SlideShare a Scribd company logo
1 of 31
Download to read offline
1 | © 2018 Interset Software
How To Use Artificial
Intelligence To Prevent
Insider Threats
2 | © 2018 Interset Software
Today’s	Webinar	Hosts	
Stephan Jou
CTO, Interset
Holger Schulze, CEO
Cybersecurity Insiders
3 | © 2018 Interset Software
Impact	Of	Insider	Attacks
4 | © 2018 Interset Software
Barriers	To	Insider	Threat	Management
5 | © 2018 Interset Software
Almost	All	Cybersecurity	Problems	Become	Inside(r)	Threats
Unauthorized
User
Malware
Phishing
Ransomware
CISO
Security
Architect
Security
Practitioner
• Low	Risk	Visibility
• Slow	Threat	Detection
• Increasing	Security	Spend
• Reduced	SOC	Efficiency
• Security	Tool	Integration
• Scalability,	Interoperability
• Analyst	Efficiency
• Alert	Fatigue
• Alert	Triage
• Threat	Hunting	&	Investigation
• Attack	Mitigation
6 | © 2018 Interset Software
Unauthorized
User
Malware
Phishing
Ransomware
But,	Threats	Are	Obscured	By	Too	Much	Data,	Too	Many	Systems
CISO
Security
Architect
Security
Practitioner
• Low	Risk	Visibility
• Slow	Threat	Detection
• Increasing	Security	Spend
• Reduced	SOC	Efficiency
• Security	Tool	Integration
• Scalability,	Interoperability
• Analyst	Efficiency
• Alert	Fatigue
• Alert	Triage
• Threat	Hunting	&	Investigation
• Attack	Mitigation
Perimeter
Network
Servers
Apps
Users
Data
7 | © 2018 Interset Software
Who	Wants	This	Type	Of	Risk	Visibility?
8 | © 2018 Interset Software
Current	Security	Tools	Are	Limiting
• Rules & Thresholds Based
• Fragmented
• Inefficient
• Reactive
• Scattered
• Overwhelming
• 60–80% false positives
• Not enough data for visibility
• Not enough staff
9 | © 2018 Interset Software
Where	Companies	Want	To	Use	AI
34% of companies
plan/are using AI to
mitigate security risks
10 | © 2018 Interset Software
Need	AI	To	Automate	And	Scale	To	Risk
“By 2020, 60% of digital businesses
will suffer major service failures due
to IT security teams’ inability to
manage digital risk”
Gartner
11 | © 2018 Interset Software
DEFINING AI
12 | © 2018 Interset Software
Artificial	Intelligence
Input Processing Output
Learning
Decision
&
Inference
Knowledge
& Memory
Knowledge Representation,
Ontologies, Graph
Databases, …
Prescriptive Analytics,
Optimization,
Decision Making, …
Machine Learning
(supervised, unsupervised)
NLP
Speech
Recognition
Visual
Recognition
…
Data Sources
Robotics,
Navigation
Systems
Speech
Generation
Threat Leads
13 | © 2018 Interset Software
Different	Types	Of	Machine	Learning
Source: MathWorks
Deep Learning
Learning by example Learning by pattern
discovery
14 | © 2018 Interset Software
§ Based on ideas started in 1940’s
§ Biologically inspired “Neurons”
§ Input on the left, output on the right
Learning =
§ Examples compared to actual output
§ Differences used to modify the
weights (strength of connections)
§ Iterate
Input Output
1980’s:	Neural	Networks
15 | © 2018 Interset Software
Use	a	neural	network	to	
discriminate	between	
tanks	and	trees
Data
§ 200	pictures	(100	
tanks,	100	trees)
Compute
§ One	1980’s	mainframe
Results
§ Suboptimal	:-)
1980’s:	Pentagon	&	Tanks
16 | © 2018 Interset Software
1M x cycles (Hz)
More Compute
33,000 x pixels
More Data
Convolutional, Feedforward, Adversarial
LSTM, Ensemble
Better Algorithms
Government, Universities,
Startups, Big Companies
Broad Investment
* According to Andreessen Horowitz
What’s	Different	Now?
17 | © 2018 Interset Software
AI FOR INSIDE(R)
THREAT DETECTION
18 | © 2018 Interset Software
Insider	Threat	Detection	Requires	Measuring	“Unique	Normal”
Current tools scalability shortcomings must assume
common patterns/rules for entire population
Comparing everyone to the same
pattern means many false positives
Measuring “Unique Normal” for
each user/ machine/ filesystem
/printer /.. results in accuracy
Only large scale machine learning can measure
what is normal for every user for every category
19 | © 2018 Interset Software
“Unique	Normal”,	Or	Not	Requires	Big	Data	&	Unsupervised	#ML
Supervised	approaches,	such	as	deep	learning,	is	good	for	
cybersecurity	data	with	lots	of	labels,	i.e.	malware.		The	
malware	use	case	has	decades’	worth	of	example	
