SlideShare una empresa de Scribd logo
1 de 22
1
Survey: Security Analytics and Intelligence
A look at the impact of security threats and the use of security analytics
and intelligence to mitigate those threats
© 2013, SolarWinds Worldwide, LLC. All rights reserved.
Conducted by SANS Institute
June/July 2013
2
Introduction
» SolarWinds, in conjunction
with SANS, recently
conducted a survey on
Security Analytics and
Intelligence with
participation from over
600 IT professionals
» This presentation provides
insight into IT budgets for
security, difficulties faced
in identifying attacks and
breaches, and more
2
The Agenda
• Participants: Whom did we
survey?
• Results: What did they say?
• Key Take Away: What does
the survey mean to you?
• Recommendations: What
can you do?
SANS & SOLARWINDS IT SECURITY SURVEY 2013
3
Whom Did We Survey?
3
19.0%
17.2%
15.6%
8.7% 8.7% 8.2%
7.0%
5.9%
5.1%
2.9% 0.9% 0.9%
Government/Military
Financial
Services/Banking
Other
Education
HighTech
Health
care/Pharmaceutical
Telecommunications
Carrier/Service…
Manufacturing
Energy/Utilities
Retail
Engineering/Construc
tion
HostingService
Provider
Participants: Industry wise
SANS & SOLARWINDS IT SECURITY SURVEY 2013
45% of the survey
taker organizations
were from
Federal, BFSI and
Healthcare
4
IT Budget Spent on IT Security
• 45% of the survey takers were spending less than 20% of their IT budget on information security
management, compliance and response
• About 30% spent less than 10% on information security management, compliance and response
Unknown, 40.0%
Less than 5%, 21.3%
6% to 10%, 16.0%
11% to 20%, 7.9%
21% to 30%, 7.3%
31% to 40%, 2.0%
41% to 50%, 1.2%
51% to 60%, 0.9%
Greater than 60%, 1.7%
Other, 1.6%
SANS & SOLARWINDS IT SECURITY SURVEY 2013
5
Threat Detection and Response
SANS & SOLARWINDS IT SECURITY SURVEY 2013
6
Difficulty in Detecting Threats
33.4%
23.5%
21.1%
7.8%
5.7%
3.0% 2.8%
1.3% 1.3%
Noattacks(thatwe
knowabout)
2to5
Unknown
1
6to10
11to20
21to50
51to100
Morethan100
Difficulty in detecting threats
In the past two years,
45% of the respondent
companies had 1 or more
attacks that were difficult
to detect.
SANS & SOLARWINDS IT SECURITY SURVEY 2013
7
Time Taken to Detect the Impact of the Attacks
• 30% of the organizations took up to a week to detect the impact
• 14% of them took about 1-3 months
Within the same
day
One week or less
A month or less
Three months or
less
Five months or less
10 months or less
More than 10
months
Unknown
SANS & SOLARWINDS IT SECURITY SURVEY 2013
8
Time Taken for Attack Remediation
• 35% of companies took up to a week to remediate after the initial knowledge of an attack
• About 11% of the companies took 1-3 months
Within the same
day
One week or less
A month or less
Three months or
less
Five months or less
10 months or less
More than 10
months
Unknown
SANS & SOLARWINDS IT SECURITY SURVEY 2013
9
Data Collection and Correlation
SANS & SOLARWINDS IT SECURITY SURVEY 2013
10
Top 3 Impediments to Discovering
and Following Up on Attacks
39%
21%
19%
Not collecting appropriate
security data
Not Identifying relevant event
context (Event correlation)
Lack of system awareness and
vulnerability awareness
SANS & SOLARWINDS IT SECURITY SURVEY 2013
11
Types of Operational and Security Data Collected
for Security Analytics
Top 3 Types of Data
Currently Collected:
• Log data from network
devices, servers and
applications
• Monitoring data from
firewalls, vulnerability
scanners, IDS/IPS
• Access data
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
Log data from network (routers/switches) and
servers, applications and/or endpoints
Monitoring data provided through firewalls, network-
based vulnerability scanners, IDS/IPS, UTMs, etc.
Access data from applications and access control systems
Unstructured data-at-rest and RAM data from endpoints
(servers and end-user devices)
Security assessment data from endpoint (aka from
NAC/MDM scans), application and server monitoring tools
Assessment and exception data (not on the whitelist of
approved behaviors) taken from mobile/BYOD endpoints…
Monitoring and exception data pertaining to internal
virtual and cloud environments
Monitoring and exception data pertaining to public cloud
usage
Other
Unknown Don't plan to collect Plan to collect within 12 months Currently collect
Top 3 Within 12 Months:
• Security assessment data
from
endpoint, application and
server monitoring tools
• Monitoring and exception
data from internal virtual
and cloud environments
• Access data from
applications and access
control systems
12
How Satisfied are Organizations
with their Security Tools?
SANS & SOLARWINDS IT SECURITY SURVEY 2013
