Threat detection taxonomy: Anomaly detection methods in the enterprise

Enterprise information security managers know there are many different types of attacks, and similarly, many different threat detection strategies for detecting those attacks. But which detection techniques work best to spot which attack scenarios?

In this special video presentation, expert Diana Kelley provides an enterprise threat detection taxonomy and reviews various techniques, such as anomaly detection, signature-based detection, velocity detection, correlated-threat detection, reputation-based detection and cloud-based detection. The presentation examines the pros and cons of each method and offers advice on the scenarios in which each technique works best.

About the speaker
Diana Kelley is a partner with Amherst, N.H.-based consulting firm SecurityCurve. She formerly served as vice president and service director with research firm Burton Group. She has extensive experience creating secure network architectures and business solutions for large corporations and delivering strategic, competitive knowledge to security software vendors.

View All Videos

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.