The Key to Successful Monitoring for Detection of Insider Attacks
October 2010 • Presentation
In this presentation, Software Engineering Institute researchers show how to detect insider threats successfully by monitoring and auditing network activity.
Software Engineering Institute
This presentation on successful monitoring for detection of insider attacks was delivered by Dawn Cappelli, Randall Trzeciak, and Robert Floodeen of the Software Engineering Institute's CERT Program at the RSA Conference 2010.