SlideShare a Scribd company logo
Haiyan Song
SVP Security Markets, Splunk
Transforming Security
Haiyan Song
SVP Security Markets, Splunk
SECURI TY
TR ANSFORM ATI ON
SPLUNK
SECURI TY
DELI VERI NG
SECURI TY
END TO END
SECURI TY
TR ANSFORM ATI ON
Data completeness & coverage
Multiple, dynamic relationships
New Approach to Security Needed
Traditional New
Data reduction
Event correlation
7
IT risk Business risk
Event based … and time, user, phase, more…
Needle in a haystack
Power user
Detect attacks
Hay in haystack
All users
Detect & respond to attack lifecycle
On Premise or MSSP Hybrid deployment & management
Transforming Security
Situational Awareness
Transforming Security
Situational Awareness Analysis and Rapid Response
Transforming Security
Monitoring Center
Transforming Security
Monitoring Center Command Center
Share
Block
Context
Detect
Transforming Security
Human Authoring
Transforming Security
Human Authoring Human – Machine Learning
SPLUNK
SECURI TY
Analytics-Driven Security
RISK-BASED CONTEXT AND
INTELLIGENCE
CONNECTING
DATA AND PEOPLE
Splunk Security Use Cases
Fraud
Detection
Insider
Threat
Advanced
Threat
Detection
Security and
Compliance
Reporting
Incident
Investigations
and Forensics
Real-Time
Monitoring of
Known Threats
SPLUNK SECURITY FRAMEWORK
Machine Learning, Threat Models, Risk Scoring, Threat Intel, Notable event, etc.
Splunk Security Vision
SECURITY MARKET
SIEM
(Security Information
Event Management)
SECURITY
ANALYTICS
MANAGED SERVICE AND
INTELLIGENCE SERVICE
FRAUD
Enhance threat detection and
SOC efficiency
User Entity Behavioral Analytics Analytics content
for subscription
Behavior Analytics foundation
Platform for Machine Data
Splunk is the Security Nerve Center
WAF & App
Security
Orchestration
Network
Threat
Intelligence
Internal Network
Security
Identity and Access
Firewall
Web Proxy
Endpoints
Splunk is the Security Nerve Center
WAF & App
Security
Orchestration
Network
Threat
Intelligence
Internal Network
Security
Identity and Access
Firewall
Web Proxy
Endpoints
Splunk is the Security Nerve Center
WAF & App
Security
Orchestration
Network
Threat
Intelligence
Internal Network
Security
Identity and Access
Endpoints
Firewall
Web Proxy
Center for Security
Command & Control
rules
Correlation
statistical
Analysis/
Anomaly detection
Automation
Behavior analysis
Enabling
Capability
Role / Function
Center for
Security Situational
Awareness
Orchestrated,
Analytics-
Driven
Security
Evolution of the SOC
alerting
forensics
log / event
aggregation
machine
learning
monitoring
station
operations
clearinghouse
proactive, adaptive
nerve center
DELI VERI NG
SECURI TY
END TO END
Solution Architecture
SOLUTIONS
Analytics,Awareness&Action
Adaptive Response
Actions
(THIRD PARTY)
DATA
SOURCES
PLATFORM
Monitoring
Net Flow
Relational
Databases
IdentityNetwork Endpoint Firewall
Threat
Intelligence
Hadoop
Platform for Operational Intelligence
Real-Time
Monitoring
Advanced Threat
Detection
Anti-FraudInsider Threats
Security and
Compliance
Reporting
Incident
Investigations
and Forensics
USE CASES
Cloud Strategy is Critical
to Security Transformation
Visibility is key to Security
24
25
Achieving Hybrid Visibility
Index Untapped Data: Any Source, Type, Volume
Online
Services
Web
Services
Servers
Security GPS
Location
Storage
Desktops
Networks
Messaging
Telecoms
Online
Shopping
Cart
Web
Clickstreams
Databases
Energy
Meters
RFID
On-
Premises
Private
Cloud
End-to-End Context
Including Cloud Workloads
Application Delivery
Security, Compliance,
and Fraud
IT Operations
Business Analytics
Industrial Data and
the Internet of Things
Public
Cloud
Config
Lambda
EC2
Containers
CloudTrail
Automation and
Service Standardization
Managed Security Services
• “Second set of eyes”
• Help keep up with threats, APTs, breaches
• Bifurcate responsibilities
• Continuous monitoring (follow the sun)
• Better alignment of internal skillsets / resources
• Leverage more data without additional cost
• Optimize resources / offload regulatory review
workload during audit
Delivering Security end to End
Herjavec Group + AWS + Splunk
Thank you