binaries,	both	malicious	and	innocent.
Unsupervised	approaches	are	best	for	cybersecurity	data	
with	limited	data,	typically	without	labels,	such	as	
detecting	anomalies	indicative	of	unique	insider	threats	
where	there	is	not	enough	data	for	supervised	ML.
Supervised	learning	is	learning	by	example	
and	requires	“labeled”	data.	
Unsupervised	learning	is	self-discovery	of	
patterns	and	doesn’t	need	labels/examples.
20 | © 2018 Interset Software
Unsupervised	Machine	Learning	Requires	Big	Data	Compute
Self-Learning
Big Data Storage Big Data Compute
Contextually	
Integrated
Automated
21 | © 2018 Interset Software
Platform	Based	On	Unsupervised	Machine	Learning	&	AI	
ACQUIRE	
DATA	
HIGH	QUALITY	
THREAT	LEADS INTERNAL	RECON
INFECTED	HOST
DATA	STAGING	
&	THEFT
COMPROMISED	
ACCOUNT
LATERAL	
MOVEMENT
ACCOUNT	MISUSE
CUSTOM
FRAUD
DLP
ENDPOINT
Biz	Apps
CUSTOM	
DATA
NETWORK
IAM
Kibana
DETECT,	
MEASURE	AND	
SCORE	
ANOMALIES
CREATE	UNIQUE	
BASELINES
Contextual	views.
Drill-down	and	
cyber-hunting.
Broad	data	
collection
Determine	what	
is	normal
Gather	the	
raw	materials
Find	the	behavior	
that	matters
Workflow	engine	
for	incident	
response.
22 | © 2018 Interset Software
Measuring	Unique	Normal	Enables	Accurate	Anomaly	Detection
Data
Repository Logs
Active Directory Logs
VPN Logs
Feature Extraction
Ann moves a significant volume of data
Ann access and takes from file folders
Ann accesses anomalous repositories
Ann logs in from anomalous location
Ann logs in at unusual time of day
(other features)
(other features)
(other features)
𝑝"
𝑝#
𝑝$
∑
𝑝%
𝑝&
𝑤"
𝑤#
𝑤$
𝑤%
𝑤&
Anomaly Detection
Auth./Access
Anomaly Model
File Access &
Usage Models
Volumetric Models
VPN Anomaly
Models
Entity Risk Aggregation
Entities
- Account
- Machine
- File
- Application
96
23 | © 2018 Interset Software
AI	Transforms	Existing	Security	Data	Into	Threat	Leads
24 | © 2018 Interset Software
Here,	Interset distills	more	than	
5.1	billion	events	into	1	million	
anomalies,	for	29	validated	and	
prioritized	threat	leads
Anomalies	Detected	By	AI	Are	Surfaced	In	The	User	Interface	
”Unique	Normal”	measured	for	12K	
users,	12.8K	machines,	2.4M	files,	632	
projects,	59	servers,	104	shares,	82	
resources,	1.37M	websites,	12K	IP	
addresses.
Enterprise	risk	score	aggregated	
across	all	individual	entities’	
“unique	normal”	(or	not!)	
measurements.
25 | © 2018 Interset Software
Ex.	Data	Exfiltration	via	Email	Anomaly	Detection	(e.g.	Proofpoint)
960	GB	of	email	
data	per	hour	was	
observed	at	3-4	am,	
higher	than	any	
personal	or	
population	norm
Yaman has	a	norm	
of	1.5	kB	of	
email/hr
Yaman has	a	high	of	
2.4	kB	of	email/hr
1
Avg of	14.8	kB	of	
email/hr for	all	pop.
690	MB/hr of	email	
is	expected	high	for	
all	pop.
2
3
26 | © 2018 Interset Software
Ex:	Insider	Fraud	Detection	via	Expense	Reporting	Anomalies
18	
entertainment	
claims	in	a	
week	- higher	
than	any	norm
Norm	of	6	
for	D	Larkin
High	of	4	
for	D	Larkin
Avg 1.5	for	
all	users
High	16	for	
all	users
1
2
3
27 | © 2018 Interset Software
Ex:	Using	Anomalies	To	Distinguish	Humans	From	Bots
TCP/465	on	this	
machine	is	not	a	
human	activity
This	particular	machine	
doesn’t	normally	have	
humans	using	it	at	4am
1
2
Click	to	Investigate	
Potential	Infected	Host
3
28 | © 2018 Interset Software
Unauthorized
User
Malware
Phishing
Ransomware
AI	Surfaces	The	Insider	Threats	Hidden	By	All	The	Noise
CISO
Security
Architect
Security
Practitioner
• Accelerated	Threat	Detection
• Expanded	Risk	Visibility
• Increased	SOC	Efficiency
• Optimize	Security	Investments
• Augment	Security	Tools
• Integrated	Risk	Visibility
• Noise-Cancelling	Analytics
• Integrated	Platform
• Faster,	Focused	Threat	Hunting
• Accelerated	Alert	Triage
• Guided	Investigation
• Detect	Multi-faceted	Attacks
29 | © 2018 Interset Software
AI	Enables	Automated	Trace	And	Investigation	Of	Insider	Threats
30 | © 2018 Interset Software
About	Interset.AI
SECURITY	ANALYTICS	LEADER PARTNERSABOUT	US
Data science & analytics
focused on cybersecurity
100	person-years	of	security	
analytics	and		anomaly	
detection	R&D
Offices in Ottawa, Canada;
Newport Beach, CA
Interset.AI
31 | © 2018 Interset Software
QUESTIONS?
INTERSET.AI

