SlideShare a Scribd company logo
1 of 12
APM: Graph-based threat modelling
and hunting
Ashkan Rahimian – Cyber AI Sr. Manager, Cyber Emerging Technologies
Egor Burnashev – Security Expert, Data Scientist, and Developer
March 2022
Š Deloitte LLP and affiliated entities.
Outline:
1. Cyber AI APM – Data Layer
2. Exploratory Threat Hunting, Attack path
modelling, and Cluster analysis
3. Data Source Mapping
4. Enhancements
5. Dashboard
APM: Graph-based threat modelling and hunting
Cyber AI APM is an AI-enabled solution for predictive, pre-emptive
& proactive threat identification and cyber risk management
3
Cyber AI APM (Attack Path Modelling) is an AI-led graph-based solution that
provides unified visualization of enterprise attack surface and ongoing
cyber risk assessment on organization’s critical assets/crown jewels.
Cyber AI APM uses advanced machine learning algorithms to predict potential
exposures and generates intelligent, prioritized recommendations to
mitigate these cyber risks. It can also augment existing vulnerability
management and breach assessment/simulation platforms. Cyber AI APM is a
critical capability in your cybersecurity toolkit to move from security of today to
tomorrow—allowing you to protect the organization from cyber threats before
they occur.
Superior IT/OT Visibility
Correlation of multiple IT/OT
data sources with threat
intelligence to provide unified
view of the enterprise IT/OT
cyber risk
Predict Vulnerable
Entry Points, Compute
Attack Paths, and
Calculate Risk Scores
Enhanced Risk Assessment
by aggregating safety and
operational risk into risk score
models
Optimized Remediation
Strategy
Actionable intelligence by
providing the most impactful
recommendations
Integration with ticketing and
orchestration platforms for
threat prevention
Differentiated offering addressing a market gap https://www2.deloitte.com/ca/en/pages/deloitte-analytics/articles/ai-factory-the-cyfi-suite.html
4
4
APM Graph-based threat modelling, security analytics,
and threat hunting
Ingest your asset network and vulnerability data
Visualize your network of assets
Quantify cyber risk to assets, including crown
jewels (critical systems)
Identify vulnerable entry points to the network
How APM Works
Predict attack paths and scenarios that could be
used to compromise your environment
Define and prioritize actionable mitigation through
risk scoring and scenario analysis
Generate and track prioritized actions for
remediation with ability to integrate with most
ticketing and SOAR systems
Challenges:
• Tracking and monitoring exposure vectors across hybrid networks and multi-cloud
environments
• Identification of the path of least resistance using proactive threat hunting
• Prioritization of risk remediation activities for critical systems
• Correlation and visualization of vulnerability data with observed security events
Sample Nodes: Machine/Computer/Asset, User, Router/Switch/Firewall, Vulnerability, Detection, Network, etc.
Sample Relationships: CAN_CONNECT, CAN_ATTACK, ROUTES_TO, IS_VULNERABLE_TO, THREAT_DETECTED, LOGS_IN_TO, etc.
5
5
Threat intel and
attack patterns
Risk mitigation
activities
ACL Rule and
config models
Vulnerability data
EDR detection
categories
NDR detection
categories
Exploratory analysis of threat data and
security control configurations
APM Simulation scenarios
6
6
APM Threat hunting scenarios – Attack Path Modelling
Demo Scenario 1:
Attack path modelling
enhancement -
Vulnerability chain and
attack path analysis
• Based on vulnerability
and network data
• Network/Asset
reachability analysis
• Vulnerability exploitation
path analysis
• Validate Condition
requirements based on
ports and vulnerability
• Attack path progression
7
7
APM Threat hunting scenarios – Cluster Analysis
Demo Scenario 2:
Cluster analysis of
infected systems based
on EDR data
• Investigate a few
systems per cluster to
determine the final
case outcome
• Accelerate the triage
process
• Detect abnormal
patterns
• End point detection
data contextualization
• Shared patterns of
detection across
multiple assets
8
8
APM Threat hunting scenarios – Exploratory Analysis
Demo Scenario 3:
Exploratory threat
hunting based on
network and EDR data
• Analysis of infected
hosts across multiple
networks
• Similar end point
detections
• Identify the extent of
impacted networks
• Batch analysis during
triage
9
9
Use Cases
Data Sources
Reachability
Analysis
Recommender
Engine
Simulation
&
What-if
Analysis
Path
of
Least
Resistance
Risk
Scoring
Access
Path
Analysis
Vulnerability
Chain
Analysis
Control
Effectiveness
1 Vulnerability data
2 Network topology / config
3 Security control rules / policies
4 Asset repo information
5 Access (user/system privileges) information
6 SIEM/UEBA detection results (correlated events)
7 End point data (host)
Data Sources Required
10
10
Enhancements and Integrations
Insights generated from attack path modelling can be fed into UEBA/SIEM systems for further analysis. It can also be
used for SOAR automation.
1. APM as a data source for UEBA (Using Attack Path as a contextual source)
The attack paths discovered in APM are to be used as a risk booster for SIEM/UEBA detections. In other words, if a
threat model triggers against a hostname, and that host happens to be part of a high-risk attack path, the overall
risk score will increase and the alert will be prioritized.
2. UEBA as a data source for APM (Visualizing UEBA patterns on the attack graph)
Within security analytics threat models, there may be multiple flags for baselining and anomaly detection. When
such flags trigger, it could indicate abnormal patterns of user access or system behavior. As such, SIEM/UEBA can
highlight which hosts/users are currently flagged as abnormal and APM visualizes the abnormality patterns in the
context of zones/subnets to show potential emerging patterns of infection on the attack graph.
11
11
Solution Dashboard
www.deloitte.ca
Deloitte provides audit & assurance, consulting, financial advisory, risk advisory, tax and related services to public and private clients spanning multiple industries. Deloitte
serves four out of five Fortune Global 500ÂŽ companies through a globally connected network of member firms in more than 150 countries and territories bringing world-class
capabilities, insights and service to address clients’ most complex business challenges. To learn more about how Deloitte’s approximately 264,000 professionals—9,400 of
whom are based in Canada—make an impact that matters, please connect with us on LinkedIn, Twitter or Facebook.
Deloitte LLP, an Ontario limited liability partnership, is the Canadian member firm of Deloitte Touche Tohmatsu Limited. Deloitte refers to one or more of Deloitte Touche
Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see
www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms.
Š Deloitte LLP and affiliated entities.

