SlideShare a Scribd company logo
Com pa ny Conf ide nt ial – For Int er na l Use O nly
Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d.
Incidents, Indicators, Insights
Risk Based Mitigation Through Security Analytics Platform
Keith Swanson, Regional Director, Fraud, Financial Crimes &
Security Intelligence
SAS Institute
Com pa ny Conf ide nt ial – For Int er na l Use O nly
Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d.
Risk Based Approach to Security
CyberKill Chain
Recon Weaponize Exploitation Installation
Command &
Control
Actions on
Objective
IoAs:
Detect & Analyze
IoCs:
Contain,Eradicate, Recover
Com pa ny Conf ide nt ial – For Int er na l Use O nly
Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d.
Difficulty
Actioning
IoAs
!
Proliferationof point
analytics solutions
impeding holistic risk-
based approach
Inability toproactively
leverage dataassets in
a meaningful way
Identificationof more events without full
context todrive action
Analytics focusedsolely
on detectionvs.
acceleratingresponse
Lack of technology
integrationforcing
reactive posture
Com pa ny Conf ide nt ial – For Int er na l Use O nly
Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d.
Productivity PlatformOperational Platform
E P P
E D R
F W
D L P
W e b / Em a i l
G a t e way s
I A M
The Underlying Cause
A VI D S
I P S
U B A
R i sk
M g t .
I n v e st i g at i o n
S I EM
T i c ke t i n gO r c h e st ra t i o n
Com pa ny Conf ide nt ial – For Int er na l Use O nly
Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d.
Everyone’s Talking
About Analytics
Source: Panemon InstituteSurvey, 2017
Com pa ny Conf ide nt ial – For Int er na l Use O nly
Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d.
Operational Platform
E P P
E D R
F W
D L P
W e b / Em a i l
G a t e way s
I A M
Change Is Needed!
A VI D S
I P S
Analytics Platform
U B A
Productivity Platform
R i sk
M g t .
I n v e st i g at i o n
S I EM
T i c ke t i n gO r c h e st ra t i o n
Com pa ny Conf ide nt ial – For Int er na l Use O nly
Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d.
Everyone’s Trying
Analytics
Com pa ny Conf ide nt ial – For Int er na l Use O nly
Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d.
Is Analytics the Answer?
Unifying platform & approach across security
analytics required
• End-to-endsuiteof analyticscapabilities
• Providesfoundationof capabilityfor deeper insightsfromdata
• Facilitatesthreathunting
• Governed & managedprocesses
• Clearly defined roles & standards
• Feedbackloop
Com pa ny Conf ide nt ial – For Int er na l Use O nly
Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d.
Operational Platform
E P P
E D R
F W
D L P
W e b / Em a i l
G a t e way s
I A M
Change Is Needed!
A VI D S
I P S
Analytics Platform
U B A
Productivity Platform
R i sk
M g t .
I n v e st i g at i o n
S I EM
T i c ke t i n gO r c h e st ra t i o n
Com pa ny Conf ide nt ial – For Int er na l Use O nly
Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d.
Enterprise Strategy Group: SOAPA
Com pa ny Conf ide nt ial – For Int er na l Use O nly
Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d.
Transitioning from Reactive to Proactive Security Management
Multi-Dimensional,Data-Driven Insights
• Data enriched prior to detection
• Behavior simultaneously monitored across
key dimensions (triangulation)
• Context derived to streamlineand optimize
response
• Analytics extended to driveautomation
Threat
App IAM
EndpointNetwork
Com pa ny Conf ide nt ial – For Int er na l Use O nly
Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d.
Operational Platform
E P P
E D R
F W
D L P
W e b / Em a i l
G a t e way s
I A M
Analytic Layer Foundation
A VI D S
I P S
Analytics Platform
U B A
Productivity Platform
R i sk
M g t .
I n v e st i g at i o n
S I EM
T i c ke t i n gO r c h e st ra t i o n
D a t a
D i sc o ve r
D e p l o y
Security Threat
Detection
Analytic Management
Automation&
Collaboration
Com pa ny Conf ide nt ial – For Int er na l Use O nly
Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d.
Analytic Layer Foundation
Analytics Platform
Security Threat
Detection
Analytic
Management
Automation &
Collaboration
Deployed data ingest models & detection
analytics, supported by Triage / Investigation
End-to-end analytic lifecycle management
Enterprise risk visualization & analytics deployed
for driving efficiency in operational functions
Data Management – Discovery – Deployment
Com pa ny Conf ide nt ial – For Int er na l Use O nly
Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d.
Operational Platform
E P P
E D R
F W
D L P
W e b / Em a i l
G a t e way s
I A M
Sample of Analytic Techniques
A VI D S
I P S
Analytics Platform
U B A
Productivity Platform
R i sk
M g t .
I n v e st i g at i o n
S I EM
T i c ke t i n gO r c h e st ra t i o n
Comparison Analytics
(Analytic Measures)
Temporal Analytics
(Entropy of Analytic Measures)
Implicit Models
(Signatures, Complex Rules)
Specialized Models
(Threat Typology)
Unsupervised Models
Supervised Models
D a t a
D i sc o ve r
D e p l o y

More Related Content

What's hot

The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
Accenture Australia
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
Melissa Gilpin
 
Collective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber AttacksCollective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber Attacks
Accenture Operations
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
Accenture Operations
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
 
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking StudyAgricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
accenture
 
Accenture Regulatory Compliance Platform
Accenture Regulatory Compliance PlatformAccenture Regulatory Compliance Platform
Accenture Regulatory Compliance Platform
accenture
 
Accenture's 2017 Technology Vision for Insurance
Accenture's 2017 Technology Vision for InsuranceAccenture's 2017 Technology Vision for Insurance
Accenture's 2017 Technology Vision for Insurance
Accenture Insurance
 
A new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growthA new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growth
accenture
 
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
accenture
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunity
accenture
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
accenture
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
Accenture Operations
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
Accenture Technology
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
 
Intelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons LearnedIntelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons Learned
Accenture Technology
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
accenture
 
Accenture High Performance Security Report 2016 For Communications
Accenture High Performance  Security Report 2016 For CommunicationsAccenture High Performance  Security Report 2016 For Communications
Accenture High Performance Security Report 2016 For Communications
accenture
 
Aujas_Gartner_Dubai_v1_Nov15
Aujas_Gartner_Dubai_v1_Nov15Aujas_Gartner_Dubai_v1_Nov15
Aujas_Gartner_Dubai_v1_Nov15Sameer Shelke
 
Day-3, Mr. Satyajit Dwivedi analytics for decision making
Day-3, Mr. Satyajit Dwivedi analytics for decision makingDay-3, Mr. Satyajit Dwivedi analytics for decision making
Day-3, Mr. Satyajit Dwivedi analytics for decision making
IPPAI
 

What's hot (20)

The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Collective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber AttacksCollective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber Attacks
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking StudyAgricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
 
Accenture Regulatory Compliance Platform
Accenture Regulatory Compliance PlatformAccenture Regulatory Compliance Platform
Accenture Regulatory Compliance Platform
 
Accenture's 2017 Technology Vision for Insurance
Accenture's 2017 Technology Vision for InsuranceAccenture's 2017 Technology Vision for Insurance
Accenture's 2017 Technology Vision for Insurance
 
A new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growthA new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growth
 
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunity
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Intelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons LearnedIntelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons Learned
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
 
Accenture High Performance Security Report 2016 For Communications
Accenture High Performance  Security Report 2016 For CommunicationsAccenture High Performance  Security Report 2016 For Communications
Accenture High Performance Security Report 2016 For Communications
 
Aujas_Gartner_Dubai_v1_Nov15
Aujas_Gartner_Dubai_v1_Nov15Aujas_Gartner_Dubai_v1_Nov15
Aujas_Gartner_Dubai_v1_Nov15
 
Day-3, Mr. Satyajit Dwivedi analytics for decision making
Day-3, Mr. Satyajit Dwivedi analytics for decision makingDay-3, Mr. Satyajit Dwivedi analytics for decision making
Day-3, Mr. Satyajit Dwivedi analytics for decision making
 

Similar to Incidents, Indicators, Insights – the emergence of the Security Analytics Platform - IBA - SAS Event presented by Keith Swanson

The SAS® Platform
The SAS® PlatformThe SAS® Platform
The SAS® Platform
SAS Italy
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk
 
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
Splunk
 
Security and Automation: Can they work together? Can we survive if they don't?
Security and Automation: Can they work together?  Can we survive if they don't?Security and Automation: Can they work together?  Can we survive if they don't?
Security and Automation: Can they work together? Can we survive if they don't?
Trish McGinity, CCSK
 
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - WebinarUsing Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Splunk
 
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
Splunk
 
Ensuring Maximum Quality in the Era of IoT and Wearables
Ensuring Maximum Quality in the Era of IoT and WearablesEnsuring Maximum Quality in the Era of IoT and Wearables
Ensuring Maximum Quality in the Era of IoT and Wearables
Josiah Renaudin
 
SAS Data Management for Analytics: potenzia le tue analisi e sostieni l’innov...
SAS Data Management for Analytics: potenzia le tue analisi e sostieni l’innov...SAS Data Management for Analytics: potenzia le tue analisi e sostieni l’innov...
SAS Data Management for Analytics: potenzia le tue analisi e sostieni l’innov...
SAS Italy
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
SAP Ariba
 
SplunkLive! Paris 2018: Splunk And AI 101
SplunkLive! Paris 2018: Splunk And AI 101SplunkLive! Paris 2018: Splunk And AI 101
SplunkLive! Paris 2018: Splunk And AI 101
Splunk
 
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Splunk
 
HPE AIOps Expo
HPE AIOps Expo HPE AIOps Expo
HPE AIOps Expo
Katherine Fritsch
 
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with SplunkSplunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk
 
Asset Performance Management in Oil and Gas Industry
Asset Performance Management in Oil and Gas Industry Asset Performance Management in Oil and Gas Industry
Asset Performance Management in Oil and Gas Industry
Arrelic
 
AWS Summit Singapore 2019 | Building Business Outcomes with Machine Learning ...
AWS Summit Singapore 2019 | Building Business Outcomes with Machine Learning ...AWS Summit Singapore 2019 | Building Business Outcomes with Machine Learning ...
AWS Summit Singapore 2019 | Building Business Outcomes with Machine Learning ...
Amazon Web Services
 
SplunkLive! Zurich 2018: Get More From Your Machine Data with Splunk & AI
SplunkLive! Zurich 2018: Get More From Your Machine Data with Splunk & AISplunkLive! Zurich 2018: Get More From Your Machine Data with Splunk & AI
SplunkLive! Zurich 2018: Get More From Your Machine Data with Splunk & AI
Splunk
 
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AISplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
Splunk
 
Hedge Fund case study solution - Credit default swaps execution system and Gr...
Hedge Fund case study solution - Credit default swaps execution system and Gr...Hedge Fund case study solution - Credit default swaps execution system and Gr...
Hedge Fund case study solution - Credit default swaps execution system and Gr...
Naveen Kumar
 

Similar to Incidents, Indicators, Insights – the emergence of the Security Analytics Platform - IBA - SAS Event presented by Keith Swanson (20)

The SAS® Platform
The SAS® PlatformThe SAS® Platform
The SAS® Platform
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
 
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
 
Security and Automation: Can they work together? Can we survive if they don't?
Security and Automation: Can they work together?  Can we survive if they don't?Security and Automation: Can they work together?  Can we survive if they don't?
Security and Automation: Can they work together? Can we survive if they don't?
 
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - WebinarUsing Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
 
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
 
Ensuring Maximum Quality in the Era of IoT and Wearables
Ensuring Maximum Quality in the Era of IoT and WearablesEnsuring Maximum Quality in the Era of IoT and Wearables
Ensuring Maximum Quality in the Era of IoT and Wearables
 
SAS Data Management for Analytics: potenzia le tue analisi e sostieni l’innov...
SAS Data Management for Analytics: potenzia le tue analisi e sostieni l’innov...SAS Data Management for Analytics: potenzia le tue analisi e sostieni l’innov...
SAS Data Management for Analytics: potenzia le tue analisi e sostieni l’innov...
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
SplunkLive! Paris 2018: Splunk And AI 101
SplunkLive! Paris 2018: Splunk And AI 101SplunkLive! Paris 2018: Splunk And AI 101
SplunkLive! Paris 2018: Splunk And AI 101
 
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
 
HPE AIOps Expo
HPE AIOps Expo HPE AIOps Expo
HPE AIOps Expo
 
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with SplunkSplunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
 
Asset Performance Management in Oil and Gas Industry
Asset Performance Management in Oil and Gas Industry Asset Performance Management in Oil and Gas Industry
Asset Performance Management in Oil and Gas Industry
 
AWS Summit Singapore 2019 | Building Business Outcomes with Machine Learning ...
AWS Summit Singapore 2019 | Building Business Outcomes with Machine Learning ...AWS Summit Singapore 2019 | Building Business Outcomes with Machine Learning ...
AWS Summit Singapore 2019 | Building Business Outcomes with Machine Learning ...
 
SplunkLive! Zurich 2018: Get More From Your Machine Data with Splunk & AI
SplunkLive! Zurich 2018: Get More From Your Machine Data with Splunk & AISplunkLive! Zurich 2018: Get More From Your Machine Data with Splunk & AI
SplunkLive! Zurich 2018: Get More From Your Machine Data with Splunk & AI
 
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AISplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
 
Hedge Fund case study solution - Credit default swaps execution system and Gr...
Hedge Fund case study solution - Credit default swaps execution system and Gr...Hedge Fund case study solution - Credit default swaps execution system and Gr...
Hedge Fund case study solution - Credit default swaps execution system and Gr...
 

More from SAS Institute India Pvt. Ltd

Artificial Intelligence The SAS Perspective
Artificial Intelligence The SAS PerspectiveArtificial Intelligence The SAS Perspective
Artificial Intelligence The SAS Perspective
SAS Institute India Pvt. Ltd
 
Asset Liability Management
Asset Liability ManagementAsset Liability Management
Asset Liability Management
SAS Institute India Pvt. Ltd
 
Big Digital Marketing
Big Digital MarketingBig Digital Marketing
Big Digital Marketing
SAS Institute India Pvt. Ltd
 
Learnings from customer analytics and campaign management implementations
Learnings from customer analytics and campaign management implementationsLearnings from customer analytics and campaign management implementations
Learnings from customer analytics and campaign management implementations
SAS Institute India Pvt. Ltd
 
Unlocking the Strategic Value of your Data
Unlocking the Strategic Value of your Data Unlocking the Strategic Value of your Data
Unlocking the Strategic Value of your Data
SAS Institute India Pvt. Ltd
 
Impact of emerging technologies in Business
Impact of emerging technologies in BusinessImpact of emerging technologies in Business
Impact of emerging technologies in Business
SAS Institute India Pvt. Ltd
 
The Road to an Analytical Enterprise
The Road to an Analytical EnterpriseThe Road to an Analytical Enterprise
The Road to an Analytical Enterprise
SAS Institute India Pvt. Ltd
 
High Performance Analytics - The Future of Analytics is Here
High Performance Analytics - The Future of Analytics is HereHigh Performance Analytics - The Future of Analytics is Here
High Performance Analytics - The Future of Analytics is Here
SAS Institute India Pvt. Ltd
 
Maximising The Value of Analytics in Tax Compliance
Maximising The Value of Analytics in Tax ComplianceMaximising The Value of Analytics in Tax Compliance
Maximising The Value of Analytics in Tax Compliance
SAS Institute India Pvt. Ltd
 
Data Management as a Strategic Initiative for Government
Data Management as a Strategic Initiative for GovernmentData Management as a Strategic Initiative for Government
Data Management as a Strategic Initiative for Government
SAS Institute India Pvt. Ltd
 
SAS Visual Analytics Overview
SAS Visual Analytics OverviewSAS Visual Analytics Overview
SAS Visual Analytics Overview
SAS Institute India Pvt. Ltd
 
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Institute India Pvt. Ltd
 
TATA Teleservices - SAS Forum India: Enhancing Marketing Performance to drive...
TATA Teleservices - SAS Forum India: Enhancing Marketing Performance to drive...TATA Teleservices - SAS Forum India: Enhancing Marketing Performance to drive...
TATA Teleservices - SAS Forum India: Enhancing Marketing Performance to drive...
SAS Institute India Pvt. Ltd
 
Axis Bank - SAS Forum India: Automation of Compliance Management – Implementa...
Axis Bank - SAS Forum India: Automation of Compliance Management – Implementa...Axis Bank - SAS Forum India: Automation of Compliance Management – Implementa...
Axis Bank - SAS Forum India: Automation of Compliance Management – Implementa...
SAS Institute India Pvt. Ltd
 
Cordex India - SAS Forum India: Loss Data Consortium
Cordex India - SAS Forum India: Loss Data ConsortiumCordex India - SAS Forum India: Loss Data Consortium
Cordex India - SAS Forum India: Loss Data Consortium
SAS Institute India Pvt. Ltd
 
SAS Forum India: Building for Success: The Foundation for Achievable Master D...
SAS Forum India: Building for Success: The Foundation for Achievable Master D...SAS Forum India: Building for Success: The Foundation for Achievable Master D...
SAS Forum India: Building for Success: The Foundation for Achievable Master D...
SAS Institute India Pvt. Ltd
 
SAS Forum India - SAS Visual Analytics - 'Visualize This!'
SAS Forum India - SAS Visual Analytics - 'Visualize This!'SAS Forum India - SAS Visual Analytics - 'Visualize This!'
SAS Forum India - SAS Visual Analytics - 'Visualize This!'
SAS Institute India Pvt. Ltd
 
SAS Forum India: Evolution & the Changing dynamics of Customer Value Management.
SAS Forum India: Evolution & the Changing dynamics of Customer Value Management.SAS Forum India: Evolution & the Changing dynamics of Customer Value Management.
SAS Forum India: Evolution & the Changing dynamics of Customer Value Management.
SAS Institute India Pvt. Ltd
 

More from SAS Institute India Pvt. Ltd (20)

Artificial Intelligence The SAS Perspective
Artificial Intelligence The SAS PerspectiveArtificial Intelligence The SAS Perspective
Artificial Intelligence The SAS Perspective
 
Business Analytics: A Strategic Imperative
Business Analytics: A Strategic ImperativeBusiness Analytics: A Strategic Imperative
Business Analytics: A Strategic Imperative
 
Asset Liability Management
Asset Liability ManagementAsset Liability Management
Asset Liability Management
 
Big Digital Marketing
Big Digital MarketingBig Digital Marketing
Big Digital Marketing
 
Learnings from customer analytics and campaign management implementations
Learnings from customer analytics and campaign management implementationsLearnings from customer analytics and campaign management implementations
Learnings from customer analytics and campaign management implementations
 
High performance organisation
High performance organisationHigh performance organisation
High performance organisation
 
Unlocking the Strategic Value of your Data
Unlocking the Strategic Value of your Data Unlocking the Strategic Value of your Data
Unlocking the Strategic Value of your Data
 
Impact of emerging technologies in Business
Impact of emerging technologies in BusinessImpact of emerging technologies in Business
Impact of emerging technologies in Business
 
The Road to an Analytical Enterprise
The Road to an Analytical EnterpriseThe Road to an Analytical Enterprise
The Road to an Analytical Enterprise
 
High Performance Analytics - The Future of Analytics is Here
High Performance Analytics - The Future of Analytics is HereHigh Performance Analytics - The Future of Analytics is Here
High Performance Analytics - The Future of Analytics is Here
 
Maximising The Value of Analytics in Tax Compliance
Maximising The Value of Analytics in Tax ComplianceMaximising The Value of Analytics in Tax Compliance
Maximising The Value of Analytics in Tax Compliance
 
Data Management as a Strategic Initiative for Government
Data Management as a Strategic Initiative for GovernmentData Management as a Strategic Initiative for Government
Data Management as a Strategic Initiative for Government
 
SAS Visual Analytics Overview
SAS Visual Analytics OverviewSAS Visual Analytics Overview
SAS Visual Analytics Overview
 
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
 
TATA Teleservices - SAS Forum India: Enhancing Marketing Performance to drive...
TATA Teleservices - SAS Forum India: Enhancing Marketing Performance to drive...TATA Teleservices - SAS Forum India: Enhancing Marketing Performance to drive...
TATA Teleservices - SAS Forum India: Enhancing Marketing Performance to drive...
 
Axis Bank - SAS Forum India: Automation of Compliance Management – Implementa...
Axis Bank - SAS Forum India: Automation of Compliance Management – Implementa...Axis Bank - SAS Forum India: Automation of Compliance Management – Implementa...
Axis Bank - SAS Forum India: Automation of Compliance Management – Implementa...
 
Cordex India - SAS Forum India: Loss Data Consortium
Cordex India - SAS Forum India: Loss Data ConsortiumCordex India - SAS Forum India: Loss Data Consortium
Cordex India - SAS Forum India: Loss Data Consortium
 
SAS Forum India: Building for Success: The Foundation for Achievable Master D...
SAS Forum India: Building for Success: The Foundation for Achievable Master D...SAS Forum India: Building for Success: The Foundation for Achievable Master D...
SAS Forum India: Building for Success: The Foundation for Achievable Master D...
 
SAS Forum India - SAS Visual Analytics - 'Visualize This!'
SAS Forum India - SAS Visual Analytics - 'Visualize This!'SAS Forum India - SAS Visual Analytics - 'Visualize This!'
SAS Forum India - SAS Visual Analytics - 'Visualize This!'
 
SAS Forum India: Evolution & the Changing dynamics of Customer Value Management.
SAS Forum India: Evolution & the Changing dynamics of Customer Value Management.SAS Forum India: Evolution & the Changing dynamics of Customer Value Management.
SAS Forum India: Evolution & the Changing dynamics of Customer Value Management.
 

Recently uploaded

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

Incidents, Indicators, Insights – the emergence of the Security Analytics Platform - IBA - SAS Event presented by Keith Swanson

  • 1. Com pa ny Conf ide nt ial – For Int er na l Use O nly Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d. Incidents, Indicators, Insights Risk Based Mitigation Through Security Analytics Platform Keith Swanson, Regional Director, Fraud, Financial Crimes & Security Intelligence SAS Institute
  • 2. Com pa ny Conf ide nt ial – For Int er na l Use O nly Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d. Risk Based Approach to Security CyberKill Chain Recon Weaponize Exploitation Installation Command & Control Actions on Objective IoAs: Detect & Analyze IoCs: Contain,Eradicate, Recover
  • 3. Com pa ny Conf ide nt ial – For Int er na l Use O nly Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d. Difficulty Actioning IoAs ! Proliferationof point analytics solutions impeding holistic risk- based approach Inability toproactively leverage dataassets in a meaningful way Identificationof more events without full context todrive action Analytics focusedsolely on detectionvs. acceleratingresponse Lack of technology integrationforcing reactive posture
  • 4. Com pa ny Conf ide nt ial – For Int er na l Use O nly Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d. Productivity PlatformOperational Platform E P P E D R F W D L P W e b / Em a i l G a t e way s I A M The Underlying Cause A VI D S I P S U B A R i sk M g t . I n v e st i g at i o n S I EM T i c ke t i n gO r c h e st ra t i o n
  • 5. Com pa ny Conf ide nt ial – For Int er na l Use O nly Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d. Everyone’s Talking About Analytics Source: Panemon InstituteSurvey, 2017
  • 6. Com pa ny Conf ide nt ial – For Int er na l Use O nly Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d. Operational Platform E P P E D R F W D L P W e b / Em a i l G a t e way s I A M Change Is Needed! A VI D S I P S Analytics Platform U B A Productivity Platform R i sk M g t . I n v e st i g at i o n S I EM T i c ke t i n gO r c h e st ra t i o n
  • 7. Com pa ny Conf ide nt ial – For Int er na l Use O nly Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d. Everyone’s Trying Analytics
  • 8. Com pa ny Conf ide nt ial – For Int er na l Use O nly Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d. Is Analytics the Answer? Unifying platform & approach across security analytics required • End-to-endsuiteof analyticscapabilities • Providesfoundationof capabilityfor deeper insightsfromdata • Facilitatesthreathunting • Governed & managedprocesses • Clearly defined roles & standards • Feedbackloop
  • 9. Com pa ny Conf ide nt ial – For Int er na l Use O nly Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d. Operational Platform E P P E D R F W D L P W e b / Em a i l G a t e way s I A M Change Is Needed! A VI D S I P S Analytics Platform U B A Productivity Platform R i sk M g t . I n v e st i g at i o n S I EM T i c ke t i n gO r c h e st ra t i o n
  • 10. Com pa ny Conf ide nt ial – For Int er na l Use O nly Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d. Enterprise Strategy Group: SOAPA
  • 11. Com pa ny Conf ide nt ial – For Int er na l Use O nly Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d. Transitioning from Reactive to Proactive Security Management Multi-Dimensional,Data-Driven Insights • Data enriched prior to detection • Behavior simultaneously monitored across key dimensions (triangulation) • Context derived to streamlineand optimize response • Analytics extended to driveautomation Threat App IAM EndpointNetwork
  • 12. Com pa ny Conf ide nt ial – For Int er na l Use O nly Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d. Operational Platform E P P E D R F W D L P W e b / Em a i l G a t e way s I A M Analytic Layer Foundation A VI D S I P S Analytics Platform U B A Productivity Platform R i sk M g t . I n v e st i g at i o n S I EM T i c ke t i n gO r c h e st ra t i o n D a t a D i sc o ve r D e p l o y Security Threat Detection Analytic Management Automation& Collaboration
  • 13. Com pa ny Conf ide nt ial – For Int er na l Use O nly Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d. Analytic Layer Foundation Analytics Platform Security Threat Detection Analytic Management Automation & Collaboration Deployed data ingest models & detection analytics, supported by Triage / Investigation End-to-end analytic lifecycle management Enterprise risk visualization & analytics deployed for driving efficiency in operational functions Data Management – Discovery – Deployment
  • 14. Com pa ny Conf ide nt ial – For Int er na l Use O nly Copy r ig ht © S AS Inst itut e Inc. All r ig hts r e se r ve d. Operational Platform E P P E D R F W D L P W e b / Em a i l G a t e way s I A M Sample of Analytic Techniques A VI D S I P S Analytics Platform U B A Productivity Platform R i sk M g t . I n v e st i g at i o n S I EM T i c ke t i n gO r c h e st ra t i o n Comparison Analytics (Analytic Measures) Temporal Analytics (Entropy of Analytic Measures) Implicit Models (Signatures, Complex Rules) Specialized Models (Threat Typology) Unsupervised Models Supervised Models D a t a D i sc o ve r D e p l o y