June 11, 2014

How to Detect Compromised Users:
Breaking the User Kill Chain

In today’s Whiteboard Wednesday, Lital Asher-Dotan, Senior Product Marketing Manager for UserInsight at Rapid7 will discuss the current chain of events an attacker must take to successfully exfiltrate data from your network.

She will then go into detail around how you can detect the abnormal behaviors that these attackers must take in order to steal your information. These abnormal behaviors should be detected in your SIEM, IDS/IPS, or you can try Rapid7's UserInsight which detects these abnormalities out of the box.

Detect Compromised Users with UserInsight

Detect user abnormalities and set alerts on activities that indicate a breach

Get Started