SlideShare a Scribd company logo
1 of 1
Download to read offline
5
Cyber Defense
Continuum.
Main
Characters.
Supporting
Characters.
Schoolboy
Owners
Gardener
Forensic team
Mailman
Analyst
Thief
SWAT
Lorem ipsum dolor sit amet, consectetur adipiscing
elit, sed do eiusmod tempor incididunt ut labore et
dolore magna aliqua. Ut enim ad minim veniam, quis
nostrud exercitation ullamco laboris nisi ut aliquip ex
ea commodo consequat.
Duis aute irure dolor in reprehenderit in voluptate velit
esse cillum dolore eu fugiat nulla pariatur.
System auto-recognizes trusted insider.
Plot: Schoolboy comes home. Fence camera picks
up via biometrics, e.g. face recognition.
Result: System auto-recognizes him as a trusted
insider. No incident means no response required.
Lorem ipsum dolor sit amet, consectetur adipiscing
elit, sed do eiusmod tempor incididunt ut labore et
dolore magna aliqua.
Ut enim ad minim veniam, quis nostrud exercitation
ullamco laboris nisi ut aliquip ex ea
commodo consequat.
Sources:
1. International Data Corp (IDC), “U.S. Residential Landline Voice Displacement Forecast, 2016–2020, May 2016.
2. Ovum. Market Landscape: Enterprise Mobility Management 2016.
3. Ovum Trends to Watch: Employee Mobility, Feb 2016; Survey results Enterprise Mobility Ovum 2015/16.
4. Smartphone Connections Forecast 2016 – 21, Aug 2016 Ovum-TMT Intelligence, 2016.
5. Abbreviated disclaimer: Results based on third-party study.
6. Network rankings based on RootMetrics® US National and State RootScore® Reports: 2H 2016. Performance rankings of four mobile networks rely on scores calculated from random
samples across all available network types. Your experience may vary. The RootMetrics award is not an endorsement of Verizon. Visit www.rootmetrics.com for more details.
7. Gartner April 11, 2017 “Critical Capabilities for Wireline Telecom Services US”.
2016 North American Frost & Sullivan Award for Market Leadership.
J.D. Power ranks Verizon the top wireless network in five regions in the U.S. Achieved highest score from J.D. Power in all three quality categories: calling, messaging and data. For the seventeenth time in a row, Verizon has received more awards than any other provider in the J.D. Power Wireless Network Quality Study.
© 2017 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other
countries. All other trademarks and service marks are the property of their respective owners.
Detection
Network Threat Advanced Analytics
MSS – Analytics
Managed SIEM
Advanced SOC
Analyst has different options to respond:
Data collection &
storage and
intelligence enrichment
Data Intelligence Advanced
analytics
Initial
investigation
Incident
response
Mitigation Emergency
response
Investigative
response
Threat analysis /
incident detection*
USP
(Unified
Security
Portal)
Customer
tools
Security and
end-point
management
Advanced
CERT
Threat
Intel and
Response
Incident response
and mitigation
Investigative
response-ProServ
security
Response
Data Raw data enriched Adv. analytics
Analyst
Incident triage
Incident
creation
End-point
Secure house
Notify owners
MSS-prem
(MSS – Premises)
Call CSIRT
Call CERT
Services
Incident workflow
SIEM / SOC
NTAA (Network Threat
Advanced Analytics)
Anomaly-based
monitoring & analytics
of NetFlow traffic on
Verizon platform into USP;
SOC support.
Verizon Platform.
USP (SOC support)
MSSA (MSS Analytics)
Standard monitoring 
analytics on Verizon
platform into Verizon
SOC / USP.
Verizon Platform.
Verizon SOC / USP
MSIEM (Managed SIEM)
Monitoring  analytics
on customer SIEM into
Verizon SOC / USP.
Customer SIEM
Verizon SOC / USP
ASOC (Advanced SOC)
Tailored monitoring 
analytics from customer
SIEM into customer
dedicated
Verizon ASOC / IM mgmt
platform.
Customer SIEM
Cust. dedicated
Verizon ASOC / IM
Summary.
Cyber Defense Continuum.
Schoolboy.
Trusted actor.
Street camera picks up school bus.1
Fence camera picks up schoolboy
via face recognition.
2
System recognizes schoolboy as trusted
insider and does not create an incident.
3
No incident means
no response required.
3
2
4
1
ResponseDetection
Analyst recognizes trusted 3rd party.
Plot: Mailman drops off a parcel at the mailbox
behind the fence. Analyst recognizes trusted
3rd party.
Result: An incident is identified but initial triage
shows there is no threat. Owners are just notified.
Mailman.
Accept risk.
Detection
Mailman
Boy
Analyst
Owner
Response
1 Street camera picks up postal truck.
Fence camera picks up image of
mailman on the way in - and on the
way out again.
2
3
Camera inside the house does not show
any activity.
4 The system aggregates all information.
5
Analyst evaluates all information,
determines that it is a trusted 3rd party,
and creates an incident (but no threat)
that only requires notification.
2
3
4
6
1
Thief.
Immediate threat.
Untrusted 3rd party triggers incident - SWAT stops
thief before damage.
Plot: Person looking like a thief gets over the fence
using a ladder.
Result: Analyst recognizes the immediate threat
and calls in the SWAT team. The SWAT team
manages to arrest the thief before he can get into
the house.
Gardener.
Trusted actor gone wrong.
Trusted 3rd party goes rogue.
Plot: A Gardener was hired to do a
landscaping job around the house (and
behind the fence). He abuses /exceeds his
privileges by breaking into the actual house
where he is looking for jewelry.
Result: Inside camera picks up the
Gardener and analyst remotely locks the
door to the bedroom (with safe inside). At
the same time, he alerts the SWAT team that
manages to arrest the Gardener inside the
house / before he can get away. A breach
has happened but nothing was stolen and
the Owners and Security company do a
forensic investigation as to how to improve
security posture.
Detection
Detection
Thief
Gardener
Owner
Owner
Response
Response
Street camera picks up suspiciously
looking untrusted 3rd party.1
Street camera and fence camera see
Gardener getting onto the premises.1
Fence camera picks up image of thief
getting over the fence.2
2
System aggregates all information.3
3
Analyst escalates and calls in the
SWAT team.
4
6
SWAT team manages
to arrest the thief
before he can get
into the house.
2
1
2
3
4
4
5
1
1
Analyst
Analyst
System
(triggered by
Analyst)
only notifies
the owners.
5
House is secured; no
successful breach.
Security company
and Owners discuss
potential additional
security measures
(e.g. higher fence, a
dog, etc.)
7
Analyst also notifies the owners.
4
6
Gardener breaks into the house and
inside camera monitors this activity.
Ut enim ad minim veniam, quis nostrud
exercitation ullamco laboris nisi ut aliquip.
Ut enim ad minim veniam, quis nostrud
exercitation ullamco laboris nisi ut aliquip.
Ut enim ad minim veniam, quis nostrud
exercitation ullamco laboris nisi ut aliquip.
Ut enim ad minim veniam, quis nostrud
exercitation ullamco laboris nisi ut aliquip.