More Related Content

What's hot

User and Entity Behavioral Analytics
User and Entity Behavioral AnalyticsUser and Entity Behavioral Analytics
User and Entity Behavioral AnalyticsInterset
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsInterset
 
The Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning CybersecurityThe Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning CybersecurityInterset
 
A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics Interset
 
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...Interset
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security Robert Smith
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Interset
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowMapR Technologies
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Stefaan Van daele
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...Forcepoint LLC
 
Webinar: Will the Real AI Please Stand Up?
Webinar: Will the Real AI Please Stand Up?Webinar: Will the Real AI Please Stand Up?
Webinar: Will the Real AI Please Stand Up?Interset
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurSri Ambati
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...SaraPia5
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Raffael Marty
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Coastal Pet Products, Inc.
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
User Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To CompaniesUser Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To CompaniesSpectorsoft
 
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already KnowCybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Knowjxyz
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in CybersecurityForcepoint LLC
 

What's hot (20)

User and Entity Behavioral Analytics
User and Entity Behavioral AnalyticsUser and Entity Behavioral Analytics
User and Entity Behavioral Analytics
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
 
The Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning CybersecurityThe Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning Cybersecurity
 
A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics
 
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
Webinar: Will the Real AI Please Stand Up?
Webinar: Will the Real AI Please Stand Up?Webinar: Will the Real AI Please Stand Up?
Webinar: Will the Real AI Please Stand Up?
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title)
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
User Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To CompaniesUser Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To Companies
 
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already KnowCybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 

Similar to WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats

[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral AnalyticsInterset
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsInterset
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wpCMR WORLD TECH
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetWatcher
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityTasnim Alasali
 
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...IBM Security
 
Introduction to MicroSolved, Inc.
Introduction to MicroSolved, Inc.Introduction to MicroSolved, Inc.
Introduction to MicroSolved, Inc.MRMaguire
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018Panda Security
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sectorCore Security
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datosSoftware Guru
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM
 

Similar to WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats (20)

[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
How AI can help with cybersecurity
How AI can help with cybersecurityHow AI can help with cybersecurity
How AI can help with cybersecurity
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
 
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
 
Introduction to MicroSolved, Inc.
Introduction to MicroSolved, Inc.Introduction to MicroSolved, Inc.
Introduction to MicroSolved, Inc.
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 

More from Interset

IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]Interset
 
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum DC: Everything is a Nail! Machine Learning in CybersecurityIANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum DC: Everything is a Nail! Machine Learning in CybersecurityInterset
 
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Charlotte: Everything is a Nail! Machine Learning in CybersecurityIANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Charlotte: Everything is a Nail! Machine Learning in CybersecurityInterset
 
IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Seattle: Everything is a Nail! Machine Learning in CybersecurityIANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Seattle: Everything is a Nail! Machine Learning in CybersecurityInterset
 
Infographic: Inside Data Breaches
Infographic: Inside Data BreachesInfographic: Inside Data Breaches
Infographic: Inside Data BreachesInterset
 
Lead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkLead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkInterset
 

More from Interset (6)

IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
 
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum DC: Everything is a Nail! Machine Learning in CybersecurityIANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
 
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Charlotte: Everything is a Nail! Machine Learning in CybersecurityIANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
 
IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Seattle: Everything is a Nail! Machine Learning in CybersecurityIANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
 
Infographic: Inside Data Breaches
Infographic: Inside Data BreachesInfographic: Inside Data Breaches
Infographic: Inside Data Breaches
 
Lead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkLead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less Work
 

Recently uploaded

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats

  • 1. 1 | © 2018 Interset Software How To Use Artificial Intelligence To Prevent Insider Threats
  • 2. 2 | © 2018 Interset Software Today’s Webinar Hosts Stephan Jou CTO, Interset Holger Schulze, CEO Cybersecurity Insiders
  • 3. 3 | © 2018 Interset Software Impact Of Insider Attacks
  • 4. 4 | © 2018 Interset Software Barriers To Insider Threat Management
  • 5. 5 | © 2018 Interset Software Almost All Cybersecurity Problems Become Inside(r) Threats Unauthorized User Malware Phishing Ransomware CISO Security Architect Security Practitioner • Low Risk Visibility • Slow Threat Detection • Increasing Security Spend • Reduced SOC Efficiency • Security Tool Integration • Scalability, Interoperability • Analyst Efficiency • Alert Fatigue • Alert Triage • Threat Hunting & Investigation • Attack Mitigation
  • 6. 6 | © 2018 Interset Software Unauthorized User Malware Phishing Ransomware But, Threats Are Obscured By Too Much Data, Too Many Systems CISO Security Architect Security Practitioner • Low Risk Visibility • Slow Threat Detection • Increasing Security Spend • Reduced SOC Efficiency • Security Tool Integration • Scalability, Interoperability • Analyst Efficiency • Alert Fatigue • Alert Triage • Threat Hunting & Investigation • Attack Mitigation Perimeter Network Servers Apps Users Data
  • 7. 7 | © 2018 Interset Software Who Wants This Type Of Risk Visibility?
  • 8. 8 | © 2018 Interset Software Current Security Tools Are Limiting • Rules & Thresholds Based • Fragmented • Inefficient • Reactive • Scattered • Overwhelming • 60–80% false positives • Not enough data for visibility • Not enough staff
  • 9. 9 | © 2018 Interset Software Where Companies Want To Use AI 34% of companies plan/are using AI to mitigate security risks
  • 10. 10 | © 2018 Interset Software Need AI To Automate And Scale To Risk “By 2020, 60% of digital businesses will suffer major service failures due to IT security teams’ inability to manage digital risk” Gartner
  • 11. 11 | © 2018 Interset Software DEFINING AI
  • 12. 12 | © 2018 Interset Software Artificial Intelligence Input Processing Output Learning Decision & Inference Knowledge & Memory Knowledge Representation, Ontologies, Graph Databases, … Prescriptive Analytics, Optimization, Decision Making, … Machine Learning (supervised, unsupervised) NLP Speech Recognition Visual Recognition … Data Sources Robotics, Navigation Systems Speech Generation Threat Leads
  • 13. 13 | © 2018 Interset Software Different Types Of Machine Learning Source: MathWorks Deep Learning Learning by example Learning by pattern discovery
  • 14. 14 | © 2018 Interset Software § Based on ideas started in 1940’s § Biologically inspired “Neurons” § Input on the left, output on the right Learning = § Examples compared to actual output § Differences used to modify the weights (strength of connections) § Iterate Input Output 1980’s: Neural Networks
  • 15. 15 | © 2018 Interset Software Use a neural network to discriminate between tanks and trees Data § 200 pictures (100 tanks, 100 trees) Compute § One 1980’s mainframe Results § Suboptimal :-) 1980’s: Pentagon & Tanks
  • 16. 16 | © 2018 Interset Software 1M x cycles (Hz) More Compute 33,000 x pixels More Data Convolutional, Feedforward, Adversarial LSTM, Ensemble Better Algorithms Government, Universities, Startups, Big Companies Broad Investment * According to Andreessen Horowitz What’s Different Now?
  • 17. 17 | © 2018 Interset Software AI FOR INSIDE(R) THREAT DETECTION
  • 18. 18 | © 2018 Interset Software Insider Threat Detection Requires Measuring “Unique Normal” Current tools scalability shortcomings must assume common patterns/rules for entire population Comparing everyone to the same pattern means many false positives Measuring “Unique Normal” for each user/ machine/ filesystem /printer /.. results in accuracy Only large scale machine learning can measure what is normal for every user for every category
