Detecting Imposters and Rogue Insiders in Enterprise Applications

CISO Council

October 25, 2022 - North America

Speakers

LeeBrian Gaskins

SAVP, IT & CIO

University of Houston-Clear Lake

Council Speaker

Established in 1927 and headquartered in Houston, Texas, The University of Houston is a public research university.

Shereen Jones

Group CIO

The Jamaica National Group

Council Speaker

The Jamaica National Group is committed to the success and growth of its members while using business as a force for good so that, together, they can improve the outcome of Jamaicans wherever they may reside.

Ben Halpert

Council Speaker

Ben Halpert is a man on a mission: to educate and empower today’s digital citizens in the workplace, at schools, and at home. By day, he is the CISO at Groupon bringing his global experience in Risk Management, Cyber Security, Physical Security, Audit, Privacy, Compliance, and IT to benefit their merchants and customers. By night, he champions cyber ethics education throughout society via the 501(c)3 nonprofit Savvy Cyber Kids he founded in 2007. Ben is honored to speak and keynote at conferences and events worldwide. He has presented at the World Economic Forum, multiple times at the RSA Security Conference, InfoSec World Conference & SecureWorld events. Ben was invited to present at TEDxKids@Vilnius (Raising Savvy Cyber Kids) and TEDxSaintThomas (Technology addiction and what you can do about it). In addition, Ben has presented at IEEE, ACM, CSO50, CISO Summits, the Worth Safety & Security Summit and many other events over his career. Based on his early research and experience in the then emerging field of Cloud Computing, Ben was invited to publish Auditing Cloud Computing: A Security and Privacy Guide through John Wiley & Sons. Ben was a contributing author to Readings and Cases in the Management of Information Security and the Encyclopedia of Information Ethics & Security, wrote the security column for Mobile Enterprise Magazine and has contributed to seven NIST special publications. Through Savvy Cyber Kids, Ben provides cyber ethics educational and awareness sessions for parents, teachers, and students – from preschool through high school. Ben is the award-winning author of The Savvy Cyber Kids at Home children’s book series (The Family Gets a Computer, The Defeat of the Cyber Bully, and Adventures Beyond the Screen). As a trusted voice on a variety of cyber security issues, Ben has made numerous TV and radio appearances and has been featured in newspapers and magazines such as The New York Times, Wired, BBC, Kilinger, Good Morning America, Good Day Atlanta, CNN HLN, Fox News, RogersTV, RTVI, 11 Alive, WSB-TV, among others.

Dr. David Movshovitz

Co-Founder & CTO

RevealSecurity

Council Speaker

Dr. David Movshovitz is an expert in software development and information security. David was previously the co-founder and VP R&D at Algotec Systems (acquired by Kodak), CTO and VP R&D of Magnifire (acquired by F5 Networks), and CTO and Co-Founder of Navajo Systems (acquired by Salesforce.com). David also headed an R&D team in the Israeli Defense Forces and is the recipient of the Israeli Defense Award. Dr. Movshovitz earned his PhD in Physics from Bar-Ilan University and teaches Information Technology, System Architecture, developing secure applications, and web security at the Inter Disciplinary Center (IDC) and Tel-Aviv University (TAU).

Ben Halpert

CSO

Castle Black

Council Speaker

Ben Halpert is a man on a mission: to educate and empower today’s digital citizens in the workplace, at schools, and at home. By day, he is the CISO at Groupon bringing his global experience in Risk Management, Cyber Security, Physical Security, Audit, Privacy, Compliance, and IT to benefit their merchants and customers. By night, he champions cyber ethics education throughout society via the 501(c)3 nonprofit Savvy Cyber Kids he founded in 2007. Ben is honored to speak and keynote at conferences and events worldwide. He has presented at the World Economic Forum, multiple times at the RSA Security Conference, InfoSec World Conference & SecureWorld events. Ben was invited to present at TEDxKids@Vilnius (Raising Savvy Cyber Kids) and TEDxSaintThomas (Technology addiction and what you can do about it). In addition, Ben has presented at IEEE, ACM, CSO50, CISO Summits, the Worth Safety & Security Summit and many other events over his career. Based on his early research and experience in the then emerging field of Cloud Computing, Ben was invited to publish Auditing Cloud Computing: A Security and Privacy Guide through John Wiley & Sons. Ben was a contributing author to Readings and Cases in the Management of Information Security and the Encyclopedia of Information Ethics & Security, wrote the security column for Mobile Enterprise Magazine and has contributed to seven NIST special publications. Through Savvy Cyber Kids, Ben provides cyber ethics educational and awareness sessions for parents, teachers, and students – from preschool through high school. Ben is the award-winning author of The Savvy Cyber Kids at Home children’s book series (The Family Gets a Computer, The Defeat of the Cyber Bully, and Adventures Beyond the Screen). As a trusted voice on a variety of cyber security issues, Ben has made numerous TV and radio appearances and has been featured in newspapers and magazines such as The New York Times, Wired, BBC, Kilinger, Good Morning America, Good Day Atlanta, CNN HLN, Fox News, RogersTV, RTVI, 11 Alive, WSB-TV, among others.

October 25, 2022

Agenda

All times Central Time

3:00 PM-4:15 PM

Detecting Imposters and Rogue Insiders in Enterprise Applications

The combination of rogue insiders and external attackers makes application detection a massive pain point for enterprises, particularly within core business applications. External attackers leverage stolen credentials to impersonate an insider and connect to applications, while at the same time insiders are not sufficiently monitored in SaaS and home-grown applications. Such examples could include a fraudster’s takeover of a checking account via social engineering, or a customer service agent modifying an insurance policy to add themselves as a beneficiary, or a salesperson downloading a report of all customers before switching to work at a competitor. Even after the enterprise receives a complaint or is otherwise suspicious, detection of these breaches usually consists of manual sifting through tons of log data from multiple sources. This panel will explore the growing challenge of application detection and discuss potential solutions using real examples, such as the analysis of sequences of activities to accurately detect malicious activities performed by authenticated users in a business application. Current detection solutions are application-specific and in most cases ineffective.

In Partnership With