Biometrics , Digital Identity , Security Operations

Designing a Behavior-Centric Security Plan

Forcepoint's David Coffey on the Importance of Clearly Defining Goals
Designing a Behavior-Centric Security Plan

Organizations looking to implement behavior-centric security must set clear goals for the business outcomes, says David Coffey, senior vice president of engineering at Forcepoint, who offers tips.

"Some organizations may want to pay attention to continuous authentication," he says in an interview with Information Security Media Group. "Some organizations may want to pay attention to understanding the intent behind users within the organization. And some organizations want to pay attention to insider threats."

In an interview during a visit to India (see audio link below image), Coffey also discusses:

  • Why organizations are moving toward behavior-centric security;
  • The architectural changes required to start the process of collecting behavioral data;
  • How to minimize collection of data.

Coffey, senior vice president of engineering at Forcepoint, has two decades of experience in software engineering, product management, security operations and applied data science to the company. Prior to Forcepoint, Coffey served as head of cloud platform engineering and operations at Intel.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.