More Related Content

What's hot

Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
EC-Council
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
Centrify Corporation
 
Darktrace Proof of Value
Darktrace Proof of ValueDarktrace Proof of Value
Darktrace Proof of Value
Darktrace
 
Disección de amenazas en entornos de nube
Disección de amenazas en entornos de nubeDisección de amenazas en entornos de nube
Disección de amenazas en entornos de nube
Cristian Garcia G.
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
ETech 7
 
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Sirius
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
Kaspersky
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
Zscaler
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
Advanced Technology Consulting (ATC)
 
Critical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist AttacksCritical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist Attacks
BGA Cyber Security
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
Susanne Tedrick
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
Sylvain Martinez
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
CMR WORLD TECH
 
PROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYPROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITY
Sylvain Martinez
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
AlgoSec
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Cristian Garcia G.
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
Ben Rothke
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
Shah Sheikh
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Shah Sheikh
 

What's hot (20)

Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
 
Darktrace Proof of Value
Darktrace Proof of ValueDarktrace Proof of Value
Darktrace Proof of Value
 
Disección de amenazas en entornos de nube
Disección de amenazas en entornos de nubeDisección de amenazas en entornos de nube
Disección de amenazas en entornos de nube
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Critical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist AttacksCritical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist Attacks
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
PROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYPROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITY
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
 

Similar to LIFT OFF 2017: Transforming Security

SplunkLive! Milano 2016 - customer presentation - Saipem
SplunkLive! Milano 2016 -  customer presentation - SaipemSplunkLive! Milano 2016 -  customer presentation - Saipem
SplunkLive! Milano 2016 - customer presentation - Saipem
Splunk
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
Blue Coat
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin
 
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for SecuritySplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
Splunk
 
Splunk for Security
Splunk for SecuritySplunk for Security
Splunk for Security
Gabrielle Knowles
 
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for SecuritySplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
Splunk
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Rahul Neel Mani
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_security
Greg Hanchin
 
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick Overview
Femi Ashaye
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
Splunk
 
Splunk for Enterprise Security featuring UBA
Splunk for Enterprise Security featuring UBA Splunk for Enterprise Security featuring UBA
Splunk for Enterprise Security featuring UBA
Splunk
 
Splunk Enterprise Security
Splunk Enterprise Security Splunk Enterprise Security
Splunk Enterprise Security
Md Mofijul Haque
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk
 
Security operation center.pdf
Security operation center.pdfSecurity operation center.pdf
Security operation center.pdf
Skillmine Technology Consulting
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
Infosec cert service
Infosec cert serviceInfosec cert service
Infosec cert service
Minh Le
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk
 
Reducing cyber risks in the era of digital transformation
Reducing cyber risks in the era of digital transformationReducing cyber risks in the era of digital transformation
Reducing cyber risks in the era of digital transformation
Sergey Soldatov
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
Amazon Web Services
 

Similar to LIFT OFF 2017: Transforming Security (20)

SplunkLive! Milano 2016 - customer presentation - Saipem
SplunkLive! Milano 2016 -  customer presentation - SaipemSplunkLive! Milano 2016 -  customer presentation - Saipem
SplunkLive! Milano 2016 - customer presentation - Saipem
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
 
Anton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability IntelligenceAnton Chuvakin on Threat and Vulnerability Intelligence
Anton Chuvakin on Threat and Vulnerability Intelligence
 
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for SecuritySplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
 
Splunk for Security
Splunk for SecuritySplunk for Security
Splunk for Security
 
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for SecuritySplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_security
 
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick Overview
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
Splunk for Enterprise Security featuring UBA
Splunk for Enterprise Security featuring UBA Splunk for Enterprise Security featuring UBA
Splunk for Enterprise Security featuring UBA
 
