FFIEC & Anomaly Detection Done Right 

What is anomaly detection? How do you get it 'done right'?

Finding threats is hard. Anti-virus software, can’t keep up with the exploding rates of new malware and cyberattacks. Traditional intrusion detection systems rely on identifying attacks attempting to penetrate your network through signature-based methods, making them susceptible to unknown attacks. Anomaly detection is often heralded as a solution, but rarely does anyone describe exactly how to use it or give practical advice on how to implement it. So how are banks expected to meet the new IT Examination requirements?

Join us for our upcoming webinar, as we dive into the fundamental concepts surrounding anomaly detection and how it all ties together with the FFIEC’s latest cybersecurity requirements.

  • What is anomaly detection?
  • How anomaly detection keeps you safe in today's threat landscape
  • Examples of how anomaly detection should work
  • How to build anomaly detection into your organization
  • Specifics on how anomaly detection will be measured in examinations


Register below to get on-demand access to the replay:



 Featured Presenters

Alex Hernandez

Alex Hernandez

VP of Customer Solutions

Alex Hernandez brings more than 20 years of experience in providing security solutions and expertise to some of the largest companies in the world. He has spoken regularly at both regional and national IT and security conferences as well as cyber-security associations around the country. Alex has worked with several leading security solutions providers, including Barracuda Networks, Purewire, Secure Computing, CipherTrust, S1 and SecureWare.


Sean Cassidy

Chief Technology Officer

Sean Cassidy is an engineer and leader who builds the right products the right way. He has worked at Limelight Networks, building their video transcoding system, at Cisco Systems working on their ASA firewall, and holds a Master of Computer Engineering from RIT. He is the author of numerous open source projects and has been involved in the information security community for over a decade. He writes a blog about programming and startups atwww.seancassidy.me.