SlideShare a Scribd company logo
1 of 29
Building a Better Analyst
Using Cognitive Psychology
Chris Sanders
Bsides Augusta 2015
Chris Sanders
• Christian
• Southerner
• PhD Researcher
• FireEye
• GSE
• BBQ Pit Master
**Disclaimer**
I’m going to talk about matters of the brain, not
just the normal tech stuff.
My research for this presentation involved
consultation with psychologists.
I, however, am not one….yet.
Outline
Objectives:
 Metacognition
 Perception
 Intuition
 Working Memory
“How metacognitive awareness can help you make
better technical decisions during security
investigations.“
Metacognition
• Thinking about thinking
• Research shows a relationship between
metacognitive awareness and cognitive
performance.
• Two Components:
– Knowledge of cognition (understand it)
– Regulation of cognition (apply it)
The Investigation
• Investigations are an attempt to determine
the ground truth of what really happened.
– Is there a bad guy?
– What did they do?
• Investigations introduce cognitive challenges
Perception, Reality, and Bias
Perception vs. Reality
• Perception:
– “A way of regarding, understanding, or
interpreting something.”
• Reality:
– “The state of things as they actually exist.”
Our investigative path depends on mindset and biases
Mindsets and Blur
• Mindsets frame how
we see the world
• Quick to form and
resistant to change
• The initial picture we
see forms our first
mindset impression
• Biases applied here
carry forward
Diminishing Initial Blur
• Provide relevant information up front
• Real-istic time alerting
• Formalization of triage function
– Put your expertise here
– Gather info, make recommendations, pass on
– Smaller orgs can use partner analysis
Inattentional Blindness (IB)
• Attention – Focusing on something
– Overt or covert
– Attention is a limited resource
– Many things fight for analyst attention
• It is very easy to miss things right in front of us
Diminishing IB
• Experienced analyst are usually less suceptible
• Mastery of your environment
– Mise en place
• Controlling attention
– Limit extraneous info
– Direct focus
– Gaze tracking
Intuition and Memory
It’s a Hard SOC Life
• Investigative knowledge is tacit
– Senior analysts can’t explain their success
– Junior analysts can’t effectively learn
• Knowledge transfer is limited
– “Watch and learn”
Analysts rely on intuition!
Intuition
• in·tu·i·tion (noun)
– The ability to understand something immediately,
without the need for conscious reasoning.
• Previously not well understood, often dismissed
“It is an illusion to expect
anything from intuition.”
– Sigmund Freud
A Biological Basis for Intuition
Precuneus
2.1x Larger Response
TED Talk: The Rise of Augmented Intelligence: https://www.youtube.com/watch?v=mKZCa_ejbfg
Modeling Memory
Using the Visuo-Spatial Sketchpad (VSP)
• A primary component of working memory
• Allows for visual manipulation of objects
• Studies show that “intuition” is directly tied to
use of VSSP (via the precuneus)
Related VSSP Usage
“If you look deep enough you will see music” – Thomas Carlyle
Visually Investigating
• Draw a picture!
– It’s what your brain is doing anyway
– Whiteboards everywhere
• Visualize Data Appropriately
– Don’t use viz for the sake of viz (geo maps )
– Incident timelines
– Link graphs
– Identify relationships (nouns/verbs)
Thinking Visually - Breakfast
Thinking Visually - Breach
WM Capacity Limitations
• The capacity of WM is biologically limited
• WM capacity is set from birth
– Humans can remember 7 items, + or - 2.
– Complexity of items matters
Hard to Remember Easy to Remember
248.232.122.193 6.5.4.3
sub29203.domain3789.com sub.domain.com
domain.com/me/?id=29381913 domain.com/path/url.htm
a39e3d50ba4aeb134d95ae7aa4
d6c578
system32.dll
Diminishing WM Capacity Limitations
• Source Monitoring
– Which IP was $suspicious_activity associated with?
– Was this file downloaded by $dropper or $attacker?
– Which case was $domain
• Chunking
– Grouping similar information
– Mapping to an existing schema
Schemas
Picture These Items
Stapler
Buffalo
Book
Foot
Flag
Eggs
Bacon
Grits
Sausage
Coffee
Unrelated to
Schema
Related to
Breakfast Schema
Conclusion
• The biggest hurdle to overcome when
investigating security incidents is our own
cognitive limitations
• Metacognition can diminish these limitations
Thank You!
E-Mail: chris@chrissanders.org
Twitter: @chrissanders88
Blog: http://www.chrissanders.org
Foundation: http://www.ruraltechfund.org

