Threat detection taxonomy: Anomaly detection methods in the enterpriseDate: Jan 03, 2013
Information Security magazine: Techniques for threat prevention and best practices for threat management
Technical article: Five ways to improve a threat and vulnerability management program
Enterprise information security managers know there are many different types of attacks, and similarly, many different threat detection strategies for detecting those attacks. But which detection techniques work best to spot which attack scenarios?
In this special video presentation, expert Diana Kelley provides an enterprise threat detection taxonomy and reviews various techniques, such as anomaly detection, signature-based detection, velocity detection, correlated-threat detection, reputation-based detection and cloud-based detection. The presentation examines the pros and cons of each method and offers advice on the scenarios in which each technique works best.
About the speaker
Diana Kelley is a partner with Amherst, N.H.-based consulting firm SecurityCurve. She formerly served as vice president and service director with research firm Burton Group. She has extensive experience creating secure network architectures and business solutions for large corporations and delivering strategic, competitive knowledge to security software vendors.