SlideShare una empresa de Scribd logo
1 de 35
Descargar para leer sin conexión
From SIEM to
Security Analytics
The Path Forward
Seth Geftic, Product Marketing Manager
Steve Garrett, Product Manager

© Copyright 2012 EMC Corporation. All rights reserved.

1
Agenda
 The Shift From SIEM
 What is RSA Security Analytics
 Beyond SIEM: Intelligence Driven Security

 Intelligence Driven Security In Action

© Copyright 2012 EMC Corporation. All rights reserved.

2
The Shift Away From SIEM

© Copyright 2012 EMC Corporation. All rights reserved.

3
The purpose of SIEM has evolved
 The original purchase driver behind SIEMs were
– Satisfying compliance requirements more easily
▪ Collecting and retaining logs with less operational overhead
▪ Creating compliance reports more easily

– Troubleshooting operational problems
▪ Determining root cause of failures

 Making IDS work better was often a driver too
– The security team was deluged with IDS alerts
– Many of the IDS rules were crude and fired too often

© Copyright 2012 EMC Corporation. All rights reserved.

4
Why hasn’t SIEM lived up to
expectations?
 Things have become more complex

– IT environments have expanded
– Hackers have become more sophisticated
– IDS has become less and less relevant

 SIEMs response has been to add more log sources

– More diversity of sources (Security Device, OS, Application
etc)
– Greater volume of sources as the number of critical
systems has expanded

 But this has not solved the problem

– SIEM has not been able to scale to the volume required
– Its impractical to create correlation rules to detect every
complex threat
– Many threats no longer even have a footprint in the logs

© Copyright 2012 EMC Corporation. All rights reserved.

5
The result for organizations?
 Honeymoon period for customers post
implementation
– Compliance reports run more smoothly
– Security teams get at least *some* visibility into
activity

 Disillusionment follows for many pretty soon
after
– As team matures they start to try extract more
value from the data
– At this point, performance and correlation
limitations come to the fore
© Copyright 2012 EMC Corporation. All rights reserved.

6
Today’s tools need to adapt
 Today’s tools need to be able to detect and
investigate
– Lateral movement of threats as they gain foothold
– Covert characteristics of attack tools, techniques &
procedures
– Exfiltration or sabotage of critical data

 Today’s tools need to be able to scale
– To collect and store the volume and diversity of data
required
– To provide analytic tools to support security work
streams
– Time to respond is critical in a breach situations – and
SIEM often falls short
© Copyright 2012 EMC Corporation. All rights reserved.

7
Security Analytics & The Security
Maturity Voyage
Visibility
and
Understanding

Network
Monitoring &
Investigation

Traditional
SIEM
Compliance

Advanced
Analysis

Incident
Detection
SECURITY
ANALYTICS
Security Team
Sophistication
& Skillset

© Copyright 2012 EMC Corporation. All rights reserved.

8
Use Case Needs Grow
 Compliance + Tier 1 Security (often met with traditional
SIEM)
– Compliance requirements
– Incident detection
– Limited investigations
 Moving Beyond SIEM
– Increased visibility
– Deep forensics and investigations
– Supplement traditional SIEM
 Advanced Security Operations
– Find more sophisticated attacks
– Increased “hunting” ability
– Conduct complex data analysis for next gen SOC

© Copyright 2012 EMC Corporation. All rights reserved.

9
Today’s Security Requirements
Big Data
Infrastructure
“Need a fast and
scalable infrastructure to
conduct real time and
long term analysis”

Comprehensive
Visibility
“See everything
happening in my
environment and
normalize it”

High Powered
Analytics

Integrated
Intelligence

“Give me the speed and
smarts to detect,
investigate and prioritize
potential threats”

“Help me understand
what to look for and
what others have
discovered”

© Copyright 2012 EMC Corporation. All rights reserved.

10
What is RSA Security Analytics

© Copyright 2012 EMC Corporation. All rights reserved.

11
RSA Security Analytics
Unified platform for incident detection, investigations, compliance
reporting and advanced security analysis

SIEM
Log Parsing
Compliance Reports
Incident Alerts

© Copyright 2012 EMC Corporation. All rights reserved.

RSA Security
Analytics

Network Security
Monitoring

Full Packet Capture
Big Data Infrastructure
Capture Time Data
Comprehensive Visibility
Enrichment
High Powered Analysis
Deep Dive Investigations
Intelligence Driven Context

12
Big data security analytics:
RSA Security Analytics architecture
LIVE

Distributed
Data
Collection

Capture
Time Data
Enrichment
PARSING &
METADATA TAGGING

PACKETS

LIVE
LIVE
Reporting
& Alerting

PACKET
METADATA
LOGS

Investigation
& Forensics

Compliance
Malware
Analysis

Intelligence
Feeds
LOG
METADATA

RSA LIVE
INTELLIGENCE

Incident
Response

Endpoint
Visibility
& Analysis

Additional
Business &
IT Context

Threat Intelligence | Rules | Parsers | Alerts | Feeds | Apps | Directory Services | Reports & Custom Actions

© Copyright 2012 EMC Corporation. All rights reserved.

13
RSA Security Analytics “SIEM-like”
deployment
LIVE

Distributed
Data
Collection

Capture
Time Data
Enrichment

PARSING &
METADATA TAGGING

LOGS
LOGS

LOG
METADATA

LIVE
LIVE
Reporting
& Alerting
Investigation
& Forensics

Compliance
Malware
Analysis

Intelligence
Feeds

RSA LIVE
INTELLIGENCE

Incident
Response

Endpoint
Visibility
& Analysis

Additional
Business &
IT Context

Threat Intelligence | Rules | Parsers | Alerts | Feeds | Apps | Directory Services | Reports & Custom Actions

© Copyright 2012 EMC Corporation. All rights reserved.

14
RSA Security Analytics with a traditional
SIEM
LIVE

LIVE

Distributed
Data
Collection

LIVE

PARSING &
Capture
METADATA TAGGING

Time Data
Enrichment

Alerting
PACKETS

PACKET
METADATA

3rd Party
SIEM
Collection
LOGS

© Copyright 2012 EMC Corporation. All rights reserved.

Investigation
& Forensics

Malware
Analysis
Intel
Feeds

Alerts
Alert Triage

Investigations

Compliance
& Reporting

15
What Makes SA Different?
 Single platform for log & network security
monitoring
 Capture time data enrichment
 Superior event stream & on-request analysis
 Incorporates business and IT data, incident
response & endpoint visibility

 Operationalizes threat intelligence
 Security platform where compliance is an
outcome, not the other way around

© Copyright 2012 EMC Corporation. All rights reserved.

16
Beyond SIEM – Intelligence Driven Security

© Copyright 2012 EMC Corporation. All rights reserved.

17
What is Intelligence Driven Security?
 The process of using all the security-related
information available, both internally and
externally, to detect hidden threats and even
predict future ones.
 It is knowledge that enables an organization to
make informed risk decisions and take action.

© Copyright 2012 EMC Corporation. All rights reserved.

18
Meet the Adversary: Mr. X
Persona

Mission in Life

Tactics

Primary Data
Source(s)

Cyber Criminal,
Government
sponsored or
non-state actor

Exfiltrate any and all data available by
creating threat surface specialized for
a given target.

Malicious
Code, Social
Media,
Phishing,
Spear
Phishing

Must Have: Facebook,
LinkedIn, Malware

Mr. X

Note: Average price of a zeroday exploit generated by the
criminal underground is $25.

Mr. X has been busy:
 Combination of Waterhole Attacks with Zero Day Exploits (non-profits and think tanks)
–
–
–
–

Targeting users who visit very specific websites
Latest IE 0-day attack focused on a specific non-profit site
Downloaded and executed shellcode directly from memory, never hit disk
Dropped non-persistent (Aurora) 9002 RAT

 Multiple attack groups on the same victim, steady evolution of adversary backdoors
 NO slowdown in attack operations, very specific targeting of intelligence based on attacker
taskings (Lawsuits, Key Personnel, C-Suite, M/A activity)
 Email Exfiltration – MAPI tool, Theft of Lotus Notes Email
 Continued heavy use of Windows Service DLLs, some signed

© Copyright 2012 EMC Corporation. All rights reserved.

19
Mr. X – How Does he do it?

Ability to Detect

Your Network
A: Web App
Vulnerability

B: Drop Webshells or
Trojan Backdoor
D: Pass The Hash

C: Command
and Control

IDS

SIEM

SA

A
B
C
D

E: Seize Domain
Admin Credentials

E
F
G

H: Transmit
Stolen Data

F: Gain Access to
Trade Secrets
G: Upload
Stolen Data to
Staging Server

© Copyright 2012 EMC Corporation. All rights reserved.

H

Yes
Possible

Yes – Full Visibility
with Logs and
Packets with
Threat Intelligence

No

20
Intelligence Driven Security with
Security Analytics
A: Web App
Vulnerability

B: Drop Webshells or
Trojan Backdoor

 RSA Live Threat Intelligence May Have Identified Risk of the
Transfer as a Starting Point for Investigation

© Copyright 2012 EMC Corporation. All rights reserved.

21
Intelligence Driven Security with
Security Analytics
C: Command
and Control

Traversing Your Infrastructure
D: Pass The Hash
E: Seize Domain Admin Credentials
F: Gain Access to Trade Secrets
G: Upload Stolen Data to Staging Server

 Mr. X use a variety of techniques to communicate while traversing your
infrastructure which Security Analytics can detect and parse

– Named Pipes commonly abused (pipehello is NOT from Microsoft)
– Abuse of the Windows Task Scheduler over SMB connections via NET USE, allowing
command shell capabilities with SYSTEM privelidges

 Security Analytics combines Log Data with Packet Data for Deep Visibility

© Copyright 2012 EMC Corporation. All rights reserved.

22
Intelligence Driven Security with
Security Analytics
H: Transmit
Stolen Data

Your Network
G: Upload Stolen Data to Staging Server

 RSA Live Threat Intelligence May Have Identified Risk of the Transfer based on
Remote Host or Outbound Protocol Anomalies ( such as self-signed certs)
–
–

Security Analytics will flag these sessions as suspicious and identify where the data travelled
Event reconstruction may be possible

© Copyright 2012 EMC Corporation. All rights reserved.

23
Anyone see this Movie?

© Copyright 2011 EMC Corporation. All rights reserved.

24
Event Stream Analysis:
Intelligence Driven Security in Action

© Copyright 2011 EMC Corporation. All rights reserved.

25
Intelligence Driven Security with Security
Analytics – Event Stream Analysis
Log Decoder

Concentrator
18k EPS

• Full Visibility
LIVE

Log Decoder

Concentrator

ESA
24k EPS

– Log Data and Packet
Data normalized into
Meta Data
– Additional Context may
be added into ESA from
other business systems

LIVE

Packet Decoder

Concentrator
2 GB/s
Additional
Context

LIVE

© Copyright 2011 EMC Corporation. All rights reserved.

26
Intelligence Driven Security with Security
Analytics – Event Stream Analysis

STATIC
CONTEXT

DYNAMIC
CONTEXT

DYNAMIC
CONTEXT

• Leverage the power of ESA’s Correlation Engine to Create Dynamic Risk
Categorization using Context Windows

Suspicious Internal IP
Suspicious Internal IP
10.221.32.12
161.169.207.15
..
..
Suspicious Host Alias
Ssl-irc.scumware.org
Mirror.wikileaks.info
Updatekernal.com
…

Critical Asset List
10.100.32.10
10.100.32.104

© Copyright 2011 EMC Corporation. All rights reserved.

• Suspicious Internal Hosts IP List based on Packet Analysis and RSA
Live Threat Intel
•

As an example, any host running a named pipe such as “pipehello”

•

Entries age out after preconfigured time (8 hours for instance)

• Suspicious Host Alias List based on Packet Analysis and
RSA Live Threat Intel
• Entries age out after preconfigured time (12 hours
for instance)

• Critical Asset List may come from Feed File or CSV file
which provides Business Context
• Entries can be configured to be static and not
age out

27
Intelligence Driven Security with Security
Analytics – Event Stream Analysis
• When one of the Suspicious Hosts attempts to login on one of the Critical Assets, you
may deem this as an elevation of Risk, and choose to add the IP address of the Host
to a new list

DYNAMIC
CONTEXT

• Elevated Risk Internal IP List based on Log Data from
Domain Controller
Suspicious Internal IP
Elevated Risk Internal IP
10.221.32.12
161.169.207.15
..
..

If A->B->C AND the Host IP
address is included in the
Elevated Risk Context Window,
then tell me about it!”

© Copyright 2011 EMC Corporation. All rights reserved.

• ESA determines that a host in the Suspicious Host IP list
attempted to login to a host in the Critical Asset List
• ESA places this IP address into the Elevated Risk Internal IP
list, which can be configured to age out after a
preconfigured time

• Context Window can be referenced with the Incoming
Event Streams and used to make a more intelligent
decision to fire an Alert

28
RSA Security Analytics
• Cornerstone in the Security Operations
journey

• Flexible platform that grows with your needs
– Compliance  incident detection investigation
and forensics  advanced analysis
– From logs  packets or packets  logs

• Security platform where compliance is a
byproduct, not the other way around

© Copyright 2011 EMC Corporation. All rights reserved.

29
RSA Advanced Cyber Defense Services
A portfolio of services to help you achieve security operations excellence
• Strategy & Roadmap
Current strategy review and
recommendations for desired
future state
• Incident Response
Rapid breach response service
and SLA-based retainer
• NextGen Security Operations
SOC/CIRC evolution and security
program transformations; moving
from reactive to proactive

www.rsa.im/ACDpractice
© Copyright 2013 EMC Corporation. All rights reserved.

30
RSA Advanced Cyber Defense Training
A comprehensive learning path for security analysts
• Focus on proven
methodologies for
operating and
managing a
CIRC/SOC
• Hands-on labs
designed around
real-world use cases
and teamwork in a
CIRC/SOC
• Delivered by highly
experienced RSA
Security Practitioners

www.emc.com/rsa-training
© Copyright 2013 EMC Corporation. All rights reserved.

31
Reimagining Security Analysis:
Removing Hay vs. Digging For Needles
All Network
Traffic & Logs

Terabytes of data
100% of total

Downloads
of executables

Thousands of data points
5% of total

Type does
not match
extension

Hundreds of data points
0.2% of total

!
© Copyright 2011 EMC Corporation. All rights reserved.

Create alerts to/from
critical assets
A few dozen alerts

33
Integrated Intelligence
Know What To Look For
RSA LIVE INTELLIGENCE SYSTEM

Threat Intelligence – Rules – Parsers – Alerts – Feeds – Apps – Directory Services – Reports and Custom Actions

1

2
Gathers advanced
threat intelligence
and content

3
Aggregates &
consolidates data

Automatically
distributes
correlation rules,
blacklists, parsers,
views, feeds

OPERATIONALIZE INTELLIGENCE:
Take advantage of what others have already found and apply
against your current and historical data

© Copyright 2011 EMC Corporation. All rights reserved.

34
SA vs. SIEM
Attack Step

Traditional
SIEM

RSA Security
Analytics

Alert for access over non-standard port

No

Yes

Recreate activity of suspect IP address across
environment

No

Yes

Show user activity across AD and VPN

Yes

Yes

Alert for different credentials used for AD and
VP

Yes

Yes

Reconstruct exfiltrated data

No

Yes

© Copyright 2011 EMC Corporation. All rights reserved.

35

Más contenido relacionado

La actualidad más candente

How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...IBM Security
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...Andris Soroka
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Sirius
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011 SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011 Andris Soroka
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Andris Soroka
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalArrow ECS UK
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceCamilo Fandiño Gómez
 
MISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMichael Nickle
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security IntelligenceAnna Landolfi
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM AlienVault
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...Raffael Marty
 
Siem Overview 2009
Siem Overview 2009Siem Overview 2009
Siem Overview 2009johndyson1
 

La actualidad más candente (20)

How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011 SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
MISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM Implementation
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security Intelligence
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
SIEM
SIEMSIEM
SIEM
 
IBM Qradar-Advisor
IBM Qradar-AdvisorIBM Qradar-Advisor
IBM Qradar-Advisor
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
Siem Overview 2009
Siem Overview 2009Siem Overview 2009
Siem Overview 2009
 

Destacado

RSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTRSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTLee Wei Yeong
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 
Threat detection-report-backoff-pos
Threat detection-report-backoff-posThreat detection-report-backoff-pos
Threat detection-report-backoff-posEMC
 
Case Study of RSA Data Breach
Case Study of RSA Data BreachCase Study of RSA Data Breach
Case Study of RSA Data BreachKunal Sharma
 
A systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerA systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerSubhajit Bhuiya
 
What's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data SheetWhat's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data Sheetjordagro
 
LogRhythm Web Rhythm Data Sheet
LogRhythm Web Rhythm Data SheetLogRhythm Web Rhythm Data Sheet
LogRhythm Web Rhythm Data Sheetjordagro
 
LogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data SheetLogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data Sheetjordagro
 
LogRhythm Training Syllabus Data Sheet
LogRhythm Training Syllabus Data SheetLogRhythm Training Syllabus Data Sheet
LogRhythm Training Syllabus Data Sheetjordagro
 
Archer Resource On-Demand - Kelley Boutoille
Archer Resource On-Demand - Kelley BoutoilleArcher Resource On-Demand - Kelley Boutoille
Archer Resource On-Demand - Kelley BoutoilleKelley Boutoille, ACP
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_ggAlienVault
 
8 Reasons to Choose Logrhythm
8 Reasons to Choose Logrhythm8 Reasons to Choose Logrhythm
8 Reasons to Choose LogrhythmLogRhythm
 
Detecting and Blocking Suspicious Internal Network Traffic
Detecting and Blocking Suspicious Internal Network Traffic Detecting and Blocking Suspicious Internal Network Traffic
Detecting and Blocking Suspicious Internal Network Traffic LogRhythm
 
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallIntroducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallTroy Kitch
 
Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Alert Logic
 
Activated Charcoal - Making Sense of Endpoint Data
Activated Charcoal - Making Sense of Endpoint DataActivated Charcoal - Making Sense of Endpoint Data
Activated Charcoal - Making Sense of Endpoint DataGreg Foss
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case StudyDylan Holbrook
 

Destacado (20)

RSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTRSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APT
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
Threat detection-report-backoff-pos
Threat detection-report-backoff-posThreat detection-report-backoff-pos
Threat detection-report-backoff-pos
 
Case Study of RSA Data Breach
Case Study of RSA Data BreachCase Study of RSA Data Breach
Case Study of RSA Data Breach
 
RSA Anatomy of an Attack
RSA Anatomy of an AttackRSA Anatomy of an Attack
RSA Anatomy of an Attack
 
A systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archerA systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archer
 
What's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data SheetWhat's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data Sheet
 
LogRhythm Web Rhythm Data Sheet
LogRhythm Web Rhythm Data SheetLogRhythm Web Rhythm Data Sheet
LogRhythm Web Rhythm Data Sheet
 
LogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data SheetLogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data Sheet
 
Securityanalytics
SecurityanalyticsSecurityanalytics
Securityanalytics
 
LogRhythm Training Syllabus Data Sheet
LogRhythm Training Syllabus Data SheetLogRhythm Training Syllabus Data Sheet
LogRhythm Training Syllabus Data Sheet
 
Archer Resource On-Demand - Kelley Boutoille
Archer Resource On-Demand - Kelley BoutoilleArcher Resource On-Demand - Kelley Boutoille
Archer Resource On-Demand - Kelley Boutoille
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_gg
 
8 Reasons to Choose Logrhythm
8 Reasons to Choose Logrhythm8 Reasons to Choose Logrhythm
8 Reasons to Choose Logrhythm
 
Big Data analytics
Big Data analyticsBig Data analytics
Big Data analytics
 
Detecting and Blocking Suspicious Internal Network Traffic
Detecting and Blocking Suspicious Internal Network Traffic Detecting and Blocking Suspicious Internal Network Traffic
Detecting and Blocking Suspicious Internal Network Traffic
 
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallIntroducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
 
Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud
 
Activated Charcoal - Making Sense of Endpoint Data
Activated Charcoal - Making Sense of Endpoint DataActivated Charcoal - Making Sense of Endpoint Data
Activated Charcoal - Making Sense of Endpoint Data
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case Study
 

Similar a From SIEM to SA: The Path Forward

Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsDenim Group
 
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?EMC
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowIBM Security
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunk
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTSimone Onofri
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyAndris Soroka
 
Big Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceBig Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceIBM Danmark
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoHP Enterprise Italia
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPFidelis Cybersecurity
 
Big Data For Threat Detection & Response
Big Data For Threat Detection & ResponseBig Data For Threat Detection & Response
Big Data For Threat Detection & ResponseHarry McLaren
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
Advanced Threats In The Enterprise
Advanced Threats In The EnterpriseAdvanced Threats In The Enterprise
Advanced Threats In The EnterprisePriyanka Aash
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
 

Similar a From SIEM to SA: The Path Forward (20)

Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
 
Big Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceBig Data - Amplifying Security Intelligence
Big Data - Amplifying Security Intelligence
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
Information Security
Information SecurityInformation Security
Information Security
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
 
Big Data For Threat Detection & Response
Big Data For Threat Detection & ResponseBig Data For Threat Detection & Response
Big Data For Threat Detection & Response
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Advanced Threats In The Enterprise
Advanced Threats In The EnterpriseAdvanced Threats In The Enterprise
Advanced Threats In The Enterprise
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
 

Más de EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

Más de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Último

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

From SIEM to SA: The Path Forward

  • 1. From SIEM to Security Analytics The Path Forward Seth Geftic, Product Marketing Manager Steve Garrett, Product Manager © Copyright 2012 EMC Corporation. All rights reserved. 1
  • 2. Agenda  The Shift From SIEM  What is RSA Security Analytics  Beyond SIEM: Intelligence Driven Security  Intelligence Driven Security In Action © Copyright 2012 EMC Corporation. All rights reserved. 2
  • 3. The Shift Away From SIEM © Copyright 2012 EMC Corporation. All rights reserved. 3
  • 4. The purpose of SIEM has evolved  The original purchase driver behind SIEMs were – Satisfying compliance requirements more easily ▪ Collecting and retaining logs with less operational overhead ▪ Creating compliance reports more easily – Troubleshooting operational problems ▪ Determining root cause of failures  Making IDS work better was often a driver too – The security team was deluged with IDS alerts – Many of the IDS rules were crude and fired too often © Copyright 2012 EMC Corporation. All rights reserved. 4
  • 5. Why hasn’t SIEM lived up to expectations?  Things have become more complex – IT environments have expanded – Hackers have become more sophisticated – IDS has become less and less relevant  SIEMs response has been to add more log sources – More diversity of sources (Security Device, OS, Application etc) – Greater volume of sources as the number of critical systems has expanded  But this has not solved the problem – SIEM has not been able to scale to the volume required – Its impractical to create correlation rules to detect every complex threat – Many threats no longer even have a footprint in the logs © Copyright 2012 EMC Corporation. All rights reserved. 5
  • 6. The result for organizations?  Honeymoon period for customers post implementation – Compliance reports run more smoothly – Security teams get at least *some* visibility into activity  Disillusionment follows for many pretty soon after – As team matures they start to try extract more value from the data – At this point, performance and correlation limitations come to the fore © Copyright 2012 EMC Corporation. All rights reserved. 6
  • 7. Today’s tools need to adapt  Today’s tools need to be able to detect and investigate – Lateral movement of threats as they gain foothold – Covert characteristics of attack tools, techniques & procedures – Exfiltration or sabotage of critical data  Today’s tools need to be able to scale – To collect and store the volume and diversity of data required – To provide analytic tools to support security work streams – Time to respond is critical in a breach situations – and SIEM often falls short © Copyright 2012 EMC Corporation. All rights reserved. 7
  • 8. Security Analytics & The Security Maturity Voyage Visibility and Understanding Network Monitoring & Investigation Traditional SIEM Compliance Advanced Analysis Incident Detection SECURITY ANALYTICS Security Team Sophistication & Skillset © Copyright 2012 EMC Corporation. All rights reserved. 8
  • 9. Use Case Needs Grow  Compliance + Tier 1 Security (often met with traditional SIEM) – Compliance requirements – Incident detection – Limited investigations  Moving Beyond SIEM – Increased visibility – Deep forensics and investigations – Supplement traditional SIEM  Advanced Security Operations – Find more sophisticated attacks – Increased “hunting” ability – Conduct complex data analysis for next gen SOC © Copyright 2012 EMC Corporation. All rights reserved. 9
  • 10. Today’s Security Requirements Big Data Infrastructure “Need a fast and scalable infrastructure to conduct real time and long term analysis” Comprehensive Visibility “See everything happening in my environment and normalize it” High Powered Analytics Integrated Intelligence “Give me the speed and smarts to detect, investigate and prioritize potential threats” “Help me understand what to look for and what others have discovered” © Copyright 2012 EMC Corporation. All rights reserved. 10
  • 11. What is RSA Security Analytics © Copyright 2012 EMC Corporation. All rights reserved. 11
  • 12. RSA Security Analytics Unified platform for incident detection, investigations, compliance reporting and advanced security analysis SIEM Log Parsing Compliance Reports Incident Alerts © Copyright 2012 EMC Corporation. All rights reserved. RSA Security Analytics Network Security Monitoring Full Packet Capture Big Data Infrastructure Capture Time Data Comprehensive Visibility Enrichment High Powered Analysis Deep Dive Investigations Intelligence Driven Context 12
  • 13. Big data security analytics: RSA Security Analytics architecture LIVE Distributed Data Collection Capture Time Data Enrichment PARSING & METADATA TAGGING PACKETS LIVE LIVE Reporting & Alerting PACKET METADATA LOGS Investigation & Forensics Compliance Malware Analysis Intelligence Feeds LOG METADATA RSA LIVE INTELLIGENCE Incident Response Endpoint Visibility & Analysis Additional Business & IT Context Threat Intelligence | Rules | Parsers | Alerts | Feeds | Apps | Directory Services | Reports & Custom Actions © Copyright 2012 EMC Corporation. All rights reserved. 13
  • 14. RSA Security Analytics “SIEM-like” deployment LIVE Distributed Data Collection Capture Time Data Enrichment PARSING & METADATA TAGGING LOGS LOGS LOG METADATA LIVE LIVE Reporting & Alerting Investigation & Forensics Compliance Malware Analysis Intelligence Feeds RSA LIVE INTELLIGENCE Incident Response Endpoint Visibility & Analysis Additional Business & IT Context Threat Intelligence | Rules | Parsers | Alerts | Feeds | Apps | Directory Services | Reports & Custom Actions © Copyright 2012 EMC Corporation. All rights reserved. 14
  • 15. RSA Security Analytics with a traditional SIEM LIVE LIVE Distributed Data Collection LIVE PARSING & Capture METADATA TAGGING Time Data Enrichment Alerting PACKETS PACKET METADATA 3rd Party SIEM Collection LOGS © Copyright 2012 EMC Corporation. All rights reserved. Investigation & Forensics Malware Analysis Intel Feeds Alerts Alert Triage Investigations Compliance & Reporting 15
  • 16. What Makes SA Different?  Single platform for log & network security monitoring  Capture time data enrichment  Superior event stream & on-request analysis  Incorporates business and IT data, incident response & endpoint visibility  Operationalizes threat intelligence  Security platform where compliance is an outcome, not the other way around © Copyright 2012 EMC Corporation. All rights reserved. 16
  • 17. Beyond SIEM – Intelligence Driven Security © Copyright 2012 EMC Corporation. All rights reserved. 17
  • 18. What is Intelligence Driven Security?  The process of using all the security-related information available, both internally and externally, to detect hidden threats and even predict future ones.  It is knowledge that enables an organization to make informed risk decisions and take action. © Copyright 2012 EMC Corporation. All rights reserved. 18
  • 19. Meet the Adversary: Mr. X Persona Mission in Life Tactics Primary Data Source(s) Cyber Criminal, Government sponsored or non-state actor Exfiltrate any and all data available by creating threat surface specialized for a given target. Malicious Code, Social Media, Phishing, Spear Phishing Must Have: Facebook, LinkedIn, Malware Mr. X Note: Average price of a zeroday exploit generated by the criminal underground is $25. Mr. X has been busy:  Combination of Waterhole Attacks with Zero Day Exploits (non-profits and think tanks) – – – – Targeting users who visit very specific websites Latest IE 0-day attack focused on a specific non-profit site Downloaded and executed shellcode directly from memory, never hit disk Dropped non-persistent (Aurora) 9002 RAT  Multiple attack groups on the same victim, steady evolution of adversary backdoors  NO slowdown in attack operations, very specific targeting of intelligence based on attacker taskings (Lawsuits, Key Personnel, C-Suite, M/A activity)  Email Exfiltration – MAPI tool, Theft of Lotus Notes Email  Continued heavy use of Windows Service DLLs, some signed © Copyright 2012 EMC Corporation. All rights reserved. 19
  • 20. Mr. X – How Does he do it? Ability to Detect Your Network A: Web App Vulnerability B: Drop Webshells or Trojan Backdoor D: Pass The Hash C: Command and Control IDS SIEM SA A B C D E: Seize Domain Admin Credentials E F G H: Transmit Stolen Data F: Gain Access to Trade Secrets G: Upload Stolen Data to Staging Server © Copyright 2012 EMC Corporation. All rights reserved. H Yes Possible Yes – Full Visibility with Logs and Packets with Threat Intelligence No 20
  • 21. Intelligence Driven Security with Security Analytics A: Web App Vulnerability B: Drop Webshells or Trojan Backdoor  RSA Live Threat Intelligence May Have Identified Risk of the Transfer as a Starting Point for Investigation © Copyright 2012 EMC Corporation. All rights reserved. 21
  • 22. Intelligence Driven Security with Security Analytics C: Command and Control Traversing Your Infrastructure D: Pass The Hash E: Seize Domain Admin Credentials F: Gain Access to Trade Secrets G: Upload Stolen Data to Staging Server  Mr. X use a variety of techniques to communicate while traversing your infrastructure which Security Analytics can detect and parse – Named Pipes commonly abused (pipehello is NOT from Microsoft) – Abuse of the Windows Task Scheduler over SMB connections via NET USE, allowing command shell capabilities with SYSTEM privelidges  Security Analytics combines Log Data with Packet Data for Deep Visibility © Copyright 2012 EMC Corporation. All rights reserved. 22
  • 23. Intelligence Driven Security with Security Analytics H: Transmit Stolen Data Your Network G: Upload Stolen Data to Staging Server  RSA Live Threat Intelligence May Have Identified Risk of the Transfer based on Remote Host or Outbound Protocol Anomalies ( such as self-signed certs) – – Security Analytics will flag these sessions as suspicious and identify where the data travelled Event reconstruction may be possible © Copyright 2012 EMC Corporation. All rights reserved. 23
  • 24. Anyone see this Movie? © Copyright 2011 EMC Corporation. All rights reserved. 24