More Related Content

What's hot

NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - Hacking Performance Management, the Blue Green GameNTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - Hacking Performance Management, the Blue Green GameNorth Texas Chapter of the ISSA
 
Learning About At-Risk Veterans Using 
Online Network Surveys
Learning About At-Risk Veterans Using 
Online Network SurveysLearning About At-Risk Veterans Using 
Online Network Surveys
Learning About At-Risk Veterans Using 
Online Network SurveysSean Taylor
 
The Top 4 Ways On How Neuro-Marketing Influences The Online Dating Arena
The Top 4 Ways On How Neuro-Marketing Influences The Online Dating ArenaThe Top 4 Ways On How Neuro-Marketing Influences The Online Dating Arena
The Top 4 Ways On How Neuro-Marketing Influences The Online Dating ArenaStoic Advantage, LLC.
 
Trusted Advisor.pdf
Trusted Advisor.pdfTrusted Advisor.pdf
Trusted Advisor.pdfYuanSari1
 
Max Shron, Thinking with Data at the NYC Data Science Meetup
Max Shron, Thinking with Data at the NYC Data Science MeetupMax Shron, Thinking with Data at the NYC Data Science Meetup
Max Shron, Thinking with Data at the NYC Data Science Meetupmortardata
 
#ATAGTR2018 Presentation "The Subtle Influence of Cognitive Biases on Testing...
#ATAGTR2018 Presentation "The Subtle Influence of Cognitive Biases on Testing...#ATAGTR2018 Presentation "The Subtle Influence of Cognitive Biases on Testing...
#ATAGTR2018 Presentation "The Subtle Influence of Cognitive Biases on Testing...Agile Testing Alliance
 
Ask an Expert: Findings and Decisions
Ask an Expert: Findings and DecisionsAsk an Expert: Findings and Decisions
Ask an Expert: Findings and DecisionsKevin Gamble
 
A predictive analytics primer
A predictive analytics primerA predictive analytics primer
A predictive analytics primerShesha
 
How Do You want Scientists to be Perceived
How Do You want Scientists to be PerceivedHow Do You want Scientists to be Perceived
How Do You want Scientists to be PerceivedJohn C. Besley
 
Applying Psychology To The Estimation of QA
Applying Psychology To The Estimation of QAApplying Psychology To The Estimation of QA
Applying Psychology To The Estimation of QAPaula Heenan
 
Effective Fraud Investigations: 10 Keys to a Successful Outcome
Effective Fraud Investigations: 10 Keys to a Successful OutcomeEffective Fraud Investigations: 10 Keys to a Successful Outcome
Effective Fraud Investigations: 10 Keys to a Successful OutcomeCase IQ
 
Games vs Surveys - A case study - Upfront Analytics
Games vs Surveys - A case study - Upfront AnalyticsGames vs Surveys - A case study - Upfront Analytics
Games vs Surveys - A case study - Upfront AnalyticsMerlien Institute
 
Estimate and Measure. Minimize work, maximize value. Part 1
Estimate and Measure. Minimize work, maximize value. Part 1Estimate and Measure. Minimize work, maximize value. Part 1
Estimate and Measure. Minimize work, maximize value. Part 1Shiftup
 
Start Thinking Like a Data Scientist
Start Thinking Like a Data ScientistStart Thinking Like a Data Scientist
Start Thinking Like a Data ScientistAmanMehta47
 