More Related Content

Similar to Infographic analytics infographic_illustrations_121117-2

RAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolio
Rhys A. Mossom
 
The Breach at Limetree Updated November 18, 2017 Bac.docx
The Breach at Limetree Updated November 18, 2017   Bac.docxThe Breach at Limetree Updated November 18, 2017   Bac.docx
The Breach at Limetree Updated November 18, 2017 Bac.docx
mehek4
 

Similar to Infographic analytics infographic_illustrations_121117-2 (20)

Insider threat-what-us-do d-want
Insider threat-what-us-do d-wantInsider threat-what-us-do d-want
Insider threat-what-us-do d-want
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation Strategies
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
RAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolio
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 
The Breach at Limetree Updated November 18, 2017 Bac.docx
The Breach at Limetree Updated November 18, 2017   Bac.docxThe Breach at Limetree Updated November 18, 2017   Bac.docx
The Breach at Limetree Updated November 18, 2017 Bac.docx
 
Michael Crosno (Security Landscape) Geekfest
Michael Crosno (Security Landscape) Geekfest Michael Crosno (Security Landscape) Geekfest
Michael Crosno (Security Landscape) Geekfest
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
 
CYBER51-FYLER
CYBER51-FYLERCYBER51-FYLER
CYBER51-FYLER
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
 
The Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSThe Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOS
 