Splunk Enterprise Security
Splunk Enterprise Security Splunk Enterprise Security
Splunk Enterprise Security
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
 
Security operation center.pdf
Security operation center.pdfSecurity operation center.pdf
Security operation center.pdf
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
Infosec cert service
Infosec cert serviceInfosec cert service
Infosec cert service
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
 
Reducing cyber risks in the era of digital transformation
Reducing cyber risks in the era of digital transformationReducing cyber risks in the era of digital transformation
Reducing cyber risks in the era of digital transformation
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
 

Recently uploaded

Italy vs Albania Soul and sacrifice' are the keys to success for Albania at E...
Italy vs Albania Soul and sacrifice' are the keys to success for Albania at E...Italy vs Albania Soul and sacrifice' are the keys to success for Albania at E...
Italy vs Albania Soul and sacrifice' are the keys to success for Albania at E...
Eticketing.co
 
Euro Cup Group E Preview, Team Strategies, Key Players, and Tactical Insights...
Euro Cup Group E Preview, Team Strategies, Key Players, and Tactical Insights...Euro Cup Group E Preview, Team Strategies, Key Players, and Tactical Insights...
Euro Cup Group E Preview, Team Strategies, Key Players, and Tactical Insights...
Eticketing.co
 
JORNADA 11 LIGA MURO 2024BASQUETBOL1.pdf
JORNADA 11 LIGA MURO 2024BASQUETBOL1.pdfJORNADA 11 LIGA MURO 2024BASQUETBOL1.pdf
JORNADA 11 LIGA MURO 2024BASQUETBOL1.pdf
Arturo Pacheco Alvarez
 
Tennis rules and techniques with information
Tennis rules and techniques with informationTennis rules and techniques with information
Tennis rules and techniques with information
mohsintariq167876
 
Turkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docx
Turkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docxTurkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docx
Turkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docx
Eticketing.co
 
Match By Match Detailed Schedule Of The ICC Men's T20 World Cup 2024.pdf
Match By Match Detailed Schedule Of The ICC Men's T20 World Cup 2024.pdfMatch By Match Detailed Schedule Of The ICC Men's T20 World Cup 2024.pdf
Match By Match Detailed Schedule Of The ICC Men's T20 World Cup 2024.pdf
mouthhunt5
 
Belgium vs Romania Ultimate Guide to Euro Cup 2024 Tactics, Ticketing, and Qu...
Belgium vs Romania Ultimate Guide to Euro Cup 2024 Tactics, Ticketing, and Qu...Belgium vs Romania Ultimate Guide to Euro Cup 2024 Tactics, Ticketing, and Qu...
Belgium vs Romania Ultimate Guide to Euro Cup 2024 Tactics, Ticketing, and Qu...
Eticketing.co
 
Paris 2024 History-making Matildas team selected for Olympic Games.pdf
Paris 2024 History-making Matildas team selected for Olympic Games.pdfParis 2024 History-making Matildas team selected for Olympic Games.pdf
Paris 2024 History-making Matildas team selected for Olympic Games.pdf
Eticketing.co
 
Belgium vs Romania Injuries and Patience in Belgium’s Euro Cup Germany Squad....
Belgium vs Romania Injuries and Patience in Belgium’s Euro Cup Germany Squad....Belgium vs Romania Injuries and Patience in Belgium’s Euro Cup Germany Squad....
Belgium vs Romania Injuries and Patience in Belgium’s Euro Cup Germany Squad....
Eticketing.co
 
MESH IPL 2024 REport_Wavemaker India.pdf
MESH IPL 2024 REport_Wavemaker India.pdfMESH IPL 2024 REport_Wavemaker India.pdf
MESH IPL 2024 REport_Wavemaker India.pdf
Social Samosa
 
JORNADA 10 LIGA MURO 2024BASQUETBOL1.pdf
JORNADA 10 LIGA MURO 2024BASQUETBOL1.pdfJORNADA 10 LIGA MURO 2024BASQUETBOL1.pdf
JORNADA 10 LIGA MURO 2024BASQUETBOL1.pdf
Arturo Pacheco Alvarez
 