The power of regular reviews
The power of regular reviewsThe power of regular reviews
The power of regular reviewsEbere Ikerionwu
 
Critical thinking tung
Critical thinking tungCritical thinking tung
Critical thinking tung131IV14
 

What's hot (17)

NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - Hacking Performance Management, the Blue Green GameNTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
 
Learning About At-Risk Veterans Using 
Online Network Surveys
Learning About At-Risk Veterans Using 
Online Network SurveysLearning About At-Risk Veterans Using 
Online Network Surveys
Learning About At-Risk Veterans Using 
Online Network Surveys
 
The Top 4 Ways On How Neuro-Marketing Influences The Online Dating Arena
The Top 4 Ways On How Neuro-Marketing Influences The Online Dating ArenaThe Top 4 Ways On How Neuro-Marketing Influences The Online Dating Arena
The Top 4 Ways On How Neuro-Marketing Influences The Online Dating Arena
 
Trusted Advisor.pdf
Trusted Advisor.pdfTrusted Advisor.pdf
Trusted Advisor.pdf
 
Max Shron, Thinking with Data at the NYC Data Science Meetup
Max Shron, Thinking with Data at the NYC Data Science MeetupMax Shron, Thinking with Data at the NYC Data Science Meetup
Max Shron, Thinking with Data at the NYC Data Science Meetup
 
#ATAGTR2018 Presentation "The Subtle Influence of Cognitive Biases on Testing...
#ATAGTR2018 Presentation "The Subtle Influence of Cognitive Biases on Testing...#ATAGTR2018 Presentation "The Subtle Influence of Cognitive Biases on Testing...
#ATAGTR2018 Presentation "The Subtle Influence of Cognitive Biases on Testing...
 
Ask an Expert: Findings and Decisions
Ask an Expert: Findings and DecisionsAsk an Expert: Findings and Decisions
Ask an Expert: Findings and Decisions
 
A predictive analytics primer
A predictive analytics primerA predictive analytics primer
A predictive analytics primer
 
How Do You want Scientists to be Perceived
How Do You want Scientists to be PerceivedHow Do You want Scientists to be Perceived
How Do You want Scientists to be Perceived
 
Applying Psychology To The Estimation of QA
Applying Psychology To The Estimation of QAApplying Psychology To The Estimation of QA
Applying Psychology To The Estimation of QA
 
Effective Fraud Investigations: 10 Keys to a Successful Outcome
Effective Fraud Investigations: 10 Keys to a Successful OutcomeEffective Fraud Investigations: 10 Keys to a Successful Outcome
Effective Fraud Investigations: 10 Keys to a Successful Outcome
 
Games vs Surveys - A case study - Upfront Analytics
Games vs Surveys - A case study - Upfront AnalyticsGames vs Surveys - A case study - Upfront Analytics
Games vs Surveys - A case study - Upfront Analytics
 
Estimate and Measure. Minimize work, maximize value. Part 1
Estimate and Measure. Minimize work, maximize value. Part 1Estimate and Measure. Minimize work, maximize value. Part 1
Estimate and Measure. Minimize work, maximize value. Part 1
 
Start Thinking Like a Data Scientist
Start Thinking Like a Data ScientistStart Thinking Like a Data Scientist
Start Thinking Like a Data Scientist
 
The power of regular reviews
The power of regular reviewsThe power of regular reviews
The power of regular reviews
 
Real-Time Responsive Text Analytics
Real-Time Responsive Text Analytics Real-Time Responsive Text Analytics
Real-Time Responsive Text Analytics
 
Critical thinking tung
Critical thinking tungCritical thinking tung
Critical thinking tung
 

Viewers also liked

Cuckoo sandbox
Cuckoo sandboxCuckoo sandbox
Cuckoo sandboxTensor
 
Анализ запросов российских пользователей на туры в различные страны в октябре...
Анализ запросов российских пользователей на туры в различные страны в октябре...Анализ запросов российских пользователей на туры в различные страны в октябре...
Анализ запросов российских пользователей на туры в различные страны в октябре...ATOR
 
