t n a ................................................................................................................................................................................33 B a r c l a y s ..................................................................................................................................................................................36 I B M ...........................................................................................................................................................................................37 Levi Strauss & Company.............................................................................................................................................................................39 MIAX Options...................................................................................................................................................................................................42 Oppenheimer & Co.........................................................................................................................................................................................44 RWJBarnabas Health......................................................................................................................................................................................47 S u r e s c r i p t s ...................................................................................................................................................................................50 APPENDIX A – COMPLIANCE.......................................................................................................................................................................................53 APPENDIX B – SUPPLEMENTAL INFORMATION & RESOURCES.....................................................................................................................59 APPENDIX C – VENDOR RFIs....................................................................................................
Please complete the form to gain access to this content