SlideShare una empresa de Scribd logo
1 de 15
Neil Desai
Solver of Problems, Causer of Mahem
Data Driven Analytics
Working towards success
https://medium.com/@sqrrldata/the-cyber-hunting-maturity-model-6d506faa8ad5
Working towards success
https://github.com/swannman/ircapabilities
Working towards success
https://github.com/swannman/ircapabilities
SOC Alert
MALWARE-BACKDOOR BackConstruction 2.1 Client FTP Open Request
MALWARE-BACKDOOR BackConstruction 2.1 Server FTP Open Reply
MALWARE-BACKDOOR Matrix 2.0 Client connect
MALWARE-BACKDOOR Matrix 2.0 Server access
MALWARE-BACKDOOR WinCrash 1.0 Server Active
MALWARE-BACKDOOR CDK
MALWARE-BACKDOOR DeepThroat 3.1 Server Response
MALWARE-BACKDOOR PhaseZero Server Active on Network
MALWARE-BACKDOOR w00w00 attempt
MALWARE-BACKDOOR attempt
MALWARE-BACKDOOR MISC r00t attempt
MALWARE-BACKDOOR MISC rewt attempt
MALWARE-BACKDOOR MISC Linux rootkit attempt
MALWARE-BACKDOOR MISC Linux rootkit attempt lrkr0x
MALWARE-BACKDOOR MISC Linux rootkit attempt
MALWARE-BACKDOOR MISC Linux rootkit satori attempt
MALWARE-BACKDOOR MISC sm4ck attempt
MALWARE-BACKDOOR MISC Solaris 2.5 attempt
MALWARE-BACKDOOR HidePak backdoor attempt
MALWARE-BACKDOOR HideSource backdoor attempt
PROTOCOL-ICMP TFN Probe
PROTOCOL-ICMP tfn2k icmp possible communication
MALWARE-OTHER Trin00 Daemon to Master PONG message detected
PROTOCOL-ICMP Stacheldraht server spoof
PROTOCOL-ICMP Stacheldraht gag server response
PROTOCOL-ICMP Stacheldraht server response
SOC Alerts
SOC Alert
SOC Alert
SOC Alert
Incomplete Data
https://www.patheos.com/blogs/driventoabstraction/2018/07/blind-men-elephant-folklore-knowledge/
Alerts vs Raw Data
• Alerts give very specific information, but they don’t tell the whole story. Context is
key, but isn’t in the alert.
• Alert logic may not be visible to the analyst or hard to interpret.
• Alert may not give enough details.
• Raw data is high volume and hard to sift through.
• Either create alerts from the raw data or get both.
Trust, But Verify
• Log settings can change during an upgrade of a product, by mistake, or
maliciously.
• “Turn on Logs” is not really a setting. Check to see exactly what’s enabled and
where.
• Regularly test to ensure logs (volume and variety) are as expected.
• Operationalize log collection.
• Understand what you have today, and determine what you need
MITRE ATT&CK
• Use the framework to determine your visibility gap
(https://cyberwardog.blogspot.com/2017/07/how-hot-is-your-hunt-team.html)
• Use testing frameworks to check detections
(https://github.com/redcanaryco/atomic-red-team)
Winlogbeat + Sysmon +
https://github.com/olafhartong/sysmon-modular
Auditbeat + https://github.com/bfuzzy/auditd-attack

Más contenido relacionado

La actualidad más candente

Webinar slides: ClusterControl 1.4: The MySQL Replication & MongoDB Edition -...
Webinar slides: ClusterControl 1.4: The MySQL Replication & MongoDB Edition -...Webinar slides: ClusterControl 1.4: The MySQL Replication & MongoDB Edition -...
Webinar slides: ClusterControl 1.4: The MySQL Replication & MongoDB Edition -...
Severalnines
 
HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)
HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)
HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)
Igalia
 

La actualidad más candente (20)

Webinar slides: Top 9 Tips for building a stable MySQL Replication environment
Webinar slides: Top 9 Tips for building a stable MySQL Replication environmentWebinar slides: Top 9 Tips for building a stable MySQL Replication environment
Webinar slides: Top 9 Tips for building a stable MySQL Replication environment
 
DevOpsDays - DevOps: Security 干我何事?
DevOpsDays - DevOps: Security 干我何事?DevOpsDays - DevOps: Security 干我何事?
DevOpsDays - DevOps: Security 干我何事?
 
Dynamic Database Credentials: Security Contingency Planning
Dynamic Database Credentials: Security Contingency PlanningDynamic Database Credentials: Security Contingency Planning
Dynamic Database Credentials: Security Contingency Planning
 
Monitoring and Tuning GlassFish
Monitoring and Tuning GlassFishMonitoring and Tuning GlassFish
Monitoring and Tuning GlassFish
 
Webinar slides: ClusterControl 1.4: The MySQL Replication & MongoDB Edition -...
Webinar slides: ClusterControl 1.4: The MySQL Replication & MongoDB Edition -...Webinar slides: ClusterControl 1.4: The MySQL Replication & MongoDB Edition -...
Webinar slides: ClusterControl 1.4: The MySQL Replication & MongoDB Edition -...
 
Using Vault to decouple MySQL Secrets
Using Vault to decouple MySQL SecretsUsing Vault to decouple MySQL Secrets
Using Vault to decouple MySQL Secrets
 
Workshop desarrollo Cassandra con el driver Java
Workshop desarrollo Cassandra con el driver JavaWorkshop desarrollo Cassandra con el driver Java
Workshop desarrollo Cassandra con el driver Java
 
Issuing temporary credentials for my sql using hashicorp vault
Issuing temporary credentials for my sql using hashicorp vaultIssuing temporary credentials for my sql using hashicorp vault
Issuing temporary credentials for my sql using hashicorp vault
 
Securing your Cloud Environment
Securing your Cloud EnvironmentSecuring your Cloud Environment
Securing your Cloud Environment
 
Advanced nginx in mercari - How to handle over 1,200,000 HTTPS Reqs/Min
Advanced nginx in mercari - How to handle over 1,200,000 HTTPS Reqs/MinAdvanced nginx in mercari - How to handle over 1,200,000 HTTPS Reqs/Min
Advanced nginx in mercari - How to handle over 1,200,000 HTTPS Reqs/Min
 
(WEB304) Running and Scaling Magento on AWS | AWS re:Invent 2014
(WEB304) Running and Scaling Magento on AWS | AWS re:Invent 2014(WEB304) Running and Scaling Magento on AWS | AWS re:Invent 2014
(WEB304) Running and Scaling Magento on AWS | AWS re:Invent 2014
 
Security model for a remote company
Security model for a remote companySecurity model for a remote company
Security model for a remote company
 
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Null bhopal Sep 2016: What it Takes to Secure a Web ApplicationNull bhopal Sep 2016: What it Takes to Secure a Web Application
Null bhopal Sep 2016: What it Takes to Secure a Web Application
 
HashiCorp's Vault - The Examples
HashiCorp's Vault - The ExamplesHashiCorp's Vault - The Examples
HashiCorp's Vault - The Examples
 
Chickens & Eggs: Managing secrets in AWS with Hashicorp Vault
Chickens & Eggs: Managing secrets in AWS with Hashicorp VaultChickens & Eggs: Managing secrets in AWS with Hashicorp Vault
Chickens & Eggs: Managing secrets in AWS with Hashicorp Vault
 
Managing secrets at scale
Managing secrets at scaleManaging secrets at scale
Managing secrets at scale
 
Securing Your Containerized Applications with NGINX
Securing Your Containerized Applications with NGINXSecuring Your Containerized Applications with NGINX
Securing Your Containerized Applications with NGINX
 
HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)
HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)
HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)
 
Vault - Secret and Key Management
Vault - Secret and Key ManagementVault - Secret and Key Management
Vault - Secret and Key Management
 
ruxc0n 2012
ruxc0n 2012ruxc0n 2012
ruxc0n 2012
 

Similar a Neil Desai - Data Driven Analytics

Oreilly Webcast Jan 09, 2009
Oreilly Webcast Jan 09, 2009Oreilly Webcast Jan 09, 2009
Oreilly Webcast Jan 09, 2009
Sean Hull
 
Bh us-03-ornaghi-valleri
Bh us-03-ornaghi-valleriBh us-03-ornaghi-valleri
Bh us-03-ornaghi-valleri
Hai Nguyen
 

Similar a Neil Desai - Data Driven Analytics (20)

CloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and TroubleshootingCloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and Troubleshooting
 
Deep Dive into Docker Swarm Mode
Deep Dive into Docker Swarm ModeDeep Dive into Docker Swarm Mode
Deep Dive into Docker Swarm Mode
 
Openssl
OpensslOpenssl
Openssl
 
All Aboard for Laravel 5.1
All Aboard for Laravel 5.1All Aboard for Laravel 5.1
All Aboard for Laravel 5.1
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5
 
Oreilly Webcast Jan 09, 2009
Oreilly Webcast Jan 09, 2009Oreilly Webcast Jan 09, 2009
Oreilly Webcast Jan 09, 2009
 
Firewalling a Service Mesh with WebAssembly.pdf
Firewalling a Service Mesh with WebAssembly.pdfFirewalling a Service Mesh with WebAssembly.pdf
Firewalling a Service Mesh with WebAssembly.pdf
 
Multi Source Replication With MySQL 5.7 @ Verisure
Multi Source Replication With MySQL 5.7 @ VerisureMulti Source Replication With MySQL 5.7 @ Verisure
Multi Source Replication With MySQL 5.7 @ Verisure
 
What's New in Docker 1.12?
What's New in Docker 1.12?What's New in Docker 1.12?
What's New in Docker 1.12?
 