Malware analysis as a hobby (Owasp Göteborg)
Malware analysis as a hobby (Owasp Göteborg)Malware analysis as a hobby (Owasp Göteborg)
Malware analysis as a hobby (Owasp Göteborg)Michael Boman
 
Building performance analysis system IES VE main features overview
Building performance analysis system IES VE main features overviewBuilding performance analysis system IES VE main features overview
Building performance analysis system IES VE main features overviewStatybos Akademija
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat HuntingGIBIN JOHN
 
Deeplook into apt and how to detect and defend v1.0
Deeplook into apt and how to detect and defend v1.0Deeplook into apt and how to detect and defend v1.0
Deeplook into apt and how to detect and defend v1.0Michael Gough
 
Logs, Logs, Logs - What you need to know to catch a thief
Logs, Logs, Logs - What you need to know to catch a thiefLogs, Logs, Logs - What you need to know to catch a thief
Logs, Logs, Logs - What you need to know to catch a thiefMichael Gough
 
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin FalckLuncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin FalckNorth Texas Chapter of the ISSA
 
Proper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSProper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSMichael Gough
 
Logging for Hackers v1.0
Logging for Hackers v1.0Logging for Hackers v1.0
Logging for Hackers v1.0Michael Gough
 
Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1Michael Gough
 
The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0Michael Gough
 
SOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation LabyrinthSOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation Labyrinthchrissanders88
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting WorkshopSplunk
 
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...Sam Bowne
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 

Viewers also liked (20)

Second Life at MIT
Second Life at MITSecond Life at MIT
Second Life at MIT
 
Cuckoo sandbox
Cuckoo sandboxCuckoo sandbox
Cuckoo sandbox
 
Анализ запросов российских пользователей на туры в различные страны в октябре...
Анализ запросов российских пользователей на туры в различные страны в октябре...Анализ запросов российских пользователей на туры в различные страны в октябре...
Анализ запросов российских пользователей на туры в различные страны в октябре...
 
Malware analysis as a hobby (Owasp Göteborg)
Malware analysis as a hobby (Owasp Göteborg)Malware analysis as a hobby (Owasp Göteborg)
Malware analysis as a hobby (Owasp Göteborg)
 
Pengenalan dan Analisa Malware
Pengenalan dan Analisa MalwarePengenalan dan Analisa Malware
Pengenalan dan Analisa Malware
 
Building performance analysis system IES VE main features overview
Building performance analysis system IES VE main features overviewBuilding performance analysis system IES VE main features overview
Building performance analysis system IES VE main features overview
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
Deeplook into apt and how to detect and defend v1.0
Deeplook into apt and how to detect and defend v1.0Deeplook into apt and how to detect and defend v1.0
Deeplook into apt and how to detect and defend v1.0
 
Logs, Logs, Logs - What you need to know to catch a thief
Logs, Logs, Logs - What you need to know to catch a thiefLogs, Logs, Logs - What you need to know to catch a thief
Logs, Logs, Logs - What you need to know to catch a thief
 
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin FalckLuncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
 
Apa itu malware
Apa itu malwareApa itu malware
Apa itu malware
 
Proper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSProper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoS
 
Logging for Hackers v1.0
Logging for Hackers v1.0Logging for Hackers v1.0
Logging for Hackers v1.0
 
Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1
 
The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0
 
SOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation LabyrinthSOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation Labyrinth
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
 
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 

Similar to BSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology

Heuristics, bias and critical thinking in testing distribution
Heuristics, bias and critical thinking in testing   distributionHeuristics, bias and critical thinking in testing   distribution
Heuristics, bias and critical thinking in testing distributionMatt Mansell
 
Critical thinking
Critical thinkingCritical thinking
Critical thinkingMrini Gorla
 
Collective mind futurist perspective
Collective mind  futurist perspectiveCollective mind  futurist perspective
Collective mind futurist perspectiveAziz Alizadeh
 
