SlideShare a Scribd company logo
1 of 48
Kendra Cooley
Circle City Con
June 11, 2017
We Don’t
Always Go
Lights &
Sirens
Who Am I
TECHNICAL
• B.S. Digital Forensics
• CISSP
• InfoSec Analyst – Duo
Security
• Incident Response
• Security Awareness
Training
NON-TECHNICAL
• Family
• Mom of three… fur
babies
• Memorizing movie lines
• Searching for new
music
• DIY projects
• Taking naps
Kendra Cooley - @4n6Kendra
objective
Make Incident Response (IR) more relatable
What to expect
• High-level overview of IR
• Focus on triage
• A new perspective
• Awesome pictures… some blood
• Corny jokes
Detection
Reporting
Triage
Analysis
Containment
Mitigation
Follow-up
Detection
Reporting
Triage
Analysis
Containment
Mitigation
Follow-up
Tell
somebody
Something
happened
Set the pace
What
happened
Stop the
thing
Fix the
problem
Learn from
it
Detection
Reporting
Triage
Analysis
Containment
Mitigation
Follow-up
Tell
somebody
Something
happened
Set the pace
What
happened
Stop the
thing
Fix the
problem
Learn from
it
The goals are the same
1. Identify the problem
2. Prevent further damage
3. Fix what is broken
WE ARE FIRST RESPONDERS
TOO!
NO TWO INCIDENTS ARE THE SAME
Stop Relying on the Category
INFOSEC
Phish
Malware
SQL Injection
Cross-Site Scripting
Denial of Service
Lost/Stolen Device
EMS
Car Accident
Shooting
Broken Bones
Labor
Heart attack
Hangnail
Triage is critical
• Focus on severity, not category
• Identify the functional and informational
impact
• Properly assign resources
Why?
• Category only tells us so much
• Avoid ‘Too many hands in the pot’
• IR needs structure and organization
TRIAGE SETS THE pace
Detection
Reporting
Triage
Analysis
Containment
Mitigation
Follow-up
It all starts with…
Detection
Reporting
Triage
Analysis
Containment
Mitigation
Follow-up
And then…
Detection & Reporting
InfoSec EMS
Tools
People
InfoSec EMS
Rely on
accurate
information
Detection
Reporting
Triage
Analysis
Containment
Mitigation
Follow-up
The most critical phase
Consider the following:
InfoSec EMS
False Alarm
Panic/Fear
Human LifeLivelihood
ASSESSING THE IMPACT
INFOSEC
FUNCTIONAL
ARE CRITICAL FUNCTIONS
DISRUPTED?
INFORMATIONAL
HAS DATA BEEN
COMPROMISED?
EMS
SITUATION
WHAT WAS REPORTED?
SEVERITY
IS IT LIFE THREATENING?
LET THE FUN BEGIN
Category: car accident
Scenario 1
Caller witnessed a
single car accident
One passenger: male,
26 years of age
Driver status: Out of the
vehicle, fully coherent
with a visibly broken
wrist
LOW PRIORITY
Additional resources
not needed
Urgency is low
Non-life threatening
Category: car accident
Scenario 2
Caller witnessed a car
accident
One passenger: male,
26 years of age
Driver status: Out of the
vehicle. Complaining of
dizziness. Laceration to
left side of his head
Medium PRIORITY
Additional resources
may be needed
Urgency is increased
Condition of patient
could rapidly change
Category: car accident
Scenario 3
Caller witnessed a
single car accident
One passenger: male,
mid-twenties
Driver status:
Unconscious
High PRIORITY
Additional resources
are likely needed
Urgency is high
Patient’s life is at stake
WHAT ABOUT
INFOSEC?
Category: Phishing campaign
Scenario 1
Employee reports a
suspicious email
They did not click
any links or open
attachments
LOW PRIORITY
Additional
resources not
needed
Urgency is low
No risk to business
functions or data
Category: Phishing campaign
Scenario 2
Employee reports a
suspicious email
immediately after:
• Clicking the link
• Entering their
credentials on a
fake Google site
Medium PRIORITY
Additional resources
possibly needed
Urgency is increased
Credentials are
compromised
Without action, the
situation could get
worse
Category: Phishing campaign
Scenario 3
Employee reports
odd email activity
What they know:
• Hundreds of
emails have
been sent from
their account
containing an
attachment
High PRIORITY
Account is
compromised
Additional
resources are
necessary for
damage control
Urgency is high
Spotting the similarities
Priority Level Car Accident Phishing Campaign
High
LIGHTS AND SIRENS
Additional resources needed
‘Worst case’ scenario
Medium
LIGHTS AND SIRENS
Additional resources may be needed
Scenario could potentially get worse
Low
Additional resources not needed
Unlikely to cause further damage
Something else could take priority over this
Why does this matter?
A new perspective
Seemingly similar
categories resulted
in extremely
responses
WE CAN’T
WORK
EVERY
INCIDENT
AT 100 MPH.
But wait, there’s more
Priority can change at any time
Detection
Reporting
Triage
Analysis
Containment
Mitigation
Follow-up
Structure and organization
How can we improve?
MANAGERS
• Support your Analysts
• Implement a strong IR
process
• Organize your
resources
• Put more emphasis on
triage
• Be flexible
ANALYSTS
• Trust your gut
• Focus less on the
category
• Understand the
information in front of
you
• Be flexible
Key Takeaways
• Triage is more than categorization
• Triage sets the tone for the rest of the process
• Treat each situation as unique
• Not every incident requires ‘lights and sirens’
Thank you!!
Kendra Cooley
@4n6Kendra
Ken4n6dra@gmail.com
We Don’t
Always Go
Lights &
Sirens

More Related Content

Similar to We Don't Always Go Lights and Sirens - Circle City Con 2017

Survey Research
Survey Research Survey Research
Survey Research atrantham
 
Critical Analytical ThinkingPart II Heuristics and Bias.docx
Critical Analytical ThinkingPart II Heuristics and Bias.docxCritical Analytical ThinkingPart II Heuristics and Bias.docx
Critical Analytical ThinkingPart II Heuristics and Bias.docxannettsparrow
 
5 Benefits of Using Reciprocity in Investigation Interviews
5 Benefits of Using Reciprocity in Investigation Interviews5 Benefits of Using Reciprocity in Investigation Interviews
5 Benefits of Using Reciprocity in Investigation InterviewsCase IQ
 
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...Case IQ
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxZakiAhmed70
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueResilient Systems
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneInflection Point Global
 
PO 375 Intro to Survey Research
PO 375 Intro to Survey ResearchPO 375 Intro to Survey Research
PO 375 Intro to Survey Researchatrantham
 
Developing Analytic Technique and Defeating Cognitive Bias in Security
Developing Analytic Technique and Defeating Cognitive Bias in SecurityDeveloping Analytic Technique and Defeating Cognitive Bias in Security
Developing Analytic Technique and Defeating Cognitive Bias in Securitychrissanders88
 
POL SOC 360 Survey Research
POL SOC 360 Survey ResearchPOL SOC 360 Survey Research
POL SOC 360 Survey Researchatrantham
 
Media, Message & Mediums: Risk & Opportunity in the New World
Media, Message & Mediums: Risk & Opportunity in the New WorldMedia, Message & Mediums: Risk & Opportunity in the New World
Media, Message & Mediums: Risk & Opportunity in the New WorldJess Flynn
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1KR_Barker
 
Data-Driven off a Cliff: Anti-Patterns in Evidence-Based Decision Making
Data-Driven off a Cliff: Anti-Patterns in Evidence-Based Decision MakingData-Driven off a Cliff: Anti-Patterns in Evidence-Based Decision Making
Data-Driven off a Cliff: Anti-Patterns in Evidence-Based Decision Makingindeedeng
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftCase IQ
 
SEU Different Types of Credit Derivatives Questions.docx
SEU Different Types of Credit Derivatives Questions.docxSEU Different Types of Credit Derivatives Questions.docx
SEU Different Types of Credit Derivatives Questions.docxwrite5
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
Etobicoke CPA Association Presentation 2014
Etobicoke CPA Association Presentation 2014Etobicoke CPA Association Presentation 2014
Etobicoke CPA Association Presentation 2014Stephen McIntyre
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental InsiderBarry Caplin
 

Similar to We Don't Always Go Lights and Sirens - Circle City Con 2017 (20)

Survey Research
Survey Research Survey Research
Survey Research
 
Critical Analytical ThinkingPart II Heuristics and Bias.docx
Critical Analytical ThinkingPart II Heuristics and Bias.docxCritical Analytical ThinkingPart II Heuristics and Bias.docx
Critical Analytical ThinkingPart II Heuristics and Bias.docx
 
5 Benefits of Using Reciprocity in Investigation Interviews
5 Benefits of Using Reciprocity in Investigation Interviews5 Benefits of Using Reciprocity in Investigation Interviews
5 Benefits of Using Reciprocity in Investigation Interviews
 
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...
 
Twitter libel for sxsw
Twitter libel for sxswTwitter libel for sxsw
Twitter libel for sxsw
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance Issue
 
Serial Killers Presentation1
Serial Killers Presentation1Serial Killers Presentation1
Serial Killers Presentation1
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 
PO 375 Intro to Survey Research
PO 375 Intro to Survey ResearchPO 375 Intro to Survey Research
PO 375 Intro to Survey Research
 
Developing Analytic Technique and Defeating Cognitive Bias in Security
Developing Analytic Technique and Defeating Cognitive Bias in SecurityDeveloping Analytic Technique and Defeating Cognitive Bias in Security
Developing Analytic Technique and Defeating Cognitive Bias in Security
 
POL SOC 360 Survey Research
POL SOC 360 Survey ResearchPOL SOC 360 Survey Research
POL SOC 360 Survey Research
 
Media, Message & Mediums: Risk & Opportunity in the New World
Media, Message & Mediums: Risk & Opportunity in the New WorldMedia, Message & Mediums: Risk & Opportunity in the New World
Media, Message & Mediums: Risk & Opportunity in the New World
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1
 
Data-Driven off a Cliff: Anti-Patterns in Evidence-Based Decision Making
Data-Driven off a Cliff: Anti-Patterns in Evidence-Based Decision MakingData-Driven off a Cliff: Anti-Patterns in Evidence-Based Decision Making
Data-Driven off a Cliff: Anti-Patterns in Evidence-Based Decision Making
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
SEU Different Types of Credit Derivatives Questions.docx
SEU Different Types of Credit Derivatives Questions.docxSEU Different Types of Credit Derivatives Questions.docx
SEU Different Types of Credit Derivatives Questions.docx
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Etobicoke CPA Association Presentation 2014
Etobicoke CPA Association Presentation 2014Etobicoke CPA Association Presentation 2014
Etobicoke CPA Association Presentation 2014
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

We Don't Always Go Lights and Sirens - Circle City Con 2017