Fraud Management & Cybercrime , Governance & Risk Management , Incident & Breach Response

The Use of Machine Data in Finding Fraud

Splunk's Jim Apger on How to Draw the Fraud Story Out of Data
Jim Apger, senior security architect, Splunk

When it comes to fraud, enterprise data has a story to tell, and it's up to security and fraud leaders to know how to interpret that story. Jim Apger of Splunk discusses reading and reacting to these stories.

See Also: Revealing the Dark Web: How to Leverage Technologies to Alert and Block Dark Web Access

In a video interview at Information Security Media Group's recent Dallas Fraud and Breach Prevention Summit, Apger talks about:

  • The technologies and tools needed to recognize fraud in your environment;
  • Tips on spotting anomalous behavior;
  • Strategies and best practices for using machine data and an analytic-driven platform.

Apger, senior security architect at Splunk, is a 20-year veteran of the tech industry who is focused on security and fraud as a member of Splunk's global security specialists team. His digital hardware and software background paved a path for him to spend nearly 10 years in the network intrusion prevention space. Prior to joining Splunk in 2014, he made key contributions in the fields of web fraud detection, anti-money laundering, security information/event management (SIEM), security operations and cyber threat intelligence.





Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.