13
Alarming Factor!!
59% of the organizations
don’t know whether they
are collecting security data
in real time or not.
SANS & SOLARWINDS IT SECURITY SURVEY 2013
14
Correlation of Event Logs
• 30% of the organizations did not have any automated correlation of log data
• 45% of the organizations manually scripted searches based on hunches
• 39% of them had no third party intelligence tools
0% 10% 20% 30% 40% 50%
Other
Hadoop or other free or distributed data
analysis tools
Unstructured data analysis tools with NoSQL
and other methods.
Advanced intelligence/threat profiling
database
No automated correlation of logs, just
manual scanning for exceptions by experts
Manual and manually-scripted searches
based on evidence and hunches
Use of SIEM technologies and systems
Dedicated log management platform used for
IT security and operations
SANS & SOLARWINDS IT SECURITY SURVEY 2013
15
More on Correlation
38% of the
respondent
organizations did
not have log
correlation for
external threat
intelligence tools
And guess what???
44% of the organizations are doing only up to 25% of their inquiries to
detect threats in real time.
SANS & SOLARWINDS IT SECURITY SURVEY 2013
About 36% of the organizations
never had any automated
pattern recognition
16
Satisfaction with Current Analytics
and Intelligence Capabilities
• About 59% of the organizations are not satisfied with their library of appropriate
queries and reports
• 56% of the organizations are not satisfied with their relevant event context intelligence
• 56% of them have no visibility into actionable security events
1.25 1.30 1.35 1.40 1.45 1.50 1.55 1.60 1.65 1.70 1.75
Producing or having a library of appropriate…
Relevant event context (intelligence) to observe…
Training/intelligence expertise
Integration of other monitoring systems into…
Costs for tools, maintenance and personnel
Visibility into actionable security events across…
Ability to alert based on exceptions to what is…
Reduction of false positives and/or false negatives
Performance and response time issues
Other
Storage capacity and access of data in needed formats
SANS & SOLARWINDS IT SECURITY SURVEY 2013
17
Primary Use Cases for Evaluation of Security Tools
External malware
Advanced Persistent threats
Compliance monitoring
0%
5%
10%
15%
20%
25%
SANS & SOLARWINDS IT SECURITY SURVEY 2013
24% - External malware
13% - Advanced
persistent threats
11% - Compliance
monitoring
18
Top 3 Future Investments in Security
SANS & SOLARWINDS IT SECURITY SURVEY 2013
0%
10%
20%
30%
40%
50%
60%
70%
Securityinformationmanagement
tools/SIEMsystemswithbuilt-in
analyticscapabilities
Personnel/trainingtodetect
patterns(analytics)andmanage
systems
Vulnerabilitymanagement
Networkprotections
(UTM,IDS/IPS,etc.)
Endpointvisibility
Applicationprotectionsand
visibility
Intelligenceproductsorservices
Analyticsengines
Other
Top 3 Future Investments
in Security:
1. SIEM Tools
2. Training
3. Vulnerability
Management
19
For truly effective security and threat management, organizations
need to:
 Collect and correlate appropriate log and event data across all
relevant sources throughout the IT infrastructure
 Handle larger volumes of log data efficiently
 Establish a baseline of “normal” behavior in order to identify
anomalies
 Identify threats and attacks in real time
 Reduce the time between detection and response
 Implement the right tools for advanced analytics and intelligence
Key Takeaways
SANS & SOLARWINDS IT SECURITY SURVEY 2013
20
» Event correlation for event context and
actionable intelligence
» Real-time analysis for immediate threat
detection and mitigation
» Advanced IT search to simplify event
forensics and expedite root cause analysis
» Built-in reporting to streamline security
and compliance
How Can SIEM Solutions Help You?
SANS & SOLARWINDS IT SECURITY SURVEY 2013
65% of the
organizations
want to make
their security
investments on
SIEM systems
21
SolarWinds Log & Event Manager
 Log Collection, Analysis, and Real-Time
Correlation
 Collects log & event data from tens of
thousands of devices & performs true
real-time, in-memory correlation
 Powerful Active Response technology
enables you to quickly & automatically
take action against threats
 Advanced IT Search employs highly
effective data visualization tools –
word clouds, tree maps, & more
 Quickly generates compliance reports
for PCI DSS, GLBA, SOX, NERC
CIP, HIPAA, & more
 Built-in correlation rules, reports, &
responses for out-of-the-box visibility
and proactive threat protection
SANS & SOLARWINDS IT SECURITY SURVEY 2013
22
Thank You!
SANS & SOLARWINDS IT SECURITY SURVEY 2013

