Isaac Kohen

Opinions expressed by ICN authors are their own.

Isaac Kohen started out in quantitative finance by programming black-box trading algorithms. His time spent in the financial world and exposure to highly sensitive information triggered his curiosity for IT security. He worked as an IT security consultant for several years where he spearheaded efforts to secure the IT infrastructure of companies with masses of confidential data.

When Isaac first entered the industry, IT norms were to prohibit and lock out as many people as possible to protect data. He found that this was a very ineffective way of solving the issue because it made it hard for many people who wanted to cause no harm, to do their jobs. He decided to focus on algorithms targeting user behavior to find outliers within the companies he consulted with to help detect insider threats. Isaac has since then launched his own employee monitoring and insider threat prevention platform, Teramind, that detects, records and prevents malicious user behavior.

The opinions expressed in this blog are those of Isaac Kohen and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

How managers can best communicate the importance of cybersecurity to employees

How to ensure that giving notice doesn’t mean losing data

How to ensure that giving notice doesn’t mean losing data

The employee exit process often devolves into a fire-drill for IT teams. Having a documented process and a strong relationship with HR can help your team go from reactive to proactive.

Ransomware prevention is insider threat mitigation

Ransomware prevention is insider threat mitigation

Addressing the insider threat to help deter exposure to ransomware.

Protecting intellectual property against cyberattack

Protecting intellectual property against cyberattack

The news is full of data breaches that hold hostage or expose customer information. But attacks targeting intellectual property (IP) can do great damage as well. What do we know about the characteristics of IP attacks, and how can IP...

2018 Crowd Research Partners 'Insider Threat Report': hopes and fears revealed

2018 Crowd Research Partners 'Insider Threat Report': hopes and fears revealed

An overwhelming number of organizations feel vulnerable to insider attacks – but you might be surprised at the top three risk factors enabling this vulnerability.

How employee monitoring can help solve England's productivity problem

How employee monitoring can help solve England's productivity problem

Can the data you get from employee monitoring software help drive productivity – and other financial – benefits?

Government entities remain vulnerable to insider threats

Government entities remain vulnerable to insider threats

Recommendations on how the U.S. Postal Service and other government entities can improve cyber security.

How to calculate your return on security investments

How to calculate your return on security investments

While there certainly are ways to detail the ROI of security, there's still a lot of miscalculation that happens when it comes to the true cost of a security incident.

Cost of insider threats vs. investment in proactive education and technology

Cost of insider threats vs. investment in proactive education and technology

When it comes to security, education- or technology-based solutions can potentially save organizations a significant amount of money.

Load More