Psaroudakis: Family and Football – The Psaroudakis Success Story
Psaroudakis: Family and Football – The Psaroudakis Success StoryPsaroudakis: Family and Football – The Psaroudakis Success Story
Psaroudakis: Family and Football – The Psaroudakis Success Story
Psaroudakis
 
真实可查(uofo毕业证书)俄勒冈大学毕业证学位证书范本原版一模一样
真实可查(uofo毕业证书)俄勒冈大学毕业证学位证书范本原版一模一样真实可查(uofo毕业证书)俄勒冈大学毕业证学位证书范本原版一模一样
真实可查(uofo毕业证书)俄勒冈大学毕业证学位证书范本原版一模一样
ra9gairo
 
Georgia vs Portugal Georgia UEFA Euro 2024 Squad Khvicha Kvaratskhelia Leads ...
Georgia vs Portugal Georgia UEFA Euro 2024 Squad Khvicha Kvaratskhelia Leads ...Georgia vs Portugal Georgia UEFA Euro 2024 Squad Khvicha Kvaratskhelia Leads ...
Georgia vs Portugal Georgia UEFA Euro 2024 Squad Khvicha Kvaratskhelia Leads ...
Eticketing.co
 
Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...
Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...
Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...
Eticketing.co
 
Croatia vs Italy Modric's Last Dance Croatia's UEFA Euro 2024 Journey and Ita...
Croatia vs Italy Modric's Last Dance Croatia's UEFA Euro 2024 Journey and Ita...Croatia vs Italy Modric's Last Dance Croatia's UEFA Euro 2024 Journey and Ita...
Croatia vs Italy Modric's Last Dance Croatia's UEFA Euro 2024 Journey and Ita...
Eticketing.co
 
Hesan Soufi's Legacy: Inspiring the Next Generation
Hesan Soufi's Legacy: Inspiring the Next GenerationHesan Soufi's Legacy: Inspiring the Next Generation
Hesan Soufi's Legacy: Inspiring the Next Generation
Hesan Soufi 
 
Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...
Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...
Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...
Eticketing.co
 
Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...
Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...
Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...
Eticketing.co
 
Spain vs Croatia Euro 2024 Spain's Chance to Shine on the International Stage...
Spain vs Croatia Euro 2024 Spain's Chance to Shine on the International Stage...Spain vs Croatia Euro 2024 Spain's Chance to Shine on the International Stage...
Spain vs Croatia Euro 2024 Spain's Chance to Shine on the International Stage...
Eticketing.co
 

Recently uploaded (20)

Italy vs Albania Soul and sacrifice' are the keys to success for Albania at E...
Italy vs Albania Soul and sacrifice' are the keys to success for Albania at E...Italy vs Albania Soul and sacrifice' are the keys to success for Albania at E...
Italy vs Albania Soul and sacrifice' are the keys to success for Albania at E...
 
Euro Cup Group E Preview, Team Strategies, Key Players, and Tactical Insights...
Euro Cup Group E Preview, Team Strategies, Key Players, and Tactical Insights...Euro Cup Group E Preview, Team Strategies, Key Players, and Tactical Insights...
Euro Cup Group E Preview, Team Strategies, Key Players, and Tactical Insights...
 
JORNADA 11 LIGA MURO 2024BASQUETBOL1.pdf
JORNADA 11 LIGA MURO 2024BASQUETBOL1.pdfJORNADA 11 LIGA MURO 2024BASQUETBOL1.pdf
JORNADA 11 LIGA MURO 2024BASQUETBOL1.pdf
 
Tennis rules and techniques with information
Tennis rules and techniques with informationTennis rules and techniques with information
Tennis rules and techniques with information
 
Turkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docx
Turkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docxTurkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docx
Turkey UEFA Euro 2024 Journey A Quest for Redemption and Success.docx
 
Match By Match Detailed Schedule Of The ICC Men's T20 World Cup 2024.pdf
Match By Match Detailed Schedule Of The ICC Men's T20 World Cup 2024.pdfMatch By Match Detailed Schedule Of The ICC Men's T20 World Cup 2024.pdf
Match By Match Detailed Schedule Of The ICC Men's T20 World Cup 2024.pdf
 
Belgium vs Romania Ultimate Guide to Euro Cup 2024 Tactics, Ticketing, and Qu...
Belgium vs Romania Ultimate Guide to Euro Cup 2024 Tactics, Ticketing, and Qu...Belgium vs Romania Ultimate Guide to Euro Cup 2024 Tactics, Ticketing, and Qu...
Belgium vs Romania Ultimate Guide to Euro Cup 2024 Tactics, Ticketing, and Qu...
 
Paris 2024 History-making Matildas team selected for Olympic Games.pdf
Paris 2024 History-making Matildas team selected for Olympic Games.pdfParis 2024 History-making Matildas team selected for Olympic Games.pdf
Paris 2024 History-making Matildas team selected for Olympic Games.pdf
 
Belgium vs Romania Injuries and Patience in Belgium’s Euro Cup Germany Squad....
Belgium vs Romania Injuries and Patience in Belgium’s Euro Cup Germany Squad....Belgium vs Romania Injuries and Patience in Belgium’s Euro Cup Germany Squad....
Belgium vs Romania Injuries and Patience in Belgium’s Euro Cup Germany Squad....
 
MESH IPL 2024 REport_Wavemaker India.pdf
MESH IPL 2024 REport_Wavemaker India.pdfMESH IPL 2024 REport_Wavemaker India.pdf
MESH IPL 2024 REport_Wavemaker India.pdf
 
JORNADA 10 LIGA MURO 2024BASQUETBOL1.pdf
JORNADA 10 LIGA MURO 2024BASQUETBOL1.pdfJORNADA 10 LIGA MURO 2024BASQUETBOL1.pdf
JORNADA 10 LIGA MURO 2024BASQUETBOL1.pdf
 
Psaroudakis: Family and Football – The Psaroudakis Success Story
Psaroudakis: Family and Football – The Psaroudakis Success StoryPsaroudakis: Family and Football – The Psaroudakis Success Story
Psaroudakis: Family and Football – The Psaroudakis Success Story
 
真实可查(uofo毕业证书)俄勒冈大学毕业证学位证书范本原版一模一样
真实可查(uofo毕业证书)俄勒冈大学毕业证学位证书范本原版一模一样真实可查(uofo毕业证书)俄勒冈大学毕业证学位证书范本原版一模一样
真实可查(uofo毕业证书)俄勒冈大学毕业证学位证书范本原版一模一样
 
Georgia vs Portugal Georgia UEFA Euro 2024 Squad Khvicha Kvaratskhelia Leads ...
Georgia vs Portugal Georgia UEFA Euro 2024 Squad Khvicha Kvaratskhelia Leads ...Georgia vs Portugal Georgia UEFA Euro 2024 Squad Khvicha Kvaratskhelia Leads ...
Georgia vs Portugal Georgia UEFA Euro 2024 Squad Khvicha Kvaratskhelia Leads ...
 
Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...
Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...
Olympic 2024 Key Players and Teams to Watch in Men's and Women's Football at ...
 
Croatia vs Italy Modric's Last Dance Croatia's UEFA Euro 2024 Journey and Ita...
Croatia vs Italy Modric's Last Dance Croatia's UEFA Euro 2024 Journey and Ita...Croatia vs Italy Modric's Last Dance Croatia's UEFA Euro 2024 Journey and Ita...
Croatia vs Italy Modric's Last Dance Croatia's UEFA Euro 2024 Journey and Ita...
 
Hesan Soufi's Legacy: Inspiring the Next Generation
Hesan Soufi's Legacy: Inspiring the Next GenerationHesan Soufi's Legacy: Inspiring the Next Generation
Hesan Soufi's Legacy: Inspiring the Next Generation
 
Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...
Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...
Belgium vs Slovakia Belgium Euro 2024 Golden Generation Faces Euro Cup Final ...
 
Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...
Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...
Turkey vs Georgia Tickets: Turkey's Provisional Squad for UEFA Euro 2024, Key...
 
Spain vs Croatia Euro 2024 Spain's Chance to Shine on the International Stage...
Spain vs Croatia Euro 2024 Spain's Chance to Shine on the International Stage...Spain vs Croatia Euro 2024 Spain's Chance to Shine on the International Stage...
Spain vs Croatia Euro 2024 Spain's Chance to Shine on the International Stage...
 

LIFT OFF 2017: Transforming Security

  • 1. Haiyan Song SVP Security Markets, Splunk
  • 2. Transforming Security Haiyan Song SVP Security Markets, Splunk
  • 3. SECURI TY TR ANSFORM ATI ON SPLUNK SECURI TY DELI VERI NG SECURI TY END TO END
  • 4.
  • 5.
  • 7. Data completeness & coverage Multiple, dynamic relationships New Approach to Security Needed Traditional New Data reduction Event correlation 7 IT risk Business risk Event based … and time, user, phase, more… Needle in a haystack Power user Detect attacks Hay in haystack All users Detect & respond to attack lifecycle On Premise or MSSP Hybrid deployment & management
  • 9. Transforming Security Situational Awareness Analysis and Rapid Response
  • 11. Transforming Security Monitoring Center Command Center Share Block Context Detect
  • 13. Transforming Security Human Authoring Human – Machine Learning
  • 15. Analytics-Driven Security RISK-BASED CONTEXT AND INTELLIGENCE CONNECTING DATA AND PEOPLE
  • 16. Splunk Security Use Cases Fraud Detection Insider Threat Advanced Threat Detection Security and Compliance Reporting Incident Investigations and Forensics Real-Time Monitoring of Known Threats
  • 17. SPLUNK SECURITY FRAMEWORK Machine Learning, Threat Models, Risk Scoring, Threat Intel, Notable event, etc. Splunk Security Vision SECURITY MARKET SIEM (Security Information Event Management) SECURITY ANALYTICS MANAGED SERVICE AND INTELLIGENCE SERVICE FRAUD Enhance threat detection and SOC efficiency User Entity Behavioral Analytics Analytics content for subscription Behavior Analytics foundation Platform for Machine Data
  • 18. Splunk is the Security Nerve Center WAF & App Security Orchestration Network Threat Intelligence Internal Network Security Identity and Access Firewall Web Proxy Endpoints
  • 19. Splunk is the Security Nerve Center WAF & App Security Orchestration Network Threat Intelligence Internal Network Security Identity and Access Firewall Web Proxy Endpoints
  • 20. Splunk is the Security Nerve Center WAF & App Security Orchestration Network Threat Intelligence Internal Network Security Identity and Access Endpoints Firewall Web Proxy
  • 21. Center for Security Command & Control rules Correlation statistical Analysis/ Anomaly detection Automation Behavior analysis Enabling Capability Role / Function Center for Security Situational Awareness Orchestrated, Analytics- Driven Security Evolution of the SOC alerting forensics log / event aggregation machine learning monitoring station operations clearinghouse proactive, adaptive nerve center
  • 22. DELI VERI NG SECURI TY END TO END
  • 23. Solution Architecture SOLUTIONS Analytics,Awareness&Action Adaptive Response Actions (THIRD PARTY) DATA SOURCES PLATFORM Monitoring Net Flow Relational Databases IdentityNetwork Endpoint Firewall Threat Intelligence Hadoop Platform for Operational Intelligence Real-Time Monitoring Advanced Threat Detection Anti-FraudInsider Threats Security and Compliance Reporting Incident Investigations and Forensics USE CASES
  • 24. Cloud Strategy is Critical to Security Transformation Visibility is key to Security 24
  • 25. 25 Achieving Hybrid Visibility Index Untapped Data: Any Source, Type, Volume Online Services Web Services Servers Security GPS Location Storage Desktops Networks Messaging Telecoms Online Shopping Cart Web Clickstreams Databases Energy Meters RFID On- Premises Private Cloud End-to-End Context Including Cloud Workloads Application Delivery Security, Compliance, and Fraud IT Operations Business Analytics Industrial Data and the Internet of Things Public Cloud Config Lambda EC2 Containers CloudTrail Automation and Service Standardization
  • 26. Managed Security Services • “Second set of eyes” • Help keep up with threats, APTs, breaches • Bifurcate responsibilities • Continuous monitoring (follow the sun) • Better alignment of internal skillsets / resources • Leverage more data without additional cost • Optimize resources / offload regulatory review workload during audit
  • 27. Delivering Security end to End Herjavec Group + AWS + Splunk