Más contenido relacionado

La actualidad más candente

Email Management Survey: North America
Email Management Survey: North AmericaEmail Management Survey: North America
Email Management Survey: North AmericaSolarWinds
 
New IT Survey: Public Sector
New IT Survey: Public SectorNew IT Survey: Public Sector
New IT Survey: Public SectorSolarWinds
 
SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016SolarWinds
 
Automation in Public Sector IT Systems
Automation in Public Sector IT SystemsAutomation in Public Sector IT Systems
Automation in Public Sector IT SystemsSolarWinds
 
IT Trends Report 2015: Business at the Speed of IT, Public Sector Results
IT Trends Report 2015: Business at the Speed of IT, Public Sector ResultsIT Trends Report 2015: Business at the Speed of IT, Public Sector Results
IT Trends Report 2015: Business at the Speed of IT, Public Sector ResultsSolarWinds
 
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)SolarWinds
 
SolarWinds Application Performance End User Survey (North America)
SolarWinds Application Performance End User Survey (North America)SolarWinds Application Performance End User Survey (North America)
SolarWinds Application Performance End User Survey (North America)SolarWinds
 
Threat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceSolarWinds
 
SolarWinds Application Performance End User Survey (UK)
SolarWinds Application Performance End User Survey (UK)SolarWinds Application Performance End User Survey (UK)
SolarWinds Application Performance End User Survey (UK)SolarWinds
 
Survey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSurvey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSolarWinds
 
New IT Survey: Australia
New IT Survey: AustraliaNew IT Survey: Australia
New IT Survey: AustraliaSolarWinds
 
UK IT Pros Survey: Network Complexity
UK IT Pros Survey: Network ComplexityUK IT Pros Survey: Network Complexity
UK IT Pros Survey: Network ComplexitySolarWinds
 
Survey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSurvey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSolarWinds
 
Systems Administrators UK Survey Results
Systems Administrators UK Survey ResultsSystems Administrators UK Survey Results
Systems Administrators UK Survey ResultsSolarWinds
 
Solar winds appstack public sector
Solar winds appstack public sectorSolar winds appstack public sector
Solar winds appstack public sectorSolarWinds
 
SolarWinds Application Performance End User Survey (Denmark)
SolarWinds Application Performance End User Survey (Denmark)SolarWinds Application Performance End User Survey (Denmark)
SolarWinds Application Performance End User Survey (Denmark)SolarWinds
 
New IT Survey: Germany
New IT Survey: GermanyNew IT Survey: Germany
New IT Survey: GermanySolarWinds
 
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence +  SIEM: A Force to be Reckoned WithThreat Intelligence +  SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned WithSolarWinds
 
SolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds
 
New IT Survey: UK
New IT Survey: UKNew IT Survey: UK
New IT Survey: UKSolarWinds
 

La actualidad más candente (20)

