Using the fictitious example of Philip Wilson, a formerly successful corporate executive, we examine how he devolves into an insider threat after experiencing a series of setbacks and misfortunes. After he is passed over for a major promotion, he becomes disgruntled enough to steal proprietary product IP and defect to a competitor. This white paper describes a scenario in which a SOC analyst using the Haystax for Insider Threat solution would have predictively identified Philip using probabilistic modeling and other AI techniques.
In this paper, readers will learn: