Threat Management

Can event-based analytics spot IP developers stealing their own assets?

The most likely person to steal IP is not an external threat, but rather the person who developed it and uses it every day, according to Forcepoint Chief Scientist Dr. Richard Ford. And this insider threat actually may be more difficult to detect because typical event-based security analytics may not always be adequately equipped to stop it, he explained in an interview with SC Media at the 2019 RSA conference in San Francisco.

If you use analytics, it's easy to spot, say, when you're accessing my data. But it's really hard to notice that when I access my data, my intent isn't to use it, it's to steal it," said Ford, who expounded on this topic in his very own RSA presentation this week. "Analytics around events is not good enough. What you have to do is change your unit of analysis and really understand the human."

Forcepoint this week also announced the launch of X-Labs, which it's calling the "first dedicated research division to combine deep security expertise with behavioral science research. The team will be made up of security researchers, data scientists, psychologists and counter-intelligence specialists.

Forcepoint Chief Scientist Dr. Richard Ford with SC Media's Senior Reporter Bradley Barth at RSA 2019.

Bradley Barth

As director of community content at CyberRisk Alliance, Bradley Barth develops content for SC Media online conferences and events, as well as video/multimedia projects. For nearly six years, he wrote and reported for SC Media as deputy editor and, before that, senior reporter. He was previously a program executive with the tech-focused PR firm Voxus. Past journalistic experience includes stints as business editor at Executive Technology, a staff writer at New York Sportscene and a freelance journalist covering travel and entertainment. In his spare time, Bradley also writes screenplays.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.