- Use Cases
A computer and cyber security expert with almost 30 years of hands-on experience, Dr. Eric Cole consults in information technology with a focus on cyber security.
Mike has held a variety of positions in the software industry for 15+ years. In his curent position, he is responsible for establishing and growing technology and key go-to-market alliances, and for helping to shape products and services strategy.
Many organizations focus on keeping bad guys out. But, as the breaches that continue to dominate headlines demonstrate, there's bad behavior - both unintentional and intentional - happening within your borders as well. Whether a breach is caused by carelessness, mischief or major fraud, it's going to cost you.
Join Dr. Eric Cole as he leads a frank discussion with security experts Vince Berk and Mike Tierney about common insider threat scenarios, the phases of a malicious attack and how a combination of network behavior intelligence and user activity intelligence can give you the power to quickly detect, mitigate and defend against all types of insider attacks.Learn More About Vision