Threat detection taxonomy: Anomaly detection methods in the enterprise
Date: Jan 03, 2013Related Content
Information Security magazine: Techniques for threat prevention and best practices for threat management
Technical article: Five ways to improve a threat and vulnerability management program
Enterprise information security managers know there are many different types of attacks, and similarly, many different threat detection strategies for detecting those attacks. But which detection techniques work best to spot which attack scenarios?
In this special video presentation, expert Diana Kelley provides an enterprise threat detection taxonomy and reviews various techniques, such as anomaly detection, signature-based detection, velocity detection, correlated-threat detection, reputation-based detection and cloud-based detection. The presentation examines the pros and cons of each method and offers advice on the scenarios in which each technique works best.
About the speaker
Diana Kelley is a partner with Amherst, N.H.-based consulting firm SecurityCurve. She formerly
served as vice president and service director with research firm Burton Group. She has extensive
experience creating secure network architectures and business solutions for large corporations and
delivering strategic, competitive knowledge to security software vendors.
Security Management Strategies for the CIO