Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/1c/ab/2c/1cab2c59-a0cd-4305-2bf5-e3396c9e98fa/mza_6399775579318533652.jpg/600x600bb.jpg
Future of Data Security
Qohash
28 episodes
5 days ago
Show more...
Technology
RSS
All content for Future of Data Security is the property of Qohash and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Show more...
Technology
https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog19369388/QOHASH_FODS-Pod_2000x2000px_Episodes_B_2_16pmfg.jpg
EP 11 — Exabeam’s Kevin Kirkwood on Advanced Attack Detection with UEBA
Future of Data Security
28 minutes 28 seconds
8 months ago
EP 11 — Exabeam’s Kevin Kirkwood on Advanced Attack Detection with UEBA
The cybersecurity landscape is entering an AI arms race, and Kevin Kirkwood, CISO at Exabeam, is on the frontlines building defenses that can match the speed of machine-powered threats. As Exabeam’s ”Customer Zero,” Kevin shares candid insights from transitioning through three platform generations in three years, reflecting on how each migration exposed previously undetected attack patterns in Microsoft environments. His experience leading the rapid adoption of 700+ UEBA rules simultaneously (against recommended practice) offers valuable lessons for security leaders pushing the boundaries of detection capabilities. Kevin envisions a future where AI-assisted systems can propose new detection rules for zero-days within minutes, while grappling with immediate challenges — like the day Microsoft Edge suddenly claimed his company had authorized Copilot without CISO approval — highlighting the complex reality of managing AI tool permissions in enterprise environments. Topics discussed: - The strategic shift from total log collection to intelligent edge filtering, rethinking the ”collect everything” approach while maintaining forensic capabilities through AI-powered agents at the edge. - Specific examples of Microsoft Copilot attempting wholesale access to contact lists and email histories, and tactical approaches to implementing granular controls. - Implementing UEBA at scale, including transitioning from basic logging to behavior analytics capable of detecting subtle ”living off the land” attacks that manipulate normal business functions. - How reframing ”security vulnerabilities” as ”security defects” fundamentally changed developer engagement. - Technical insights into how attackers are using GenAI to transform sophisticated exploits across programming languages, and defensive approaches to match this velocity. - Managing bimodal security architecture and balancing edge-based detection with centralized analysis, including specific identity management challenges in the context of AI tool adoption. - A detailed framework for embedding security professionals within development teams while maintaining the balance between velocity and control. - Technical requirements for near real-time zero-day detection and the evolution toward AI-assisted rule generation.
Future of Data Security