Visualizing the insider threat: Challenges and tools for identifying malicious user activity
(2015)
Presentation / Conference
Legg, P. (2015, October). Visualizing the insider threat: Challenges and tools for identifying malicious user activity. Paper presented at IEEE Symposium on Visualization for Cyber Security, Chicago, Illinois, USA
One of the greatest challenges for managing organisational cyber security is the threat that comes from those who operate within the organisation. With entitled access and knowledge of organisational processes, insiders who choose to attack have the... Read More about Visualizing the insider threat: Challenges and tools for identifying malicious user activity.