CriticalThinking.pdf
CriticalThinking.pdfCriticalThinking.pdf
CriticalThinking.pdfArfanSubhani
 
Hpai class 25 - emotions in ai and self -051820
Hpai   class 25 - emotions in ai and self -051820Hpai   class 25 - emotions in ai and self -051820
Hpai class 25 - emotions in ai and self -051820Jose Melendez
 
Foundations Of Knowledge
Foundations Of KnowledgeFoundations Of Knowledge
Foundations Of Knowledgesusanwrege
 
An Introduction to Critical Thinking
An Introduction to Critical ThinkingAn Introduction to Critical Thinking
An Introduction to Critical ThinkingDamian T. Gordon
 
Intelligence.ppt
Intelligence.pptIntelligence.ppt
Intelligence.pptsyedmirsyed
 
Cultivating Intuition - Through Meticulous Self-tracking
Cultivating Intuition - Through Meticulous Self-trackingCultivating Intuition - Through Meticulous Self-tracking
Cultivating Intuition - Through Meticulous Self-trackingBen Ahrens
 
Cognition and Metacognition
Cognition and MetacognitionCognition and Metacognition
Cognition and MetacognitionUsman Amin
 
The neuropsychology of the mystery shopping
The neuropsychology of the mystery shoppingThe neuropsychology of the mystery shopping
The neuropsychology of the mystery shoppingDavid Camps
 
1.intelligence sfs.pptx
1.intelligence sfs.pptx1.intelligence sfs.pptx
1.intelligence sfs.pptxRitukumar47
 
PsychIntr-The foundation of psychological.pdf
PsychIntr-The foundation of psychological.pdfPsychIntr-The foundation of psychological.pdf
PsychIntr-The foundation of psychological.pdfhankchen0119
 
Intelligence
IntelligenceIntelligence
Intelligenceirenek
 
Look Around: Question Answering, Serendipity, and the Research Process of Sch...
Look Around: Question Answering, Serendipity, and the Research Process of Sch...Look Around: Question Answering, Serendipity, and the Research Process of Sch...
Look Around: Question Answering, Serendipity, and the Research Process of Sch...KimberleyMartin
 

Similar to BSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology (20)

Heuristics, bias and critical thinking in testing distribution
Heuristics, bias and critical thinking in testing   distributionHeuristics, bias and critical thinking in testing   distribution
Heuristics, bias and critical thinking in testing distribution
 
Critical thinking
Critical thinkingCritical thinking
Critical thinking
 
Intelligence
IntelligenceIntelligence
Intelligence
 
Collective mind futurist perspective
Collective mind  futurist perspectiveCollective mind  futurist perspective
Collective mind futurist perspective
 
CriticalThinking.pdf
CriticalThinking.pdfCriticalThinking.pdf
CriticalThinking.pdf
 
Hpai class 25 - emotions in ai and self -051820
Hpai   class 25 - emotions in ai and self -051820Hpai   class 25 - emotions in ai and self -051820
Hpai class 25 - emotions in ai and self -051820
 
Social cognition
Social cognitionSocial cognition
Social cognition
 
Foundations Of Knowledge
Foundations Of KnowledgeFoundations Of Knowledge
Foundations Of Knowledge
 
An Introduction to Critical Thinking
An Introduction to Critical ThinkingAn Introduction to Critical Thinking
An Introduction to Critical Thinking
 
Intelligence.ppt
Intelligence.pptIntelligence.ppt
Intelligence.ppt
 
Intelligence
IntelligenceIntelligence
Intelligence
 
Cultivating Intuition - Through Meticulous Self-tracking
Cultivating Intuition - Through Meticulous Self-trackingCultivating Intuition - Through Meticulous Self-tracking
Cultivating Intuition - Through Meticulous Self-tracking
 
Critical Thinking
Critical ThinkingCritical Thinking
Critical Thinking
 
Cognition and Metacognition
Cognition and MetacognitionCognition and Metacognition
Cognition and Metacognition
 
