Episode 78 — Baseline Network, Data, and User Behavior to Make Detection Credible

This episode focuses on baselining network, data, and user behavior so detection is credible, because ISSMP scenarios often hinge on distinguishing real anomalies from normal operational patterns and avoiding alert fatigue that blinds the organization. You will learn how baselines should be defined by system purpose and risk tier, how to account for seasonality and business cycles, and how to incorporate identity context, asset criticality, and data sensitivity so “unusual” is meaningful. We apply this to examples like normal administrative activity versus privilege misuse, typical data transfer volumes versus exfiltration indicators, and expected service-to-service communications versus lateral movement, emphasizing how baselines improve triage speed and accuracy. Best practices include establishing baseline ownership, documenting assumptions, and regularly updating baselines after architectural or business changes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 78 — Baseline Network, Data, and User Behavior to Make Detection Credible
Broadcast by