SlideShare a Scribd company logo
1 of 25
Download to read offline
1 | © 2017 Interset Software
How to Operationalize Big Data Security Analytics
Jay Lillie, Director Field Operations
2 | © 2017 Interset Software
Analytics in the security domain is
misunderstood
(And it’s the fault of security vendors!)
3 | © 2017 Interset Software
Analysis and Analytics are not interchangeable
Analysis Analytics⊃
I can perform analysis
on anything, including
data!
“Analytics is a subset of analysis”
Analytics is a special
type of analysis that can
be performed on data!
4 | © 2017 Interset Software
Analytics in the security domain is misunderstood
Analytics
Analysis ▪ philosophical
▪ interpretive
▪ subjective
▪ exploratory
Analysis MAY be…
5 | © 2017 Interset Software
Analytics in the security domain is misunderstood
▪ mathematics
▪ statistics
▪ data science
▪ machine learning
Analytics MUST have…
▪ queries
▪ rules & thresholds
Security “analytics” is too often…
??
???
6 | © 2017 Interset Software
Analytics focuses on different domain knowledge
Security Analytics
7 | © 2017 Interset Software
So how do we meaningfully bring them together?
8 | © 2017 Interset Software
Accelerate detection activities with
analytics
Do what smart, talented people do… only faster…
and with no pesky sleep required.
9 | © 2017 Interset Software
Identify
Develop
organizational
understanding
Protect
Implement the
appropriate
safeguards
Detect
Identify the
occurrence of
a cybersecurity
event
Respond
Take action
regarding a
detected
cybersecurity
event
Recover
Restore any
capabilities or
services that
were impaired
NIST Cybersecurity Framework
https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf
10 | © 2017 Interset Software
Identify
Develop
organizational
understanding
Protect
Implement the
appropriate
safeguards
Detect
Identify the
occurrence of
a cybersecurity
event
Respond
Take action
regarding a
detected
cybersecurity
event
Recover
Restore any
capabilities or
services that
were impaired
NIST Cybersecurity Framework
https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf
11 | © 2017 Interset Software
Common security operations patterns…
Security Information and
Event Management (SIEM)
Log Management System
(LMS)
Endpoint & Data Loss
Prevention (DLP)
Identity and Access
Management (IAM)
Network
Business Applications Security Operations
Collect
logs
from
various
sources
Write queries
Define rules
Manage
alerts
Attack
reconstruction
Detect Respond
Case Mgmnt / Svc Desk
12 | © 2017 Interset Software
….common problems
Security Information and
Event Management (SIEM)
Log Management System
(LMS)
Endpoint & Data Loss
Prevention (DLP)
Identity and Access
Management (IAM)
Network
Business Applications
Collect
logs
from
various
sources
Endless new queries
Modify rules to have
higher thresholds
Ignore
alerts
Painfully long
reconstruction
We don’t know
where to start
looking for threats.
We don’t have the
staff to analyze
10,000 alerts per day.
60-80% of
alerts are false
positives.
Rules based systems
are brittle, hard to
maintain.
13 | © 2017 Interset Software
Analytics works differently than analysis tools
Endpoint (inc. DLP)
Access, Auth, & Actions
Network (NetFlow)
Enrichment Data
SecurityDataLake
(Integrated)
Security Analytics
Dashboard&
Hand-off
Orchestration / Automation
OpenDXL
Case Mgmnt / Svc Desk
REST API
Detect Respond
Acquire
“Which things matter?”
Bring logs and streaming
sources together
Baseline
“What is normal?”
Incorporate the patterns
of behavior that make
each entity like (and
unlike) others
Score
“Where are the risks?”
Principled analytical
methods surface
quantified potential
threats
Act
“Who takes action?”
Predetermined or ad hoc;
automated or manual
14 | © 2017 Interset Software
SIEM
The services a SIEM provides still have a place!
Endpoint (inc. DLP)
SIEM
Access, Auth, & Actions
Network (NetFlow)
Enrichment Data
SecurityDataLake
(Integrated)
Security Analytics
Dashboard&
Hand-off
Orchestration / Automation
OpenDXL
Case Mgmnt / Svc Desk
REST API
SIEM
15 | © 2017 Interset Software
A holistic response requires integrated data
Auth data
Application /
Service
VPN
Shared Resource
Bring the threat to me:
Who are my riskiest users,
servers, websites…?
Find the threat faster:
Where are the riskiest periods of
time, who interacts with what…?
Integrated to
give the
broadest
possible view
Many sources
yield a single,
meaningful
result set
Find a Threat Lead
Conduct a Threat Hunt
16 | © 2017 Interset Software
Strategically operationalize your security
analytics
Use the right tool, at the right time, in the right place…
17 | © 2017 Interset Software
Understand where you want to go first
Detect Respond
▪ Know what you want to find
▪ Decide how you want to respond
▪ Then, use these to determine what you must
detect
18 | © 2017 Interset Software
People
ProcessTechnology
Operationalization is a full-spectrum exercise
▪ Security Operations Center
(SOC)
▪ IT Help Desk
▪ Cyber Incident Response
Team (CIRT)
▪ Non-IT Coordination
▪ Service Desk (e.g., ITIL)
▪ Cyber threat
▪ Forensics / Evidence gathering
▪ Non-IT intersections
▪ Awareness / Escalation
▪ Case Management
▪ Orchestration
▪ Authentication / Access
Control
▪ Enrichment Sources
Security Operations
19 | © 2017 Interset Software
examples
20 | © 2017 Interset Software
Incident Detection: Theft of intellectual property
X
2 Engineers
stole data
1 Year
$1 Million Spent
Large security
vendor failed to
find anything
2 Weeks
Easily
identified the 2
Engineers
Found 3
additional users
stealing data in
North America
Found 8
additional users
stealing data in
China
21 | © 2017 Interset Software
Operations Integration: Process-based roadmap
Generate
alert
SIEM
Investigate
threat
SOC
Close
investigation
SOC
Coordinate
response
Svc Desk
non-
significant
incident
finding
additional
action
required
alert Create
ticket
Svc Desk
escalate
22 | © 2017 Interset Software
Operations Integration: Process-based roadmap
Detect
events
SIEM
Discover
significant
risk
Interset
Create
ticket
Svc Desk
Investigate
threat
SOC
Close
investigation
SOC
Coordinate
response
Svc Desk
non-
significant
incident
finding
additional
action
required
event risk escalation
Other
reported
behavior
varies
notification
1
logs
3 5 6
7
varies
Collect
logs
2
Enrichment
data
varies
4
8
9
23 | © 2017 Interset Software
Linking technology: Analytics to orchestration
Dashboard&
Hand-off
Orchestration / Automation
OpenDXL
Case Mgmnt / Svc Desk
REST API
Respond
Lock account
Isolate node
Run script
▪ Fast: Yes, faster than a human
▪ Certainty: Not a single alert, but a
distinguishable set of behaviors
▪ Predictable: Nothing gets missed
And more…
24 | © 2017 Interset Software
Who is Interset?
25 | © 2017 Interset Software
Interset Summary
Security analytics combined
with AI / machine-learning is
transformative. Interset big-
data processing swiftly
pinpoints threats, while
expanding visibility to get a
contextual picture of
enterprise risk.
We distill billions of events into hundreds of anomalies…
Then into a handful of actionable SOC leads.
Jay Lillie
Director Field Ops
jlillie@interset.com

