Watch David Spark, producer of CISO Series in this discussion with his guests; Purandar Das, Chief of Product and Strategy, Sotero, and Chris Hatter, CISO, Nielsen
Learnings:
What are examples of anomalous behavior?
What are the non-intrusive behaviors we should be tracking? How much intrusive tracking must we do? How does it not become more difficult for the user?
Can we train baseline so we understand unusual behavior?
What tools do we rely on to be able to spot suspicious behavior?
How do we spot anomalous behavior in machines? Can machines fake other machines?