Learn How the NHLPA Implemented User and Entity Behavior Analytics (UEBA)
On average, 69 percent of organizations report an insider data exfiltration attempt, but the vast majority of businesses don’t feel they have sufficient security measures in place to address insider threats.
According to Gartner, 60 percent of malicious insiders are motivated financially and act in an attempt to supplement their income. For example, these users could steal intellectual property to resell to a third party or a rogue nation. About 30 percent of malicious insiders swipe information to utilize in future endeavors, such as working for or starting up a competing organization. 10 percent of malicious insiders are motivated by a desire to damage a company and its reputation.
Security mature organizations are increasingly utilizing User and Entity Behavior Analytics (UEBA) to quickly surface, prioritize, and respond to anomalous and alarming user behavior.
UEBA solutions help you detect and respond quickly to user-based threats, including malicious insiders, compromised accounts, and privileged account abuse. With UEBA, your team can achieve real-time threat detection and prevent widely known cyberattacks (e.g., brute force, spear phishing, custom malware, etc.). UEBA accomplishes this through scenario-based analytics and anomaly detection through deep behavioral profiling.
In this on-demand webinar, Stephen Frank, director of technology & security at the National Hockey League Players’ Association (NHLPA), and Matt Willems, LogRhythm technical product manager, discuss how to apply UEBA to meet security use cases. The duo will outline important UEBA use cases and examine how LogRhythm is supporting NHLPA’s security initiatives.
In the webinar, you’ll learn:
- Why UEBA is a critical security capability
- NHLPA’s security environment and use cases for applying UEBA
- How LogRhythm is advancing NHLPA’s UEBA capabilities
- A brief demo of LogRhythm’s UEBA solutions
Watch now to get an inside look at how NHLPA is working with LogRhythm to enhance its user- and entity-based threat detection capabilities.