Email Management Survey: North America
Email Management Survey: North AmericaEmail Management Survey: North America
Email Management Survey: North America
 
New IT Survey: Public Sector
New IT Survey: Public SectorNew IT Survey: Public Sector
New IT Survey: Public Sector
 
SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016
 
Automation in Public Sector IT Systems
Automation in Public Sector IT SystemsAutomation in Public Sector IT Systems
Automation in Public Sector IT Systems
 
IT Trends Report 2015: Business at the Speed of IT, Public Sector Results
IT Trends Report 2015: Business at the Speed of IT, Public Sector ResultsIT Trends Report 2015: Business at the Speed of IT, Public Sector Results
IT Trends Report 2015: Business at the Speed of IT, Public Sector Results
 
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)
 
SolarWinds Application Performance End User Survey (North America)
SolarWinds Application Performance End User Survey (North America)SolarWinds Application Performance End User Survey (North America)
SolarWinds Application Performance End User Survey (North America)
 
Threat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security Conference
 
SolarWinds Application Performance End User Survey (UK)
SolarWinds Application Performance End User Survey (UK)SolarWinds Application Performance End User Survey (UK)
SolarWinds Application Performance End User Survey (UK)
 
Survey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSurvey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT Infrastructures
 
New IT Survey: Australia
New IT Survey: AustraliaNew IT Survey: Australia
New IT Survey: Australia
 
UK IT Pros Survey: Network Complexity
UK IT Pros Survey: Network ComplexityUK IT Pros Survey: Network Complexity
UK IT Pros Survey: Network Complexity
 
Survey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSurvey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management Solutions
 
Systems Administrators UK Survey Results
Systems Administrators UK Survey ResultsSystems Administrators UK Survey Results
Systems Administrators UK Survey Results
 
Solar winds appstack public sector
Solar winds appstack public sectorSolar winds appstack public sector
Solar winds appstack public sector
 
SolarWinds Application Performance End User Survey (Denmark)
SolarWinds Application Performance End User Survey (Denmark)SolarWinds Application Performance End User Survey (Denmark)
SolarWinds Application Performance End User Survey (Denmark)
 
New IT Survey: Germany
New IT Survey: GermanyNew IT Survey: Germany
New IT Survey: Germany
 
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence +  SIEM: A Force to be Reckoned WithThreat Intelligence +  SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned With
 
SolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring Survey
 
New IT Survey: UK
New IT Survey: UKNew IT Survey: UK
New IT Survey: UK
 

Destacado

Netadmin and Sysadmin Survey Results - AUS
Netadmin and Sysadmin Survey Results - AUSNetadmin and Sysadmin Survey Results - AUS
Netadmin and Sysadmin Survey Results - AUSSolarWinds
 
Systems Administrators AUS Survey Results
Systems Administrators AUS Survey ResultsSystems Administrators AUS Survey Results
Systems Administrators AUS Survey ResultsSolarWinds
 
Netadmin and Sysadmin Survey Results - UK
Netadmin and Sysadmin Survey Results - UKNetadmin and Sysadmin Survey Results - UK
Netadmin and Sysadmin Survey Results - UKSolarWinds
 
New IT Survey: Brazil
New IT Survey: BrazilNew IT Survey: Brazil
New IT Survey: BrazilSolarWinds
 
IT Survey: UK and Germany SMEs
IT Survey: UK and Germany SMEsIT Survey: UK and Germany SMEs
IT Survey: UK and Germany SMEsSolarWinds
 
How-To: Linux Performance Monitoring & Management for your Multi-Vendor Network
How-To: Linux Performance Monitoring & Management for your Multi-Vendor Network How-To: Linux Performance Monitoring & Management for your Multi-Vendor Network
How-To: Linux Performance Monitoring & Management for your Multi-Vendor Network SolarWinds
 
New IT Survey: North America
New IT Survey: North AmericaNew IT Survey: North America
New IT Survey: North AmericaSolarWinds
 
Systems Administrators Survey Results
Systems Administrators Survey ResultsSystems Administrators Survey Results
Systems Administrators Survey ResultsSolarWinds
 
Top 5 Reasons to Use Kiwi Syslog Server
Top 5 Reasons to Use Kiwi Syslog ServerTop 5 Reasons to Use Kiwi Syslog Server
Top 5 Reasons to Use Kiwi Syslog ServerSolarWinds
 
Top 5 Reasons to Use Kiwi CatTools
Top 5 Reasons to Use Kiwi CatToolsTop 5 Reasons to Use Kiwi CatTools
Top 5 Reasons to Use Kiwi CatToolsSolarWinds
 

Destacado (10)

Netadmin and Sysadmin Survey Results - AUS
Netadmin and Sysadmin Survey Results - AUSNetadmin and Sysadmin Survey Results - AUS
Netadmin and Sysadmin Survey Results - AUS
 
Systems Administrators AUS Survey Results
Systems Administrators AUS Survey ResultsSystems Administrators AUS Survey Results
Systems Administrators AUS Survey Results
 
Netadmin and Sysadmin Survey Results - UK
Netadmin and Sysadmin Survey Results - UKNetadmin and Sysadmin Survey Results - UK
Netadmin and Sysadmin Survey Results - UK
 
New IT Survey: Brazil
New IT Survey: BrazilNew IT Survey: Brazil
New IT Survey: Brazil
 
IT Survey: UK and Germany SMEs
IT Survey: UK and Germany SMEsIT Survey: UK and Germany SMEs
IT Survey: UK and Germany SMEs
 
How-To: Linux Performance Monitoring & Management for your Multi-Vendor Network
How-To: Linux Performance Monitoring & Management for your Multi-Vendor Network How-To: Linux Performance Monitoring & Management for your Multi-Vendor Network
How-To: Linux Performance Monitoring & Management for your Multi-Vendor Network
 
New IT Survey: North America
New IT Survey: North AmericaNew IT Survey: North America
New IT Survey: North America
 
Systems Administrators Survey Results
Systems Administrators Survey ResultsSystems Administrators Survey Results
Systems Administrators Survey Results
 
Top 5 Reasons to Use Kiwi Syslog Server
Top 5 Reasons to Use Kiwi Syslog ServerTop 5 Reasons to Use Kiwi Syslog Server
Top 5 Reasons to Use Kiwi Syslog Server
 
Top 5 Reasons to Use Kiwi CatTools
Top 5 Reasons to Use Kiwi CatToolsTop 5 Reasons to Use Kiwi CatTools
Top 5 Reasons to Use Kiwi CatTools
 

Similar a Survey: Security Analytics and Intelligence

Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowMapR Technologies
 
SANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxSANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxanhlodge
 
The state of incident response
The state of incident responseThe state of incident response
The state of incident responseAbhishek Sood
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attackAndreanne Clarke
 
Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Roy Ramkrishna
 
rp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responserp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responseMaciej Buczkowski
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2jmariani14
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsSolarWinds
 
Please read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxPlease read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxLeilaniPoolsy
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_toolsEma report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_toolsAnjoum .
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveyEdgar Alejandro Villegas
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
SOC Analysis
SOC AnalysisSOC Analysis
SOC Analysischipo3
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataBluelock
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataKayla Catron
 

Similar a Survey: Security Analytics and Intelligence (20)

Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
SANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxSANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docx
 
The state of incident response
The state of incident responseThe state of incident response
The state of incident response
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
 
Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015
 
rp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responserp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-response
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
Please read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxPlease read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docx
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_toolsEma report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
SOC Analysis
SOC AnalysisSOC Analysis
SOC Analysis
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 

Más de SolarWinds

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilitySolarWinds
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilitySolarWinds
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...SolarWinds
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsSolarWinds
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsSolarWinds
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...SolarWinds
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...SolarWinds
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsSolarWinds
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceSolarWinds
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceSolarWinds
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...SolarWinds
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion SolarWinds
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...SolarWinds
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning SolarWinds
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkSolarWinds
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...SolarWinds
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges SolarWinds
 

Más de SolarWinds (20)

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 

Último

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Survey: Security Analytics and Intelligence

  • 1. 1 Survey: Security Analytics and Intelligence A look at the impact of security threats and the use of security analytics and intelligence to mitigate those threats © 2013, SolarWinds Worldwide, LLC. All rights reserved. Conducted by SANS Institute June/July 2013
  • 2. 2 Introduction » SolarWinds, in conjunction with SANS, recently conducted a survey on Security Analytics and Intelligence with participation from over 600 IT professionals » This presentation provides insight into IT budgets for security, difficulties faced in identifying attacks and breaches, and more 2 The Agenda • Participants: Whom did we survey? • Results: What did they say? • Key Take Away: What does the survey mean to you? • Recommendations: What can you do? SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 3. 3 Whom Did We Survey? 3 19.0% 17.2% 15.6% 8.7% 8.7% 8.2% 7.0% 5.9% 5.1% 2.9% 0.9% 0.9% Government/Military Financial Services/Banking Other Education HighTech Health care/Pharmaceutical Telecommunications Carrier/Service… Manufacturing Energy/Utilities Retail Engineering/Construc tion HostingService Provider Participants: Industry wise SANS & SOLARWINDS IT SECURITY SURVEY 2013 45% of the survey taker organizations were from Federal, BFSI and Healthcare
  • 4. 4 IT Budget Spent on IT Security • 45% of the survey takers were spending less than 20% of their IT budget on information security management, compliance and response • About 30% spent less than 10% on information security management, compliance and response Unknown, 40.0% Less than 5%, 21.3% 6% to 10%, 16.0% 11% to 20%, 7.9% 21% to 30%, 7.3% 31% to 40%, 2.0% 41% to 50%, 1.2% 51% to 60%, 0.9% Greater than 60%, 1.7% Other, 1.6% SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 5. 5 Threat Detection and Response SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 6. 6 Difficulty in Detecting Threats 33.4% 23.5% 21.1% 7.8% 5.7% 3.0% 2.8% 1.3% 1.3% Noattacks(thatwe knowabout) 2to5 Unknown 1 6to10 11to20 21to50 51to100 Morethan100 Difficulty in detecting threats In the past two years, 45% of the respondent companies had 1 or more attacks that were difficult to detect. SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 7. 7 Time Taken to Detect the Impact of the Attacks • 30% of the organizations took up to a week to detect the impact • 14% of them took about 1-3 months Within the same day One week or less A month or less Three months or less Five months or less 10 months or less More than 10 months Unknown SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 8. 8 Time Taken for Attack Remediation • 35% of companies took up to a week to remediate after the initial knowledge of an attack • About 11% of the companies took 1-3 months Within the same day One week or less A month or less Three months or less Five months or less 10 months or less More than 10 months Unknown SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 9. 9 Data Collection and Correlation SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 10. 10 Top 3 Impediments to Discovering and Following Up on Attacks 39% 21% 19% Not collecting appropriate security data Not Identifying relevant event context (Event correlation) Lack of system awareness and vulnerability awareness SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 11. 11 Types of Operational and Security Data Collected for Security Analytics Top 3 Types of Data Currently Collected: • Log data from network devices, servers and applications • Monitoring data from firewalls, vulnerability scanners, IDS/IPS • Access data 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Log data from network (routers/switches) and servers, applications and/or endpoints Monitoring data provided through firewalls, network- based vulnerability scanners, IDS/IPS, UTMs, etc. Access data from applications and access control systems Unstructured data-at-rest and RAM data from endpoints (servers and end-user devices) Security assessment data from endpoint (aka from NAC/MDM scans), application and server monitoring tools Assessment and exception data (not on the whitelist of approved behaviors) taken from mobile/BYOD endpoints… Monitoring and exception data pertaining to internal virtual and cloud environments Monitoring and exception data pertaining to public cloud usage Other Unknown Don't plan to collect Plan to collect within 12 months Currently collect Top 3 Within 12 Months: • Security assessment data from endpoint, application and server monitoring tools • Monitoring and exception data from internal virtual and cloud environments • Access data from applications and access control systems