More Related Content

More from Neo4j

BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafosBBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafosNeo4j
 
Graph Everywhere - Josep Taruella - Por quĂŠ Graph Data Science en tus modelos...
Graph Everywhere - Josep Taruella - Por quĂŠ Graph Data Science en tus modelos...Graph Everywhere - Josep Taruella - Por quĂŠ Graph Data Science en tus modelos...
Graph Everywhere - Josep Taruella - Por quĂŠ Graph Data Science en tus modelos...Neo4j
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jNeo4j
 
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdfNeo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdfNeo4j
 
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdfRabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdfNeo4j
 
Webinar - IA generativa e grafi Neo4j: RAG time!
Webinar - IA generativa e grafi Neo4j: RAG time!Webinar - IA generativa e grafi Neo4j: RAG time!
Webinar - IA generativa e grafi Neo4j: RAG time!Neo4j
 
IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeNeo4j
 
Neo4j: Data Engineering for RAG (retrieval augmented generation)
Neo4j: Data Engineering for RAG (retrieval augmented generation)Neo4j: Data Engineering for RAG (retrieval augmented generation)
Neo4j: Data Engineering for RAG (retrieval augmented generation)Neo4j
 
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdfNeo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdfNeo4j
 
Enabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge GraphsEnabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge GraphsNeo4j
 
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdfNeo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdfNeo4j
 
Neo4j Jesus Barrasa The Art of the Possible with Graph
Neo4j Jesus Barrasa The Art of the Possible with GraphNeo4j Jesus Barrasa The Art of the Possible with Graph
Neo4j Jesus Barrasa The Art of the Possible with GraphNeo4j
 
SWIFT: Maintaining Critical Standards in the Financial Services Industry with...
SWIFT: Maintaining Critical Standards in the Financial Services Industry with...SWIFT: Maintaining Critical Standards in the Financial Services Industry with...
SWIFT: Maintaining Critical Standards in the Financial Services Industry with...Neo4j
 
Deloitte & Red Cross: Talk to your data with Knowledge-enriched Generative AI
Deloitte & Red Cross: Talk to your data with Knowledge-enriched Generative AIDeloitte & Red Cross: Talk to your data with Knowledge-enriched Generative AI
Deloitte & Red Cross: Talk to your data with Knowledge-enriched Generative AINeo4j
 
Ingka Digital: Linked Metadata by Design
Ingka Digital: Linked Metadata by DesignIngka Digital: Linked Metadata by Design
Ingka Digital: Linked Metadata by DesignNeo4j
 
Discover Neo4j Aura_ The Future of Graph Database-as-a-Service Workshop_3.13.24
Discover Neo4j Aura_ The Future of Graph Database-as-a-Service Workshop_3.13.24Discover Neo4j Aura_ The Future of Graph Database-as-a-Service Workshop_3.13.24
Discover Neo4j Aura_ The Future of Graph Database-as-a-Service Workshop_3.13.24Neo4j
 
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptxGraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptxNeo4j
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxNeo4j
 
Identification of insulin-resistance genes with Knowledge Graphs topology and...
Identification of insulin-resistance genes with Knowledge Graphs topology and...Identification of insulin-resistance genes with Knowledge Graphs topology and...
Identification of insulin-resistance genes with Knowledge Graphs topology and...Neo4j
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNeo4j
 

More from Neo4j (20)

BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafosBBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
 
Graph Everywhere - Josep Taruella - Por quĂŠ Graph Data Science en tus modelos...
Graph Everywhere - Josep Taruella - Por quĂŠ Graph Data Science en tus modelos...Graph Everywhere - Josep Taruella - Por quĂŠ Graph Data Science en tus modelos...
Graph Everywhere - Josep Taruella - Por quĂŠ Graph Data Science en tus modelos...
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdfNeo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
 
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdfRabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
 
Webinar - IA generativa e grafi Neo4j: RAG time!
Webinar - IA generativa e grafi Neo4j: RAG time!Webinar - IA generativa e grafi Neo4j: RAG time!
Webinar - IA generativa e grafi Neo4j: RAG time!
 
IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG time
 
Neo4j: Data Engineering for RAG (retrieval augmented generation)
Neo4j: Data Engineering for RAG (retrieval augmented generation)Neo4j: Data Engineering for RAG (retrieval augmented generation)
Neo4j: Data Engineering for RAG (retrieval augmented generation)
 
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdfNeo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
 
Enabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge GraphsEnabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge Graphs
 
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdfNeo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
 
Neo4j Jesus Barrasa The Art of the Possible with Graph
Neo4j Jesus Barrasa The Art of the Possible with GraphNeo4j Jesus Barrasa The Art of the Possible with Graph
Neo4j Jesus Barrasa The Art of the Possible with Graph
 
SWIFT: Maintaining Critical Standards in the Financial Services Industry with...
SWIFT: Maintaining Critical Standards in the Financial Services Industry with...SWIFT: Maintaining Critical Standards in the Financial Services Industry with...
SWIFT: Maintaining Critical Standards in the Financial Services Industry with...
 
Deloitte & Red Cross: Talk to your data with Knowledge-enriched Generative AI
Deloitte & Red Cross: Talk to your data with Knowledge-enriched Generative AIDeloitte & Red Cross: Talk to your data with Knowledge-enriched Generative AI
Deloitte & Red Cross: Talk to your data with Knowledge-enriched Generative AI
 
Ingka Digital: Linked Metadata by Design
Ingka Digital: Linked Metadata by DesignIngka Digital: Linked Metadata by Design
Ingka Digital: Linked Metadata by Design
 
Discover Neo4j Aura_ The Future of Graph Database-as-a-Service Workshop_3.13.24
Discover Neo4j Aura_ The Future of Graph Database-as-a-Service Workshop_3.13.24Discover Neo4j Aura_ The Future of Graph Database-as-a-Service Workshop_3.13.24
Discover Neo4j Aura_ The Future of Graph Database-as-a-Service Workshop_3.13.24
 
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptxGraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
 
Identification of insulin-resistance genes with Knowledge Graphs topology and...
Identification of insulin-resistance genes with Knowledge Graphs topology and...Identification of insulin-resistance genes with Knowledge Graphs topology and...
Identification of insulin-resistance genes with Knowledge Graphs topology and...
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4j
 

Recently uploaded

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Graph-based Threat Modeling, Security Analytics, and Threat Hunting

