PROACTIVE THREAT HUNTING:
GAME-CHANGING ENDPOINT
PROTECTION BEYOND ALERTING
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
CHRIS WITTER – SR. DIRECTOR, HUNTING OPERATIONS
CON MALLON – SR. DIRECTOR, PRODUCT MARKETING
FALCON PLATFORM
CLOUD DELIVERED
API
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
MANAGED
HUNTING
THREAT
INTEL
ENDPOINT DETECTION
AND RESPONSE
IT
HYGIENE
NEXT-GEN
ANTIVIRUS
ENDPOINT PROTECTION
A DEEPER DIVE INTO ‘HUNTING’
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
EDR MATURITY MODEL
LEVEL OF PROTECTION
NO EDR – reliant on
‘prevention’ – but what of
the 1% that slips through?
LIMITED EDR – ‘dumb
collection’ approach
where the burden is on
the user to sift & search
to find meaningful
detections with limited
response tools
SMART	EDR	– ‘native	
automation’	automatically	
and	prioritizes	alerts	and	can	
prevent	for	you	if	needed	-
still	struggling	to	find	
resources	to	implement	
hunting	on	the	data	set
MANAGED DETECTION
& RESPONSE – proactive
managed hunting,
investigation and
response activity on
emerging and advanced
threats - leveraging rich
data using advanced
analytics in the hands of
proven and experienced
team of threat hunters
WHY DO WE NEED HUNTING?
THE SECURITY
PROBLEM
THE PEOPLE
PROBLEM
THE DETECTION
PROBLEM
REACTIVE
POSTURE
PROACTIVE
POSTURE
Judging	the	intent	of	code Alert	fatigue	à False	negatives
New	IOC	/	TTP?
Detect	novel	threats?
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
WHICH IS LEADING TO THIS
“By 2020, 15% of midsize and enterprise
organizations will be using services like
MDR, up from less than 1% today.”
Gartner: Market Guide for Managed
Detection and Response Services –
May, 2016
WHAT IS HUNTING?
A few common use cases cause us to perform “proactive” investigation:
§ Retroactive discovery → New intel, pattern matching, intrusion artifacts
§ New artifact discovery → Analysis of telemetry to discover outliers
§ Detection method discovery → Pattern/IOA hypothesis testing
DEFINITION HYPOTHESIS
“Hunting is the discovery of malicious artifacts or detection methods not
accounted for in passive monitoring capabilities.”
WHERE DOES HUTING FIT INTO YOUR
DETECTION PROGRAM?
ANOMALY
BEHAVIORAL
ATOMIC
HUNTING
REGIMENT
New Artifact
Discovery
Detection Method
Discovery
Retroactive Discovery
Detect the tactic you know
Detect what you don’t know
Detect what you know
HOLISTIC DETECTION PROGRAM
FALCON OVERWATCH MANAGED HUNTING
FINDING THE ADVERSARY
So You Don’t Have To
BREACH PREVENTION
SERVICES
Team of Hunters
Working for You
24 x 7
BUSINESS VALUE
Alert prioritization
–pinpoint urgent
threats and avoid
false positives
Guided remediation –
work with your team to
add clarity, speed and
precision to support
response efforts
Threat Hunting –
proactive 24x7 hunting
eliminating false
negatives
FALCON OVERWATCH 2017 OBSERVATIONS
• Powershell
• Mixed TTPs
• Advanced <-> Everyday
• Twitter à Attack
THE OVERWATCH MODEL
OUR APPROACH TO PROACTIVE HUNTING
HUNTING
STRATEGIC SOC
Retroactive discovery
New artifact discovery
Detection method discovery
24x7 coverage
Continuous investigation
Intrusion triage & scoping
+
FALCON
OVERWATCH
Hunt
Investigate
Advise
…Stop the breach
PLATFORM STACK
OPERATORS
TRADECRAFT
TOOLS
CYBER ACTOR CrowdStrike FALCON
MANAGED
HUNTING
EDR
NEXT-GEN
AVTechnology
Processes
People
Falcon
OverWatch
Strategically Focused
Hunting
Security
Operations
Regimen
CrowdStrike
Threat
Intelligence
Cloud
Analytics /
ML
CrowdStrike
Services / IR
SOC
INCIDENT
RESPONSE
HUNTING
ADVANCED
ANALYTICS
CustomerCrowdStrike
FALCON OVERWATCH IN DETAIL
FALCON OVERWATCH DATA & PROCESS FLOW
CUSTOMER
ENDPOINTS
CONTINUOUS
ENDPOINT
DATA
1 FALCON UI
• Detection details
• EAM investigation
• Intelligence/Actors
2
OVERWATCH
ANALYTICS
PLATFORM
• Falcon data streams
• Hunting triggers
• Advanced analytics
• Business logic
3
• Strategic analysis
• Atomic + Behavioral + Anomaly detection
• Rapid intrusion triage and scoping
OVERWATCH
HUNTERS
4
• Notification of intrusions/breaches
• Expert operators <--> Support channel
5
CROWDSTRIKE CLOUD
Patented Threat Graph ™
OVERWATCH IN-PRODUCT ALERTING
INVESTIGATING THE OVERWATCH ALERTS
INVESTIGATING THE OVERWATCH ALERTS
OVERWATCH EXAMPLE -SENDING RICH NOTIFICATIONS
Summary Scenario
Human
Analysis
Actionable
Information
TO SUMMARIZE
• Proactive managed hunting is for organizations that want an
additional layer of protection to make sure that nothing gets
missed
• Falcon OverWatch is a managed threat hunting service built
on the Falcon Platform to ensure that nothing gets missed
and ultimately prevent the mega breach
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Questions?