  • 12. 12 How Satisfied are Organizations with their Security Tools? SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 13. 13 Alarming Factor!! 59% of the organizations don’t know whether they are collecting security data in real time or not. SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 14. 14 Correlation of Event Logs • 30% of the organizations did not have any automated correlation of log data • 45% of the organizations manually scripted searches based on hunches • 39% of them had no third party intelligence tools 0% 10% 20% 30% 40% 50% Other Hadoop or other free or distributed data analysis tools Unstructured data analysis tools with NoSQL and other methods. Advanced intelligence/threat profiling database No automated correlation of logs, just manual scanning for exceptions by experts Manual and manually-scripted searches based on evidence and hunches Use of SIEM technologies and systems Dedicated log management platform used for IT security and operations SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 15. 15 More on Correlation 38% of the respondent organizations did not have log correlation for external threat intelligence tools And guess what??? 44% of the organizations are doing only up to 25% of their inquiries to detect threats in real time. SANS & SOLARWINDS IT SECURITY SURVEY 2013 About 36% of the organizations never had any automated pattern recognition
  • 16. 16 Satisfaction with Current Analytics and Intelligence Capabilities • About 59% of the organizations are not satisfied with their library of appropriate queries and reports • 56% of the organizations are not satisfied with their relevant event context intelligence • 56% of them have no visibility into actionable security events 1.25 1.30 1.35 1.40 1.45 1.50 1.55 1.60 1.65 1.70 1.75 Producing or having a library of appropriate… Relevant event context (intelligence) to observe… Training/intelligence expertise Integration of other monitoring systems into… Costs for tools, maintenance and personnel Visibility into actionable security events across… Ability to alert based on exceptions to what is… Reduction of false positives and/or false negatives Performance and response time issues Other Storage capacity and access of data in needed formats SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 17. 17 Primary Use Cases for Evaluation of Security Tools External malware Advanced Persistent threats Compliance monitoring 0% 5% 10% 15% 20% 25% SANS & SOLARWINDS IT SECURITY SURVEY 2013 24% - External malware 13% - Advanced persistent threats 11% - Compliance monitoring
  • 18. 18 Top 3 Future Investments in Security SANS & SOLARWINDS IT SECURITY SURVEY 2013 0% 10% 20% 30% 40% 50% 60% 70% Securityinformationmanagement tools/SIEMsystemswithbuilt-in analyticscapabilities Personnel/trainingtodetect patterns(analytics)andmanage systems Vulnerabilitymanagement Networkprotections (UTM,IDS/IPS,etc.) Endpointvisibility Applicationprotectionsand visibility Intelligenceproductsorservices Analyticsengines Other Top 3 Future Investments in Security: 1. SIEM Tools 2. Training 3. Vulnerability Management
  • 19. 19 For truly effective security and threat management, organizations need to:  Collect and correlate appropriate log and event data across all relevant sources throughout the IT infrastructure  Handle larger volumes of log data efficiently  Establish a baseline of “normal” behavior in order to identify anomalies  Identify threats and attacks in real time  Reduce the time between detection and response  Implement the right tools for advanced analytics and intelligence Key Takeaways SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 20. 20 » Event correlation for event context and actionable intelligence » Real-time analysis for immediate threat detection and mitigation » Advanced IT search to simplify event forensics and expedite root cause analysis » Built-in reporting to streamline security and compliance How Can SIEM Solutions Help You? SANS & SOLARWINDS IT SECURITY SURVEY 2013 65% of the organizations want to make their security investments on SIEM systems
  • 21. 21 SolarWinds Log & Event Manager  Log Collection, Analysis, and Real-Time Correlation  Collects log & event data from tens of thousands of devices & performs true real-time, in-memory correlation  Powerful Active Response technology enables you to quickly & automatically take action against threats  Advanced IT Search employs highly effective data visualization tools – word clouds, tree maps, & more  Quickly generates compliance reports for PCI DSS, GLBA, SOX, NERC CIP, HIPAA, & more  Built-in correlation rules, reports, & responses for out-of-the-box visibility and proactive threat protection SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 22. 22 Thank You! SANS & SOLARWINDS IT SECURITY SURVEY 2013