The neuropsychology of the mystery shopping
The neuropsychology of the mystery shoppingThe neuropsychology of the mystery shopping
The neuropsychology of the mystery shopping
 
1.intelligence sfs.pptx
1.intelligence sfs.pptx1.intelligence sfs.pptx
1.intelligence sfs.pptx
 
PsychIntr-The foundation of psychological.pdf
PsychIntr-The foundation of psychological.pdfPsychIntr-The foundation of psychological.pdf
PsychIntr-The foundation of psychological.pdf
 
my ED presentation
my ED presentationmy ED presentation
my ED presentation
 
Intelligence
IntelligenceIntelligence
Intelligence
 
Look Around: Question Answering, Serendipity, and the Research Process of Sch...
Look Around: Question Answering, Serendipity, and the Research Process of Sch...Look Around: Question Answering, Serendipity, and the Research Process of Sch...
Look Around: Question Answering, Serendipity, and the Research Process of Sch...
 

More from chrissanders88

2018 - Using Honeypots for Network Security Monitoring
2018 - Using Honeypots for Network Security Monitoring2018 - Using Honeypots for Network Security Monitoring
2018 - Using Honeypots for Network Security Monitoringchrissanders88
 
Hacking Food - BSides Augusta 2017
Hacking Food - BSides Augusta 2017Hacking Food - BSides Augusta 2017
Hacking Food - BSides Augusta 2017chrissanders88
 
Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017chrissanders88
 
Art into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive ApproachArt into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive Approachchrissanders88
 
Abstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Huntingchrissanders88
 
BSA2016 - Honeypots for Network Security Monitoring
BSA2016 - Honeypots for Network Security MonitoringBSA2016 - Honeypots for Network Security Monitoring
BSA2016 - Honeypots for Network Security Monitoringchrissanders88
 
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
CISSA Lightning Talk - Building a Malware Analysis Lab on a BudgetCISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budgetchrissanders88
 
Using Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security MonitoringUsing Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security Monitoringchrissanders88
 
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014chrissanders88
 
Applied Detection and Analysis with Flow Data - SO Con 2014
Applied Detection and Analysis with Flow Data - SO Con 2014Applied Detection and Analysis with Flow Data - SO Con 2014
Applied Detection and Analysis with Flow Data - SO Con 2014chrissanders88
 

More from chrissanders88 (10)

2018 - Using Honeypots for Network Security Monitoring
2018 - Using Honeypots for Network Security Monitoring2018 - Using Honeypots for Network Security Monitoring
2018 - Using Honeypots for Network Security Monitoring
 
Hacking Food - BSides Augusta 2017
Hacking Food - BSides Augusta 2017Hacking Food - BSides Augusta 2017
Hacking Food - BSides Augusta 2017
 
Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017
 
Art into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive ApproachArt into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive Approach
 
Abstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Hunting
 
BSA2016 - Honeypots for Network Security Monitoring
BSA2016 - Honeypots for Network Security MonitoringBSA2016 - Honeypots for Network Security Monitoring
BSA2016 - Honeypots for Network Security Monitoring
 
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
CISSA Lightning Talk - Building a Malware Analysis Lab on a BudgetCISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
 
Using Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security MonitoringUsing Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security Monitoring
 
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014
 
Applied Detection and Analysis with Flow Data - SO Con 2014
Applied Detection and Analysis with Flow Data - SO Con 2014Applied Detection and Analysis with Flow Data - SO Con 2014
Applied Detection and Analysis with Flow Data - SO Con 2014
 