Infosec cert service
Infosec cert serviceInfosec cert service
Infosec cert service
 
Cyber Security: Cyber Incident Response Methodology
Cyber Security:  Cyber Incident Response MethodologyCyber Security:  Cyber Incident Response Methodology
Cyber Security: Cyber Incident Response Methodology
 
Self-Learning Systems for Cyber Security
Self-Learning Systems for Cyber SecuritySelf-Learning Systems for Cyber Security
Self-Learning Systems for Cyber Security
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 
Mom phd
Mom phdMom phd
Mom phd
 
Unraveling the Confusion Surrounding the Purpose of Penetration Tests
Unraveling the Confusion Surrounding the Purpose of Penetration Tests Unraveling the Confusion Surrounding the Purpose of Penetration Tests
Unraveling the Confusion Surrounding the Purpose of Penetration Tests
 

More from Richard Smiraldi

Infographic vo ip_ip_trucking_collateral_fatima_082117
Infographic vo ip_ip_trucking_collateral_fatima_082117Infographic vo ip_ip_trucking_collateral_fatima_082117
Infographic vo ip_ip_trucking_collateral_fatima_082117
Richard Smiraldi
 

More from Richard Smiraldi (20)

Mobile_Tablet_Desktop_Vector_Carousel_Images_with_lorem_fpo.pdf
Mobile_Tablet_Desktop_Vector_Carousel_Images_with_lorem_fpo.pdfMobile_Tablet_Desktop_Vector_Carousel_Images_with_lorem_fpo.pdf
Mobile_Tablet_Desktop_Vector_Carousel_Images_with_lorem_fpo.pdf
 
rsmiraldi_WHITEPAPER_SAMPLE.pdf
rsmiraldi_WHITEPAPER_SAMPLE.pdfrsmiraldi_WHITEPAPER_SAMPLE.pdf
rsmiraldi_WHITEPAPER_SAMPLE.pdf
 
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdfrsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
 
rsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdf
rsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdfrsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdf
rsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdf
 
Cyber threats sample
Cyber threats sampleCyber threats sample
Cyber threats sample
 
Analyst sample Presentation
Analyst sample PresentationAnalyst sample Presentation
Analyst sample Presentation
 
Vz scrubbed sample_2
Vz scrubbed sample_2Vz scrubbed sample_2
Vz scrubbed sample_2
 
Cyber Threats Presentation Sample
Cyber Threats Presentation SampleCyber Threats Presentation Sample
Cyber Threats Presentation Sample
 
Sample verizon infographic_audio_conf
Sample verizon infographic_audio_confSample verizon infographic_audio_conf
Sample verizon infographic_audio_conf
 
Infographic vo ip_ip_trucking_collateral_fatima_082117
Infographic vo ip_ip_trucking_collateral_fatima_082117Infographic vo ip_ip_trucking_collateral_fatima_082117
Infographic vo ip_ip_trucking_collateral_fatima_082117
 
Cx longitude infographic_v3-081419
Cx longitude infographic_v3-081419Cx longitude infographic_v3-081419
Cx longitude infographic_v3-081419
 
Audio conf infographic v.5
Audio conf infographic v.5Audio conf infographic v.5
Audio conf infographic v.5
 
network_call_redirect_ncr_short_overview_apacemeaus_rs
network_call_redirect_ncr_short_overview_apacemeaus_rsnetwork_call_redirect_ncr_short_overview_apacemeaus_rs
network_call_redirect_ncr_short_overview_apacemeaus_rs
 
outbound_tdm_voice_short_overview_us_rs
outbound_tdm_voice_short_overview_us_rsoutbound_tdm_voice_short_overview_us_rs
outbound_tdm_voice_short_overview_us_rs
 
011918 incident analytics_service_fact_sheet_rs
011918 incident analytics_service_fact_sheet_rs011918 incident analytics_service_fact_sheet_rs
011918 incident analytics_service_fact_sheet_rs
 
011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs
 
011918 espionage health_check_fact_sheet_rs
011918 espionage health_check_fact_sheet_rs011918 espionage health_check_fact_sheet_rs
011918 espionage health_check_fact_sheet_rs
 
Ecommerce landing-page-examples
Ecommerce landing-page-examplesEcommerce landing-page-examples
Ecommerce landing-page-examples
 
