Detecting Anomalous Network BehaviorLive Oak Bank CIO Thomas Hill Discusses Defenses
Live Oak Bank, based in Wilmington, N.C., isn't your typical financial services institution. The bank, the second largest U.S. provider of small business loans, handles the vast majority of its business online.
See Also: 2016 Social Engineering Report
But like all financial services firms, Live Oak Bank is under constant online attack by criminals attempting to take over accounts and commit fraud, says Thomas Hill, CIO. What's essential for helping to defend against those attacks is watching for any and all anomalous behavior across networks, users and devices, he says.
In this interview at Information Security Media Group's recent Fraud and Data Breach Summit in San Francisco, where he was a featured speaker in sponsor Praesidio's presentation, Hill discusses:
- Collecting and consolidating log data;
- Consuming logs;
- Creating alerts;
- The evolution of security incident and event management technology.
Before joining Live Oak Bank, Hill served as CISO of risk, information security and compliance for Verizon Telematics; CSO for AVP and risk and information security officer for S1 Corp.; and senior security consultant for BT Consulting.