More Related Content

What's hot

How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...Interset
 
IANS Forum Dallas - Technology Spotlight Session
IANS Forum Dallas - Technology Spotlight SessionIANS Forum Dallas - Technology Spotlight Session
IANS Forum Dallas - Technology Spotlight SessionInterset
 
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]Interset
 
Operationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum DallasOperationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum DallasInterset
 
DataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the DayDataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the DayInterset
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Interset
 
Lead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkLead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkInterset
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON
 
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...Interset
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Keith Kraus
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security Robert Smith
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...SaraPia5
 
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No ShoesCarolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoescentralohioissa
 
Webinar: Will the Real AI Please Stand Up?
Webinar: Will the Real AI Please Stand Up?Webinar: Will the Real AI Please Stand Up?
Webinar: Will the Real AI Please Stand Up?Interset
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurSri Ambati
 
Intel boubker el mouttahid
Intel boubker el mouttahidIntel boubker el mouttahid
Intel boubker el mouttahidBigDataExpo
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaborationcentralohioissa
 
Managing Data Science | Lessons from the Field
Managing Data Science | Lessons from the Field Managing Data Science | Lessons from the Field
Managing Data Science | Lessons from the Field Domino Data Lab
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...Forcepoint LLC
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 

What's hot (20)

How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
 
IANS Forum Dallas - Technology Spotlight Session
IANS Forum Dallas - Technology Spotlight SessionIANS Forum Dallas - Technology Spotlight Session
IANS Forum Dallas - Technology Spotlight Session
 
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
 
Operationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum DallasOperationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum Dallas
 
DataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the DayDataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the Day
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018
 
Lead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkLead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less Work
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
 
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
 
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No ShoesCarolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
 
Webinar: Will the Real AI Please Stand Up?
Webinar: Will the Real AI Please Stand Up?Webinar: Will the Real AI Please Stand Up?
Webinar: Will the Real AI Please Stand Up?
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
 
Intel boubker el mouttahid
Intel boubker el mouttahidIntel boubker el mouttahid
Intel boubker el mouttahid
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaboration
 
Managing Data Science | Lessons from the Field
Managing Data Science | Lessons from the Field Managing Data Science | Lessons from the Field
Managing Data Science | Lessons from the Field
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 

Similar to How to Operationalize Big Data Security Analytics

[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral AnalyticsInterset
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datosSoftware Guru
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingSqrrl
 
Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionWebinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionJK Tech
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetWatcher
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series  SEIM Log AnalysisCybersecurity Series  SEIM Log Analysis
Cybersecurity Series SEIM Log AnalysisJim Kaplan CIA CFE
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017Doug Copley
 
Visualization in the Age of Big Data
Visualization in the Age of Big DataVisualization in the Age of Big Data
Visualization in the Age of Big DataRaffael Marty
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerNetIQ
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
 
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...Enterprise Management Associates
 

Similar to How to Operationalize Big Data Security Analytics (20)

[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
 
Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionWebinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM Solution
 
CCA study group
CCA study groupCCA study group
CCA study group
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series  SEIM Log AnalysisCybersecurity Series  SEIM Log Analysis
Cybersecurity Series SEIM Log Analysis
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
 
Visualization in the Age of Big Data
Visualization in the Age of Big DataVisualization in the Age of Big Data
Visualization in the Age of Big Data
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
 
Main Menu
Main MenuMain Menu
Main Menu
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
 
