Blueprint: Build the Best in Cyber Defense

James Rowley: Creating and Running an Insider Threat Program

14 snips
Jul 12, 2022
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

James Rowley's Cybersecurity Journey

  • James Rowley shared his journey from college to insider threat detection engineering at Yahoo.
  • He emphasized his love for turning data into stories and evolving incident response skills.
INSIGHT

Insider Threats Use Familiar Methods

  • Insider threat detection relies on building stories from existing data, similar to anomalous behavior detection in cyber defense.
  • You do not need completely separate tools or methodologies to detect insiders versus external attackers.
INSIGHT

Categories of Insider Threats

  • Insider threats can be categorized into accidental, negligent, malicious insiders, and external entities controlling insider accounts.
  • Defining what constitutes an insider threat depends on organizational context and collaboration with security teams.
Get the Snipd Podcast app to discover more snips from this episode
Get the app