Please submit all questions in the Q&A chat
right below the presentation slides
Contact Us
Additional Information
Join	Weekly	Demos
crowdstrike.com/productdemos
Featured	Asset:
Proactive	Hunting	Whitepaper
Link in Resource List
Website: crowdstrike.com
Email: info@crowdstrike.com
Number: 1.888.512.8902 (US)

Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting

  • 1.
    PROACTIVE THREAT HUNTING: GAME-CHANGINGENDPOINT PROTECTION BEYOND ALERTING 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. CHRIS WITTER – SR. DIRECTOR, HUNTING OPERATIONS CON MALLON – SR. DIRECTOR, PRODUCT MARKETING
  • 2.
    FALCON PLATFORM CLOUD DELIVERED API 2017CROWDSTRIKE, INC. ALL RIGHTS RESERVED. MANAGED HUNTING THREAT INTEL ENDPOINT DETECTION AND RESPONSE IT HYGIENE NEXT-GEN ANTIVIRUS ENDPOINT PROTECTION
  • 3.
    A DEEPER DIVEINTO ‘HUNTING’
  • 4.
    2017 CROWDSTRIKE, INC.ALL RIGHTS RESERVED. EDR MATURITY MODEL LEVEL OF PROTECTION NO EDR – reliant on ‘prevention’ – but what of the 1% that slips through? LIMITED EDR – ‘dumb collection’ approach where the burden is on the user to sift & search to find meaningful detections with limited response tools SMART EDR – ‘native automation’ automatically and prioritizes alerts and can prevent for you if needed - still struggling to find resources to implement hunting on the data set MANAGED DETECTION & RESPONSE – proactive managed hunting, investigation and response activity on emerging and advanced threats - leveraging rich data using advanced analytics in the hands of proven and experienced team of threat hunters
  • 5.
    WHY DO WENEED HUNTING? THE SECURITY PROBLEM THE PEOPLE PROBLEM THE DETECTION PROBLEM REACTIVE POSTURE PROACTIVE POSTURE Judging the intent of code Alert fatigue à False negatives New IOC / TTP? Detect novel threats? 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
  • 6.
    WHICH IS LEADINGTO THIS “By 2020, 15% of midsize and enterprise organizations will be using services like MDR, up from less than 1% today.” Gartner: Market Guide for Managed Detection and Response Services – May, 2016
  • 7.
    WHAT IS HUNTING? Afew common use cases cause us to perform “proactive” investigation: § Retroactive discovery → New intel, pattern matching, intrusion artifacts § New artifact discovery → Analysis of telemetry to discover outliers § Detection method discovery → Pattern/IOA hypothesis testing DEFINITION HYPOTHESIS “Hunting is the discovery of malicious artifacts or detection methods not accounted for in passive monitoring capabilities.”
  • 8.
    WHERE DOES HUTINGFIT INTO YOUR DETECTION PROGRAM? ANOMALY BEHAVIORAL ATOMIC HUNTING REGIMENT New Artifact Discovery Detection Method Discovery Retroactive Discovery Detect the tactic you know Detect what you don’t know Detect what you know HOLISTIC DETECTION PROGRAM
  • 9.
    FALCON OVERWATCH MANAGEDHUNTING FINDING THE ADVERSARY So You Don’t Have To BREACH PREVENTION SERVICES Team of Hunters Working for You 24 x 7 BUSINESS VALUE Alert prioritization –pinpoint urgent threats and avoid false positives Guided remediation – work with your team to add clarity, speed and precision to support response efforts Threat Hunting – proactive 24x7 hunting eliminating false negatives
  • 10.
    FALCON OVERWATCH 2017OBSERVATIONS • Powershell • Mixed TTPs • Advanced <-> Everyday • Twitter à Attack
  • 11.
  • 12.
    OUR APPROACH TOPROACTIVE HUNTING HUNTING STRATEGIC SOC Retroactive discovery New artifact discovery Detection method discovery 24x7 coverage Continuous investigation Intrusion triage & scoping + FALCON OVERWATCH Hunt Investigate Advise …Stop the breach
  • 13.
    PLATFORM STACK OPERATORS TRADECRAFT TOOLS CYBER ACTORCrowdStrike FALCON MANAGED HUNTING EDR NEXT-GEN AVTechnology Processes People
  • 14.
  • 15.
  • 16.
    FALCON OVERWATCH DATA& PROCESS FLOW CUSTOMER ENDPOINTS CONTINUOUS ENDPOINT DATA 1 FALCON UI • Detection details • EAM investigation • Intelligence/Actors 2 OVERWATCH ANALYTICS PLATFORM • Falcon data streams • Hunting triggers • Advanced analytics • Business logic 3 • Strategic analysis • Atomic + Behavioral + Anomaly detection • Rapid intrusion triage and scoping OVERWATCH HUNTERS 4 • Notification of intrusions/breaches • Expert operators <--> Support channel 5 CROWDSTRIKE CLOUD Patented Threat Graph ™
  • 17.
  • 18.
  • 19.
  • 20.
    OVERWATCH EXAMPLE -SENDINGRICH NOTIFICATIONS Summary Scenario Human Analysis Actionable Information
  • 21.
    TO SUMMARIZE • Proactivemanaged hunting is for organizations that want an additional layer of protection to make sure that nothing gets missed • Falcon OverWatch is a managed threat hunting service built on the Falcon Platform to ensure that nothing gets missed and ultimately prevent the mega breach
  • 22.
    2017 CROWDSTRIKE, INC.ALL RIGHTS RESERVED. Questions? Please submit all questions in the Q&A chat right below the presentation slides Contact Us Additional Information Join Weekly Demos crowdstrike.com/productdemos Featured Asset: Proactive Hunting Whitepaper Link in Resource List Website: crowdstrike.com Email: info@crowdstrike.com Number: 1.888.512.8902 (US)