Verizon landing page
Verizon landing pageVerizon landing page
Verizon landing page
 
Sample 091218 virtual_communications_express_customer
Sample 091218 virtual_communications_express_customerSample 091218 virtual_communications_express_customer
Sample 091218 virtual_communications_express_customer
 

Recently uploaded

Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdf
tbatkhuu1
 

Recently uploaded (20)

Labour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptxLabour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptx
 
Elevating Your Digital Presence by Evitha.pdf
Elevating Your Digital Presence by Evitha.pdfElevating Your Digital Presence by Evitha.pdf
Elevating Your Digital Presence by Evitha.pdf
 
Unlocking the Mystery of the Voynich Manuscript
Unlocking the Mystery of the Voynich ManuscriptUnlocking the Mystery of the Voynich Manuscript
Unlocking the Mystery of the Voynich Manuscript
 
2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.com2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.com
 
What is Google Search Console and What is it provide?
What is Google Search Console and What is it provide?What is Google Search Console and What is it provide?
What is Google Search Console and What is it provide?
 
Rise and fall of Kulula.com, an airline won consumers by different marketing ...
Rise and fall of Kulula.com, an airline won consumers by different marketing ...Rise and fall of Kulula.com, an airline won consumers by different marketing ...
Rise and fall of Kulula.com, an airline won consumers by different marketing ...
 
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdfMicro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
 
Press Release Distribution Evolving with Digital Trends.pdf
Press Release Distribution Evolving with Digital Trends.pdfPress Release Distribution Evolving with Digital Trends.pdf
Press Release Distribution Evolving with Digital Trends.pdf
 
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best StrategiesGoogle 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
 
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best PracticesInstant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
 
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night ServiceVIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
 
Discover Ardency Elite: Elevate Your Lifestyle
Discover Ardency Elite: Elevate Your LifestyleDiscover Ardency Elite: Elevate Your Lifestyle
Discover Ardency Elite: Elevate Your Lifestyle
 
Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdf
 
25+ years’ experience (310) 882-6330 Love Spells in Wilmington, DE | black ma...
25+ years’ experience (310) 882-6330 Love Spells in Wilmington, DE | black ma...25+ years’ experience (310) 882-6330 Love Spells in Wilmington, DE | black ma...
25+ years’ experience (310) 882-6330 Love Spells in Wilmington, DE | black ma...
 
Situation Analysis | Management Company.
Situation Analysis | Management Company.Situation Analysis | Management Company.
Situation Analysis | Management Company.
 
personal branding kit for music business
personal branding kit for music businesspersonal branding kit for music business
personal branding kit for music business
 
Alpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptxAlpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptx
 
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
 
BDSM⚡Call Girls in Sector 44 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 44 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 44 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 44 Noida Escorts >༒8448380779 Escort Service
 
BDSM⚡Call Girls in Sector 19 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 19 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 19 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 19 Noida Escorts >༒8448380779 Escort Service
 