Recently uploaded

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

BSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology

  • 1. Building a Better Analyst Using Cognitive Psychology Chris Sanders Bsides Augusta 2015
  • 2. Chris Sanders • Christian • Southerner • PhD Researcher • FireEye • GSE • BBQ Pit Master
  • 3. **Disclaimer** I’m going to talk about matters of the brain, not just the normal tech stuff. My research for this presentation involved consultation with psychologists. I, however, am not one….yet.
  • 4. Outline Objectives:  Metacognition  Perception  Intuition  Working Memory “How metacognitive awareness can help you make better technical decisions during security investigations.“
  • 5. Metacognition • Thinking about thinking • Research shows a relationship between metacognitive awareness and cognitive performance. • Two Components: – Knowledge of cognition (understand it) – Regulation of cognition (apply it)
  • 6. The Investigation • Investigations are an attempt to determine the ground truth of what really happened. – Is there a bad guy? – What did they do? • Investigations introduce cognitive challenges
  • 8. Perception vs. Reality • Perception: – “A way of regarding, understanding, or interpreting something.” • Reality: – “The state of things as they actually exist.”
  • 9. Our investigative path depends on mindset and biases
  • 10. Mindsets and Blur • Mindsets frame how we see the world • Quick to form and resistant to change • The initial picture we see forms our first mindset impression • Biases applied here carry forward
  • 11. Diminishing Initial Blur • Provide relevant information up front • Real-istic time alerting • Formalization of triage function – Put your expertise here – Gather info, make recommendations, pass on – Smaller orgs can use partner analysis
  • 12. Inattentional Blindness (IB) • Attention – Focusing on something – Overt or covert – Attention is a limited resource – Many things fight for analyst attention • It is very easy to miss things right in front of us
  • 13.
  • 14. Diminishing IB • Experienced analyst are usually less suceptible • Mastery of your environment – Mise en place • Controlling attention – Limit extraneous info – Direct focus – Gaze tracking
  • 16. It’s a Hard SOC Life • Investigative knowledge is tacit – Senior analysts can’t explain their success – Junior analysts can’t effectively learn • Knowledge transfer is limited – “Watch and learn” Analysts rely on intuition!
  • 17. Intuition • in·tu·i·tion (noun) – The ability to understand something immediately, without the need for conscious reasoning. • Previously not well understood, often dismissed “It is an illusion to expect anything from intuition.” – Sigmund Freud
  • 18. A Biological Basis for Intuition Precuneus 2.1x Larger Response TED Talk: The Rise of Augmented Intelligence: https://www.youtube.com/watch?v=mKZCa_ejbfg
  • 20. Using the Visuo-Spatial Sketchpad (VSP) • A primary component of working memory • Allows for visual manipulation of objects • Studies show that “intuition” is directly tied to use of VSSP (via the precuneus)
  • 21. Related VSSP Usage “If you look deep enough you will see music” – Thomas Carlyle
  • 22. Visually Investigating • Draw a picture! – It’s what your brain is doing anyway – Whiteboards everywhere • Visualize Data Appropriately – Don’t use viz for the sake of viz (geo maps ) – Incident timelines – Link graphs – Identify relationships (nouns/verbs)
  • 23. Thinking Visually - Breakfast
  • 25. WM Capacity Limitations • The capacity of WM is biologically limited • WM capacity is set from birth – Humans can remember 7 items, + or - 2. – Complexity of items matters Hard to Remember Easy to Remember 248.232.122.193 6.5.4.3 sub29203.domain3789.com sub.domain.com domain.com/me/?id=29381913 domain.com/path/url.htm a39e3d50ba4aeb134d95ae7aa4 d6c578 system32.dll
  • 26. Diminishing WM Capacity Limitations • Source Monitoring – Which IP was $suspicious_activity associated with? – Was this file downloaded by $dropper or $attacker? – Which case was $domain • Chunking – Grouping similar information – Mapping to an existing schema
  • 28. Conclusion • The biggest hurdle to overcome when investigating security incidents is our own cognitive limitations • Metacognition can diminish these limitations
  • 29. Thank You! E-Mail: chris@chrissanders.org Twitter: @chrissanders88 Blog: http://www.chrissanders.org Foundation: http://www.ruraltechfund.org

Editor's Notes

  1. What do all bad guys have in common? They want to take something from you.
  2. This slide could also be called further research.