Leading US Chief Security Officers Discuss Emergence of Identity as the Primary Source of Cyber Attacks in New Book

Borderless Behavior Analytics – Who’s Inside? What’re They Doing? Compiles Articles from Leaders Across Fortune 200 and Defense Industries

LOS ANGELES, Calif. – Feb. 2, 2017 – Gurucul, a leader in user and entity behavior analytics (UEBA) and identity analytics (IdA) for on-premises and the cloud from the context of big data with machine learning, today announced the release of its first book, Borderless Behavior Analytics – Who’s Inside? What’re They Doing?  by CEO Saryu Nayyar. The book features a compilation of articles by some of America’s top  CISOs and CSOs exploring the evolution of cyber environments and how identity has become the fulcrum for most of today’s more serious attacks and data theft.

“With the advent of ubiquitous mobility and cloud-based computing fragmenting environments, business has crossed the threshold into a brave new world of increased productivity and cost savings, yet companies are struggling with how to address security and risk without perimeters,” said Saryu Nayyar, CEO of Gurucul. “The idea for Borderless Behavior Analytics came out of the many discussions I’ve had with leading CSOs who view identity as ground zero in the fight against cyber adversaries. This book captures the thinking of some the world’s most respected security practitioners, in their own words.”

Borderless Behavior Analytics (Borderless Behavior Analytics) is available in trade paperback from Amazon.com and will also be available at Gurucul booth 2407, South Hall, at the RSA Conference in San Francisco during Expo hours. The author and several contributors will be available for book signings at the booth Monday, Feb 13, from 5-6PM and Tuesday Feb 14, from Noon-4 PM.

About Borderless Behavior Analytics  – Who’s Inside? What’re They Doing?

In a collection of thought provoking chapters that contain shared experiences and best practices, the book explores the growing importance and lack of awareness of identity as an access risk and threat plane, also known as the CIO and CISO divide. Some of the chapter highlights include:

  • Gary Eppinger, CISO of Carnival Corporation, on the impact of cloud and mobile on the security landscape for operations on land and at sea creating a hyper-hybrid environment with volumes of data for analytics from machine learning.
  • Jerry Archer, CSO of a Major Financial Services Company, on the challenges associated with account compromise and misuse, insider threats, and using a “resilient defense” model to make it difficult for attackers to exfiltrate data once an environment has been compromised.
  • Joe Sullivan, CSO of Uber, on the fact that existing security defenses were built to protect an enterprise architecture that no longer exists and where we need to go leveraging machine learning from the context of big data.
  • Teri Takai, former CIO of the Department of Defense (DoD) and current advisor for the Center for Digital Government, on why a new approach to security that places identity and access at its core is required to protect digital and physical assets.
  • Robert Rodriguez, Chairman and Founder of the Security Innovation Network(™) (SINET), on the levers for security innovation and why defenses advance in small increments, driving an additive approach with flexibility.
  • Leslie K. Lambert, former CISO of Juniper Networks and Sun Microsystems, on the application of machine learning based behavior analytics to use cases, and leveraging the unique context of users and project managers for knowledge beyond SOC teams with self-audits and automated risk response.
  • Gary Harbison, CISO of Monsanto, on the limitations of human processing for finding and responding to access risks and unknown threats and the growing role and promise of machine learning and behavior analytics in cyber security for multi-cloud environments.

“This book is a collection of thought-provoking content from industry luminaries presenting practical guidance based on expertise essential to the impact of models on security risk-based maturity, for enterprises large and small, moving at customer speed,” said Jim Routh, CSO, Aetna.

“Borderless Behavior Analytics identifies the challenges behind a critical new class of security threat which CISOs should be aware of. The experts provide informative and insightful information,” said Renee Guttmann-Stark, CISO. “This book should be a standard reference for security leaders.”

The editorial team has already started working with new contributors and an early preview of their articles is included in the first edition book.  Jairo Orea, Chief Information Security Architect for a Fortune 10 company, weighs in on hybrid environment architecture and the role of data brokers, cloud brokers and identity brokers. Devin Bhatt, CISO and Chief Privacy Officer for the U.S. Federal Government, provides a focused perspective on insider threats as a new chapter in the second edition.  Those individuals interested in future editions, supporting blogs and comments about the book should visit Borderless Behavior Analytics.

About Gurucul

Gurucul is changing the way enterprises protect themselves against insider threats, account compromise and data exfiltration on-premises and in the cloud. The company’s user behavior analytics and identity access intelligence technology use machine learning anomaly detection and predictive risk-scoring algorithms to reduce the attack surface for accounts, unnecessary access rights and privileges, and to identify, predict and prevent breaches. Gurucul technology is used globally by organizations to detect insider threats, cyber fraud, IP theft, external attacks and more. The company is based in Los Angeles.   To learn more, visit www.gurucul.com and follow us on LinkedIn and Twitter.

Share this page:

Related Posts