  • 19. 19 | © 2018 Interset Software “Unique Normal”, Or Not Requires Big Data & Unsupervised #ML Supervised approaches, such as deep learning, is good for cybersecurity data with lots of labels, i.e. malware. The malware use case has decades’ worth of example binaries, both malicious and innocent. Unsupervised approaches are best for cybersecurity data with limited data, typically without labels, such as detecting anomalies indicative of unique insider threats where there is not enough data for supervised ML. Supervised learning is learning by example and requires “labeled” data. Unsupervised learning is self-discovery of patterns and doesn’t need labels/examples.
  • 20. 20 | © 2018 Interset Software Unsupervised Machine Learning Requires Big Data Compute Self-Learning Big Data Storage Big Data Compute Contextually Integrated Automated
  • 21. 21 | © 2018 Interset Software Platform Based On Unsupervised Machine Learning & AI ACQUIRE DATA HIGH QUALITY THREAT LEADS INTERNAL RECON INFECTED HOST DATA STAGING & THEFT COMPROMISED ACCOUNT LATERAL MOVEMENT ACCOUNT MISUSE CUSTOM FRAUD DLP ENDPOINT Biz Apps CUSTOM DATA NETWORK IAM Kibana DETECT, MEASURE AND SCORE ANOMALIES CREATE UNIQUE BASELINES Contextual views. Drill-down and cyber-hunting. Broad data collection Determine what is normal Gather the raw materials Find the behavior that matters Workflow engine for incident response.
  • 22. 22 | © 2018 Interset Software Measuring Unique Normal Enables Accurate Anomaly Detection Data Repository Logs Active Directory Logs VPN Logs Feature Extraction Ann moves a significant volume of data Ann access and takes from file folders Ann accesses anomalous repositories Ann logs in from anomalous location Ann logs in at unusual time of day (other features) (other features) (other features) 𝑝" 𝑝# 𝑝$ ∑ 𝑝% 𝑝& 𝑤" 𝑤# 𝑤$ 𝑤% 𝑤& Anomaly Detection Auth./Access Anomaly Model File Access & Usage Models Volumetric Models VPN Anomaly Models Entity Risk Aggregation Entities - Account - Machine - File - Application 96
  • 23. 23 | © 2018 Interset Software AI Transforms Existing Security Data Into Threat Leads
  • 24. 24 | © 2018 Interset Software Here, Interset distills more than 5.1 billion events into 1 million anomalies, for 29 validated and prioritized threat leads Anomalies Detected By AI Are Surfaced In The User Interface ”Unique Normal” measured for 12K users, 12.8K machines, 2.4M files, 632 projects, 59 servers, 104 shares, 82 resources, 1.37M websites, 12K IP addresses. Enterprise risk score aggregated across all individual entities’ “unique normal” (or not!) measurements.
  • 25. 25 | © 2018 Interset Software Ex. Data Exfiltration via Email Anomaly Detection (e.g. Proofpoint) 960 GB of email data per hour was observed at 3-4 am, higher than any personal or population norm Yaman has a norm of 1.5 kB of email/hr Yaman has a high of 2.4 kB of email/hr 1 Avg of 14.8 kB of email/hr for all pop. 690 MB/hr of email is expected high for all pop. 2 3
  • 26. 26 | © 2018 Interset Software Ex: Insider Fraud Detection via Expense Reporting Anomalies 18 entertainment claims in a week - higher than any norm Norm of 6 for D Larkin High of 4 for D Larkin Avg 1.5 for all users High 16 for all users 1 2 3
  • 27. 27 | © 2018 Interset Software Ex: Using Anomalies To Distinguish Humans From Bots TCP/465 on this machine is not a human activity This particular machine doesn’t normally have humans using it at 4am 1 2 Click to Investigate Potential Infected Host 3
  • 28. 28 | © 2018 Interset Software Unauthorized User Malware Phishing Ransomware AI Surfaces The Insider Threats Hidden By All The Noise CISO Security Architect Security Practitioner • Accelerated Threat Detection • Expanded Risk Visibility • Increased SOC Efficiency • Optimize Security Investments • Augment Security Tools • Integrated Risk Visibility • Noise-Cancelling Analytics • Integrated Platform • Faster, Focused Threat Hunting • Accelerated Alert Triage • Guided Investigation • Detect Multi-faceted Attacks
  • 29. 29 | © 2018 Interset Software AI Enables Automated Trace And Investigation Of Insider Threats
  • 30. 30 | © 2018 Interset Software About Interset.AI SECURITY ANALYTICS LEADER PARTNERSABOUT US Data science & analytics focused on cybersecurity 100 person-years of security analytics and anomaly detection R&D Offices in Ottawa, Canada; Newport Beach, CA Interset.AI
  • 31. 31 | © 2018 Interset Software QUESTIONS? INTERSET.AI