Infographic analytics infographic_illustrations_121117-2

  • 1. 5 Cyber Defense Continuum. Main Characters. Supporting Characters. Schoolboy Owners Gardener Forensic team Mailman Analyst Thief SWAT Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. System auto-recognizes trusted insider. Plot: Schoolboy comes home. Fence camera picks up via biometrics, e.g. face recognition. Result: System auto-recognizes him as a trusted insider. No incident means no response required. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Sources: 1. International Data Corp (IDC), “U.S. Residential Landline Voice Displacement Forecast, 2016–2020, May 2016. 2. Ovum. Market Landscape: Enterprise Mobility Management 2016. 3. Ovum Trends to Watch: Employee Mobility, Feb 2016; Survey results Enterprise Mobility Ovum 2015/16. 4. Smartphone Connections Forecast 2016 – 21, Aug 2016 Ovum-TMT Intelligence, 2016. 5. Abbreviated disclaimer: Results based on third-party study. 6. Network rankings based on RootMetrics® US National and State RootScore® Reports: 2H 2016. Performance rankings of four mobile networks rely on scores calculated from random samples across all available network types. Your experience may vary. The RootMetrics award is not an endorsement of Verizon. Visit www.rootmetrics.com for more details. 7. Gartner April 11, 2017 “Critical Capabilities for Wireline Telecom Services US”. 2016 North American Frost & Sullivan Award for Market Leadership. J.D. Power ranks Verizon the top wireless network in five regions in the U.S. Achieved highest score from J.D. Power in all three quality categories: calling, messaging and data. For the seventeenth time in a row, Verizon has received more awards than any other provider in the J.D. Power Wireless Network Quality Study. © 2017 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners. Detection Network Threat Advanced Analytics MSS – Analytics Managed SIEM Advanced SOC Analyst has different options to respond: Data collection & storage and intelligence enrichment Data Intelligence Advanced analytics Initial investigation Incident response Mitigation Emergency response Investigative response Threat analysis / incident detection* USP (Unified Security Portal) Customer tools Security and end-point management Advanced CERT Threat Intel and Response Incident response and mitigation Investigative response-ProServ security Response Data Raw data enriched Adv. analytics Analyst Incident triage Incident creation End-point Secure house Notify owners MSS-prem (MSS – Premises) Call CSIRT Call CERT Services Incident workflow SIEM / SOC NTAA (Network Threat Advanced Analytics) Anomaly-based monitoring & analytics of NetFlow traffic on Verizon platform into USP; SOC support. Verizon Platform. USP (SOC support) MSSA (MSS Analytics) Standard monitoring analytics on Verizon platform into Verizon SOC / USP. Verizon Platform. Verizon SOC / USP MSIEM (Managed SIEM) Monitoring analytics on customer SIEM into Verizon SOC / USP. Customer SIEM Verizon SOC / USP ASOC (Advanced SOC) Tailored monitoring analytics from customer SIEM into customer dedicated Verizon ASOC / IM mgmt platform. Customer SIEM Cust. dedicated Verizon ASOC / IM Summary. Cyber Defense Continuum. Schoolboy. Trusted actor. Street camera picks up school bus.1 Fence camera picks up schoolboy via face recognition. 2 System recognizes schoolboy as trusted insider and does not create an incident. 3 No incident means no response required. 3 2 4 1 ResponseDetection Analyst recognizes trusted 3rd party. Plot: Mailman drops off a parcel at the mailbox behind the fence. Analyst recognizes trusted 3rd party. Result: An incident is identified but initial triage shows there is no threat. Owners are just notified. Mailman. Accept risk. Detection Mailman Boy Analyst Owner Response 1 Street camera picks up postal truck. Fence camera picks up image of mailman on the way in - and on the way out again. 2 3 Camera inside the house does not show any activity. 4 The system aggregates all information. 5 Analyst evaluates all information, determines that it is a trusted 3rd party, and creates an incident (but no threat) that only requires notification. 2 3 4 6 1 Thief. Immediate threat. Untrusted 3rd party triggers incident - SWAT stops thief before damage. Plot: Person looking like a thief gets over the fence using a ladder. Result: Analyst recognizes the immediate threat and calls in the SWAT team. The SWAT team manages to arrest the thief before he can get into the house. Gardener. Trusted actor gone wrong. Trusted 3rd party goes rogue. Plot: A Gardener was hired to do a landscaping job around the house (and behind the fence). He abuses /exceeds his privileges by breaking into the actual house where he is looking for jewelry. Result: Inside camera picks up the Gardener and analyst remotely locks the door to the bedroom (with safe inside). At the same time, he alerts the SWAT team that manages to arrest the Gardener inside the house / before he can get away. A breach has happened but nothing was stolen and the Owners and Security company do a forensic investigation as to how to improve security posture. Detection Detection Thief Gardener Owner Owner Response Response Street camera picks up suspiciously looking untrusted 3rd party.1 Street camera and fence camera see Gardener getting onto the premises.1 Fence camera picks up image of thief getting over the fence.2 2 System aggregates all information.3 3 Analyst escalates and calls in the SWAT team. 4 6 SWAT team manages to arrest the thief before he can get into the house. 2 1 2 3 4 4 5 1 1 Analyst Analyst System (triggered by Analyst) only notifies the owners. 5 House is secured; no successful breach. Security company and Owners discuss potential additional security measures (e.g. higher fence, a dog, etc.) 7 Analyst also notifies the owners. 4 6 Gardener breaks into the house and inside camera monitors this activity. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip.