search menu icon-carat-right cmu-wordmark

The Key to Successful Monitoring for Detection of Insider Attacks

Presentation
In this presentation, Software Engineering Institute researchers show how to detect insider threats successfully by monitoring and auditing network activity.
Publisher

Software Engineering Institute

Abstract

This presentation on successful monitoring for detection of insider attacks was delivered by Dawn Cappelli, Randall Trzeciak, and Robert Floodeen of the Software Engineering Institute's CERT Program at the RSA Conference 2010.