  • 1. APM: Graph-based threat modelling and hunting Ashkan Rahimian – Cyber AI Sr. Manager, Cyber Emerging Technologies Egor Burnashev – Security Expert, Data Scientist, and Developer March 2022
  • 2. Š Deloitte LLP and affiliated entities. Outline: 1. Cyber AI APM – Data Layer 2. Exploratory Threat Hunting, Attack path modelling, and Cluster analysis 3. Data Source Mapping 4. Enhancements 5. Dashboard APM: Graph-based threat modelling and hunting
  • 3. Cyber AI APM is an AI-enabled solution for predictive, pre-emptive & proactive threat identification and cyber risk management 3 Cyber AI APM (Attack Path Modelling) is an AI-led graph-based solution that provides unified visualization of enterprise attack surface and ongoing cyber risk assessment on organization’s critical assets/crown jewels. Cyber AI APM uses advanced machine learning algorithms to predict potential exposures and generates intelligent, prioritized recommendations to mitigate these cyber risks. It can also augment existing vulnerability management and breach assessment/simulation platforms. Cyber AI APM is a critical capability in your cybersecurity toolkit to move from security of today to tomorrow—allowing you to protect the organization from cyber threats before they occur. Superior IT/OT Visibility Correlation of multiple IT/OT data sources with threat intelligence to provide unified view of the enterprise IT/OT cyber risk Predict Vulnerable Entry Points, Compute Attack Paths, and Calculate Risk Scores Enhanced Risk Assessment by aggregating safety and operational risk into risk score models Optimized Remediation Strategy Actionable intelligence by providing the most impactful recommendations Integration with ticketing and orchestration platforms for threat prevention Differentiated offering addressing a market gap https://www2.deloitte.com/ca/en/pages/deloitte-analytics/articles/ai-factory-the-cyfi-suite.html
  • 4. 4 4 APM Graph-based threat modelling, security analytics, and threat hunting Ingest your asset network and vulnerability data Visualize your network of assets Quantify cyber risk to assets, including crown jewels (critical systems) Identify vulnerable entry points to the network How APM Works Predict attack paths and scenarios that could be used to compromise your environment Define and prioritize actionable mitigation through risk scoring and scenario analysis Generate and track prioritized actions for remediation with ability to integrate with most ticketing and SOAR systems Challenges: • Tracking and monitoring exposure vectors across hybrid networks and multi-cloud environments • Identification of the path of least resistance using proactive threat hunting • Prioritization of risk remediation activities for critical systems • Correlation and visualization of vulnerability data with observed security events Sample Nodes: Machine/Computer/Asset, User, Router/Switch/Firewall, Vulnerability, Detection, Network, etc. Sample Relationships: CAN_CONNECT, CAN_ATTACK, ROUTES_TO, IS_VULNERABLE_TO, THREAT_DETECTED, LOGS_IN_TO, etc.
  • 5. 5 5 Threat intel and attack patterns Risk mitigation activities ACL Rule and config models Vulnerability data EDR detection categories NDR detection categories Exploratory analysis of threat data and security control configurations APM Simulation scenarios
  • 6. 6 6 APM Threat hunting scenarios – Attack Path Modelling Demo Scenario 1: Attack path modelling enhancement - Vulnerability chain and attack path analysis • Based on vulnerability and network data • Network/Asset reachability analysis • Vulnerability exploitation path analysis • Validate Condition requirements based on ports and vulnerability • Attack path progression
  • 7. 7 7 APM Threat hunting scenarios – Cluster Analysis Demo Scenario 2: Cluster analysis of infected systems based on EDR data • Investigate a few systems per cluster to determine the final case outcome • Accelerate the triage process • Detect abnormal patterns • End point detection data contextualization • Shared patterns of detection across multiple assets
  • 8. 8 8 APM Threat hunting scenarios – Exploratory Analysis Demo Scenario 3: Exploratory threat hunting based on network and EDR data • Analysis of infected hosts across multiple networks • Similar end point detections • Identify the extent of impacted networks • Batch analysis during triage
  • 9. 9 9 Use Cases Data Sources Reachability Analysis Recommender Engine Simulation & What-if Analysis Path of Least Resistance Risk Scoring Access Path Analysis Vulnerability Chain Analysis Control Effectiveness 1 Vulnerability data 2 Network topology / config 3 Security control rules / policies 4 Asset repo information 5 Access (user/system privileges) information 6 SIEM/UEBA detection results (correlated events) 7 End point data (host) Data Sources Required
  • 10. 10 10 Enhancements and Integrations Insights generated from attack path modelling can be fed into UEBA/SIEM systems for further analysis. It can also be used for SOAR automation. 1. APM as a data source for UEBA (Using Attack Path as a contextual source) The attack paths discovered in APM are to be used as a risk booster for SIEM/UEBA detections. In other words, if a threat model triggers against a hostname, and that host happens to be part of a high-risk attack path, the overall risk score will increase and the alert will be prioritized. 2. UEBA as a data source for APM (Visualizing UEBA patterns on the attack graph) Within security analytics threat models, there may be multiple flags for baselining and anomaly detection. When such flags trigger, it could indicate abnormal patterns of user access or system behavior. As such, SIEM/UEBA can highlight which hosts/users are currently flagged as abnormal and APM visualizes the abnormality patterns in the context of zones/subnets to show potential emerging patterns of infection on the attack graph.
  • 12. www.deloitte.ca Deloitte provides audit & assurance, consulting, financial advisory, risk advisory, tax and related services to public and private clients spanning multiple industries. Deloitte serves four out of five Fortune Global 500ÂŽ companies through a globally connected network of member firms in more than 150 countries and territories bringing world-class capabilities, insights and service to address clients’ most complex business challenges. To learn more about how Deloitte’s approximately 264,000 professionals—9,400 of whom are based in Canada—make an impact that matters, please connect with us on LinkedIn, Twitter or Facebook. Deloitte LLP, an Ontario limited liability partnership, is the Canadian member firm of Deloitte Touche Tohmatsu Limited. Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Š Deloitte LLP and affiliated entities.