TECH TALKS
Insider threats thrive in ambiguity. They exist in the space where everyday work and malicious intent overlap. Traditional defenses are not built to detect that overlap, they are built to stop outsiders, not to question the behavior of insiders who look legitimate until the moment they are not. User Entity and Behavior Analytics (UEBA) fills that gap by establishing a behavioral perimeter around every identity and device.
It catches the subtle deviations: the login at the wrong hour from the wrong host, the sudden spike in USB writes, the quiet printer that becomes a bulk output device overnight, the unusual transfer to a personal email account. No single anomaly tells the whole story, but together they reveal intent long before an insider reaches their goal.
We’ll explore some examples of these threats with the UEBA capability available in ES Premier and how a robust UEBA program gives organizations the visibility, context, and confidence needed to detect these threats early, before a quiet deviation turns into a reputation-damaging breach.
| Time | Place | Details |
|---|---|---|
| 10:00am - 10:55am | Expo Hall | Meet and greet in the lobby outside the Expo Hall before the General Assembly. |
| 11:00am - 11:55am | Rm 314 | Expert Track: TOP 10 WAYS TO MAKE A DIFFERENCE IN THE INDUSTRY | John Dough, CFO Marketizingly |
| 11:00am - 11:55am | Rm 159 | Social Track: MODERN NETWORKING | Hosted by: SponsorName |
Pellentesque non magna eget ex lobortis finibus. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Etiam nec arcu non eros hendrerit viverra a vitae libero. Etiam et ultricies nulla. Donec euismod lectus magna, eu dignissim mauris hendrerit vulputate.

Director, Product Management,
Splunk

Senior Staff Software Engineer – Security AI,
Splunk

Principal Engineer- Security AI,
Splunk