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
 

Recently uploaded

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

How to Operationalize Big Data Security Analytics

  • 1. 1 | © 2017 Interset Software How to Operationalize Big Data Security Analytics Jay Lillie, Director Field Operations
  • 2. 2 | © 2017 Interset Software Analytics in the security domain is misunderstood (And it’s the fault of security vendors!)
  • 3. 3 | © 2017 Interset Software Analysis and Analytics are not interchangeable Analysis Analytics⊃ I can perform analysis on anything, including data! “Analytics is a subset of analysis” Analytics is a special type of analysis that can be performed on data!
  • 4. 4 | © 2017 Interset Software Analytics in the security domain is misunderstood Analytics Analysis ▪ philosophical ▪ interpretive ▪ subjective ▪ exploratory Analysis MAY be…
  • 5. 5 | © 2017 Interset Software Analytics in the security domain is misunderstood ▪ mathematics ▪ statistics ▪ data science ▪ machine learning Analytics MUST have… ▪ queries ▪ rules & thresholds Security “analytics” is too often… ?? ???
  • 6. 6 | © 2017 Interset Software Analytics focuses on different domain knowledge Security Analytics
  • 7. 7 | © 2017 Interset Software So how do we meaningfully bring them together?
  • 8. 8 | © 2017 Interset Software Accelerate detection activities with analytics Do what smart, talented people do… only faster… and with no pesky sleep required.
  • 9. 9 | © 2017 Interset Software Identify Develop organizational understanding Protect Implement the appropriate safeguards Detect Identify the occurrence of a cybersecurity event Respond Take action regarding a detected cybersecurity event Recover Restore any capabilities or services that were impaired NIST Cybersecurity Framework https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf
  • 10. 10 | © 2017 Interset Software Identify Develop organizational understanding Protect Implement the appropriate safeguards Detect Identify the occurrence of a cybersecurity event Respond Take action regarding a detected cybersecurity event Recover Restore any capabilities or services that were impaired NIST Cybersecurity Framework https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf
  • 11. 11 | © 2017 Interset Software Common security operations patterns… Security Information and Event Management (SIEM) Log Management System (LMS) Endpoint & Data Loss Prevention (DLP) Identity and Access Management (IAM) Network Business Applications Security Operations Collect logs from various sources Write queries Define rules Manage alerts Attack reconstruction Detect Respond Case Mgmnt / Svc Desk
  • 12. 12 | © 2017 Interset Software ….common problems Security Information and Event Management (SIEM) Log Management System (LMS) Endpoint & Data Loss Prevention (DLP) Identity and Access Management (IAM) Network Business Applications Collect logs from various sources Endless new queries Modify rules to have higher thresholds Ignore alerts Painfully long reconstruction We don’t know where to start looking for threats. We don’t have the staff to analyze 10,000 alerts per day. 60-80% of alerts are false positives. Rules based systems are brittle, hard to maintain.
  • 13. 13 | © 2017 Interset Software Analytics works differently than analysis tools Endpoint (inc. DLP) Access, Auth, & Actions Network (NetFlow) Enrichment Data SecurityDataLake (Integrated) Security Analytics Dashboard& Hand-off Orchestration / Automation OpenDXL Case Mgmnt / Svc Desk REST API Detect Respond Acquire “Which things matter?” Bring logs and streaming sources together Baseline “What is normal?” Incorporate the patterns of behavior that make each entity like (and unlike) others Score “Where are the risks?” Principled analytical methods surface quantified potential threats Act “Who takes action?” Predetermined or ad hoc; automated or manual
  • 14. 14 | © 2017 Interset Software SIEM The services a SIEM provides still have a place! Endpoint (inc. DLP) SIEM Access, Auth, & Actions Network (NetFlow) Enrichment Data SecurityDataLake (Integrated) Security Analytics Dashboard& Hand-off Orchestration / Automation OpenDXL Case Mgmnt / Svc Desk REST API SIEM
  • 15. 15 | © 2017 Interset Software A holistic response requires integrated data Auth data Application / Service VPN Shared Resource Bring the threat to me: Who are my riskiest users, servers, websites…? Find the threat faster: Where are the riskiest periods of time, who interacts with what…? Integrated to give the broadest possible view Many sources yield a single, meaningful result set Find a Threat Lead Conduct a Threat Hunt
  • 16. 16 | © 2017 Interset Software Strategically operationalize your security analytics Use the right tool, at the right time, in the right place…
  • 17. 17 | © 2017 Interset Software Understand where you want to go first Detect Respond ▪ Know what you want to find ▪ Decide how you want to respond ▪ Then, use these to determine what you must detect
  • 18. 18 | © 2017 Interset Software People ProcessTechnology Operationalization is a full-spectrum exercise ▪ Security Operations Center (SOC) ▪ IT Help Desk ▪ Cyber Incident Response Team (CIRT) ▪ Non-IT Coordination ▪ Service Desk (e.g., ITIL) ▪ Cyber threat ▪ Forensics / Evidence gathering ▪ Non-IT intersections ▪ Awareness / Escalation ▪ Case Management ▪ Orchestration ▪ Authentication / Access Control ▪ Enrichment Sources Security Operations
  • 19. 19 | © 2017 Interset Software examples
  • 20. 20 | © 2017 Interset Software Incident Detection: Theft of intellectual property X 2 Engineers stole data 1 Year $1 Million Spent Large security vendor failed to find anything 2 Weeks Easily identified the 2 Engineers Found 3 additional users stealing data in North America Found 8 additional users stealing data in China
  • 21. 21 | © 2017 Interset Software Operations Integration: Process-based roadmap Generate alert SIEM Investigate threat SOC Close investigation SOC Coordinate response Svc Desk non- significant incident finding additional action required alert Create ticket Svc Desk escalate
  • 22. 22 | © 2017 Interset Software Operations Integration: Process-based roadmap Detect events SIEM Discover significant risk Interset Create ticket Svc Desk Investigate threat SOC Close investigation SOC Coordinate response Svc Desk non- significant incident finding additional action required event risk escalation Other reported behavior varies notification 1 logs 3 5 6 7 varies Collect logs 2 Enrichment data varies 4 8 9
  • 23. 23 | © 2017 Interset Software Linking technology: Analytics to orchestration Dashboard& Hand-off Orchestration / Automation OpenDXL Case Mgmnt / Svc Desk REST API Respond Lock account Isolate node Run script ▪ Fast: Yes, faster than a human ▪ Certainty: Not a single alert, but a distinguishable set of behaviors ▪ Predictable: Nothing gets missed And more…
  • 24. 24 | © 2017 Interset Software Who is Interset?
  • 25. 25 | © 2017 Interset Software Interset Summary Security analytics combined with AI / machine-learning is transformative. Interset big- data processing swiftly pinpoints threats, while expanding visibility to get a contextual picture of enterprise risk. We distill billions of events into hundreds of anomalies… Then into a handful of actionable SOC leads. Jay Lillie Director Field Ops jlillie@interset.com