Humanizing the way government tackles insider threats with cognitive computing
Insider threat strategies must look beyond current detection methods that only address access log data or authentication management. To better thwart attacks before irreparable damage is done, agencies need a holistic picture of the threat landscape and the people behind those threats.
That’s why government agencies are exploring cognitive computing technology to establish continuous monitoring programs while ensuring a trusted workforce. By analyzing electronic communications, social media and web activity, along with human resources records, cognitive computing can help agencies spot erratic behavior and prevent insider threats before they become a problem. View this Industry Perspective to find out about:
Threats to the government landscape
See where gaps exist in traditional threat detection methods, and why there are excessive false positives. Find out why agencies must marry structured indicators with insights that are buried within human behaviors, which are only uncoverable using cognitive computing.
The need for humanlike computers
Explore the definition of cognitive computing, including how it’s modeled on the human brain while applying aggregation of large data volumes. Learn how this method of detecting insider threats is applied within banking, to identify suspicious trades, transactions, or irregularities.
Continuous monitoring: A path to ever-vigilance
Discover how to continuously monitor electronic communications or web and social activity and layer them with insights from legacy solutions to achieve holistic knowledge of threats, their source and their cause. By detecting changes in patterns within electronic and voice communications, as well as other unstructured data sources, continuous monitoring can help uncover erratic behaviors and intentions and identify any potential data leakage or theft.
The difference between system-centric analytics and entity-centric analytics
Learn the process of automating the analysis of massive amounts of data, so analysts can zero in on what’s most relevant to potential threats. Rather than just filtering down and organizing a set of documents, find out how to uncover interesting facts, concepts, events and relationships defined in the data.