  • 25. Event Stream Analysis: Intelligence Driven Security in Action © Copyright 2011 EMC Corporation. All rights reserved. 25
  • 26. Intelligence Driven Security with Security Analytics – Event Stream Analysis Log Decoder Concentrator 18k EPS • Full Visibility LIVE Log Decoder Concentrator ESA 24k EPS – Log Data and Packet Data normalized into Meta Data – Additional Context may be added into ESA from other business systems LIVE Packet Decoder Concentrator 2 GB/s Additional Context LIVE © Copyright 2011 EMC Corporation. All rights reserved. 26
  • 27. Intelligence Driven Security with Security Analytics – Event Stream Analysis STATIC CONTEXT DYNAMIC CONTEXT DYNAMIC CONTEXT • Leverage the power of ESA’s Correlation Engine to Create Dynamic Risk Categorization using Context Windows Suspicious Internal IP Suspicious Internal IP 10.221.32.12 161.169.207.15 .. .. Suspicious Host Alias Ssl-irc.scumware.org Mirror.wikileaks.info Updatekernal.com … Critical Asset List 10.100.32.10 10.100.32.104 © Copyright 2011 EMC Corporation. All rights reserved. • Suspicious Internal Hosts IP List based on Packet Analysis and RSA Live Threat Intel • As an example, any host running a named pipe such as “pipehello” • Entries age out after preconfigured time (8 hours for instance) • Suspicious Host Alias List based on Packet Analysis and RSA Live Threat Intel • Entries age out after preconfigured time (12 hours for instance) • Critical Asset List may come from Feed File or CSV file which provides Business Context • Entries can be configured to be static and not age out 27
  • 28. Intelligence Driven Security with Security Analytics – Event Stream Analysis • When one of the Suspicious Hosts attempts to login on one of the Critical Assets, you may deem this as an elevation of Risk, and choose to add the IP address of the Host to a new list DYNAMIC CONTEXT • Elevated Risk Internal IP List based on Log Data from Domain Controller Suspicious Internal IP Elevated Risk Internal IP 10.221.32.12 161.169.207.15 .. .. If A->B->C AND the Host IP address is included in the Elevated Risk Context Window, then tell me about it!” © Copyright 2011 EMC Corporation. All rights reserved. • ESA determines that a host in the Suspicious Host IP list attempted to login to a host in the Critical Asset List • ESA places this IP address into the Elevated Risk Internal IP list, which can be configured to age out after a preconfigured time • Context Window can be referenced with the Incoming Event Streams and used to make a more intelligent decision to fire an Alert 28
  • 29. RSA Security Analytics • Cornerstone in the Security Operations journey • Flexible platform that grows with your needs – Compliance  incident detection investigation and forensics  advanced analysis – From logs  packets or packets  logs • Security platform where compliance is a byproduct, not the other way around © Copyright 2011 EMC Corporation. All rights reserved. 29
  • 30. RSA Advanced Cyber Defense Services A portfolio of services to help you achieve security operations excellence • Strategy & Roadmap Current strategy review and recommendations for desired future state • Incident Response Rapid breach response service and SLA-based retainer • NextGen Security Operations SOC/CIRC evolution and security program transformations; moving from reactive to proactive www.rsa.im/ACDpractice © Copyright 2013 EMC Corporation. All rights reserved. 30
  • 31. RSA Advanced Cyber Defense Training A comprehensive learning path for security analysts • Focus on proven methodologies for operating and managing a CIRC/SOC • Hands-on labs designed around real-world use cases and teamwork in a CIRC/SOC • Delivered by highly experienced RSA Security Practitioners www.emc.com/rsa-training © Copyright 2013 EMC Corporation. All rights reserved. 31
  • 32.
  • 33. Reimagining Security Analysis: Removing Hay vs. Digging For Needles All Network Traffic & Logs Terabytes of data 100% of total Downloads of executables Thousands of data points 5% of total Type does not match extension Hundreds of data points 0.2% of total ! © Copyright 2011 EMC Corporation. All rights reserved. Create alerts to/from critical assets A few dozen alerts 33
  • 34. Integrated Intelligence Know What To Look For RSA LIVE INTELLIGENCE SYSTEM Threat Intelligence – Rules – Parsers – Alerts – Feeds – Apps – Directory Services – Reports and Custom Actions 1 2 Gathers advanced threat intelligence and content 3 Aggregates & consolidates data Automatically distributes correlation rules, blacklists, parsers, views, feeds OPERATIONALIZE INTELLIGENCE: Take advantage of what others have already found and apply against your current and historical data © Copyright 2011 EMC Corporation. All rights reserved. 34
  • 35. SA vs. SIEM Attack Step Traditional SIEM RSA Security Analytics Alert for access over non-standard port No Yes Recreate activity of suspect IP address across environment No Yes Show user activity across AD and VPN Yes Yes Alert for different credentials used for AD and VP Yes Yes Reconstruct exfiltrated data No Yes © Copyright 2011 EMC Corporation. All rights reserved. 35