Saltstack with Zabbix
Saltstack with ZabbixSaltstack with Zabbix
Saltstack with Zabbix
 
Business-critical MySQL with DR in vCloud Air
Business-critical MySQL with DR in vCloud AirBusiness-critical MySQL with DR in vCloud Air
Business-critical MySQL with DR in vCloud Air
 
Business-critical MySQL with DR in vCloud Air
Business-critical MySQL with DR in vCloud AirBusiness-critical MySQL with DR in vCloud Air
Business-critical MySQL with DR in vCloud Air
 
MySQL Fabric Tutorial, October 2014
MySQL Fabric Tutorial, October 2014MySQL Fabric Tutorial, October 2014
MySQL Fabric Tutorial, October 2014
 
My two cents about Mysql backup
My two cents about Mysql backupMy two cents about Mysql backup
My two cents about Mysql backup
 
Bh us-03-ornaghi-valleri
Bh us-03-ornaghi-valleriBh us-03-ornaghi-valleri
Bh us-03-ornaghi-valleri
 
Fisl - Deployment
Fisl - DeploymentFisl - Deployment
Fisl - Deployment
 
Converting Your Dev Environment to a Docker Stack - Cascadia
Converting Your Dev Environment to a Docker Stack - CascadiaConverting Your Dev Environment to a Docker Stack - Cascadia
Converting Your Dev Environment to a Docker Stack - Cascadia
 
Advanced Cassandra
Advanced CassandraAdvanced Cassandra
Advanced Cassandra
 
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
 
Converting Your Dev Environment to a Docker Stack - php[world]
Converting Your Dev Environment to a Docker Stack - php[world]Converting Your Dev Environment to a Docker Stack - php[world]
Converting Your Dev Environment to a Docker Stack - php[world]
 

Más de CSNP

Brian Sanders - Business Electronic Compromise (BEC)
Brian Sanders - Business Electronic Compromise (BEC)Brian Sanders - Business Electronic Compromise (BEC)
Brian Sanders - Business Electronic Compromise (BEC)
CSNP
 
David Klein - Defending Against Nation Sate Attackers & Ransomware
David Klein - Defending Against Nation Sate Attackers & RansomwareDavid Klein - Defending Against Nation Sate Attackers & Ransomware
David Klein - Defending Against Nation Sate Attackers & Ransomware
CSNP
 
Tarik Moataz - Encrypted Search: from Research to Real-World Systems
Tarik Moataz -  Encrypted Search: from Research to Real-World SystemsTarik Moataz -  Encrypted Search: from Research to Real-World Systems
Tarik Moataz - Encrypted Search: from Research to Real-World Systems
CSNP
 
Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and...
Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and...Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and...
Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and...
CSNP
 

Más de CSNP (12)

Brian Sanders - Business Electronic Compromise (BEC)
Brian Sanders - Business Electronic Compromise (BEC)Brian Sanders - Business Electronic Compromise (BEC)
Brian Sanders - Business Electronic Compromise (BEC)
 
David Klein - Defending Against Nation Sate Attackers & Ransomware
David Klein - Defending Against Nation Sate Attackers & RansomwareDavid Klein - Defending Against Nation Sate Attackers & Ransomware
David Klein - Defending Against Nation Sate Attackers & Ransomware
 
Nicholas Dorans - The Evolution of Passwords
Nicholas Dorans - The Evolution of PasswordsNicholas Dorans - The Evolution of Passwords
Nicholas Dorans - The Evolution of Passwords
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
 
Tarik Moataz - Encrypted Search: from Research to Real-World Systems
Tarik Moataz -  Encrypted Search: from Research to Real-World SystemsTarik Moataz -  Encrypted Search: from Research to Real-World Systems
Tarik Moataz - Encrypted Search: from Research to Real-World Systems
 
Elliptic Curves in Cryptography
Elliptic Curves in CryptographyElliptic Curves in Cryptography
Elliptic Curves in Cryptography
 
DefendEdge - Negotiating Ransomware
DefendEdge - Negotiating RansomwareDefendEdge - Negotiating Ransomware
DefendEdge - Negotiating Ransomware
 
Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and...
Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and...Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and...
Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and...
 
Complyify Car Hacking & Cyber Risk
Complyify Car Hacking & Cyber RiskComplyify Car Hacking & Cyber Risk
Complyify Car Hacking & Cyber Risk
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation Strategies
 
Aon - Cyber Insurance in the World of Cyber Criminals
Aon - Cyber Insurance in the World of Cyber CriminalsAon - Cyber Insurance in the World of Cyber Criminals
Aon - Cyber Insurance in the World of Cyber Criminals
 
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-SegmentationGuardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Neil Desai - Data Driven Analytics

Notas del editor

  1. Hi, everyone. Over the past few years, we’ve been making it easier for our users to deploy Elastic for Security Analytics. We define Security Analytics as the highly scalable collection, indexing, and real-time advanced analysis of all kinds of security-related data… We’re now introducing Elastic SIEM to provide a curated experience for security analysts and investigators to perform: Security information and event management Threat detection Threat hunting
  2. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  3. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  4. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  5. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  6. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  7. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  8. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  9. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  10. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  11. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  12. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  13. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  14. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  15. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.