SlideShare a Scribd company logo
1 of 47
Download to read offline
©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Put  Analytics  And  Automation  At  The  
Core  Of  Security
Joseph  Blankenship,  Senior  Analyst
October  18,  2017
We  work  with  business  and  
technology  leaders  to  develop  
customer-­obsessed  strategies  
that  drive  growth.
3©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
4©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Analyst  Bio
Joseph  (aka  JB)  supports  Security  &  Risk  
professionals,  helping  clients  develop  
security  strategies  and  make  informed  
decisions  to  protect  against  risk.  He  covers  
security  infrastructure  and  operations,  
including  security  information  management  
(SIM),  security  analytics,  security  automation  
and  orchestration  (SAO),  distributed  denial  of  
service  (DDoS),  and  network  security.  His  
research  focuses  on  security  monitoring,  
threat  detection,  insider  threat,  operations,  
and  management.Joseph  Blankenship,  Senior  Analyst
Forrester
5©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
My  Challenge  For  Today
6©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Agenda
› The Evolving World
› Cybersecurity Has To Evolve
› Analytics And Automation
› Starting Your Automation Journey
› Rules of Engagement
› Wrap-Up
7©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
The  Evolving  World
8©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
People  And  Technology  Continue  To  Evolve
www.vexels.com/vectors/preview/71108/evolution-­of-­human-­work-­silhouettes
9©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Delivering  A  5  MB  Hard  Drive  In  1956
1.25in
.94in
.08in  thick
10©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Smartphones  Replaced  A  Host  Of  Devices
11©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Concerts  Have  Evolved
12©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Remember  Telephone  Operators?
Image  Source:  www.flickr.com/photos/jill_carlson/11085936793,  www.flickr.com/photos/70251312,  
13©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Cybersecurity  Has  To  Evolve
14©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
51%  of  firms  
were  breached  in  
the  past  12  
months.
48%  of  Enterprise  Firms  Suffered  2+  Breaches  in  2017
15©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Top  Data  Types  Breached
Base:  614  global  network  security  decision-­makers  whose  firms  have  had  a  security  breach  in  the  past  12  months
Source:  Forrester  Data  Global  Business  Technographics  Security  Survey,  2017
41%
34%
29%
28%
26%
22%
20%
16%
8%
Personally  identifiable  information  (name,  address,  phone,  
Social  Security  number)
Authentication  credentials  (user  IDs  and  passwords,  other  
forms  of  credentials)
Account  numbers
Intellectual  property
Corporate  financial  data
Website  defacement
Payment/credit  card  data
Other  personal  data  (e.g.,  customer  service  data)
Other  sensitive  corporate  data  (e.g.,  marketing/strategy  plans,  
pricing)
“What  types  of  data  were  potentially  compromised  or  breached  in  the  past  12  
months?”
16©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Security  Analysis  Is  A  Manual  Activity
Source:  Forrester’s  Security  Operations  Center  (SOC)  Staffing
17©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Too  Many  Alerts  /  Too  Few  Analysts
Source:  Forrester’s  Security  Operations  Center  (SOC)  Staffing
18©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Attacker  Dwell  Time  Still  Averages  99  Days  
› Dwell  times  have  dropped  from  146
days  in  2015  to  99 days  in  2016
› While  this  is  a  substantial  
improvement,  it’s  still  far  too  long
2017  FireEye  M-­Trends  Report
Obligatory  Picture  Of  Guy  In  Hoodie  With  Ones  And  Zeroes
19©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
The  lack  of  speed  and  agility  when  responding  
to  a  suspected  data  breach  is  the  most  
significant  issue  facing  security  teams  today.
Source:   Forrester’s  “Rules  of  Engagement:   A  Call  to  Action  to  Automate   Breach   Response”   report.
20©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Infrastructures  Are  Increasingly  Complex
21©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Organizations  can't  handle  increased  
complexity  with  manual  processes.
22©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Increasing  
Complexity  
Necessitates  
The  Use  Of  
Automation
Source:  Reduce  Risk  And  Improve  Security  Through  Infrastructure  Automation Forrester  report
23©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Analytics  And  Automation
24©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
25©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Security  Analytics  Enables  Better  Detection
Source:  Forrester’s  Vendor  Landscape:  Security  Analytics  (SA)
26©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Automation  Will  Speed  Response
› Alert  triaging
› Context  gathering
› Containment
› Remediation
27©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Automation  Isn’t  A  Four  Letter  Word
› Historically,  security  pros  have  shied  away  from  automation
• Risk  of  stopping  legitimate  traffic  or  disrupting  business
• Need  for  human  analyst  to  research  and  make  decisions
28©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Base:  1,700  Security  technology  decision-­makers  (1,000+  employees)
Source:  Forrester  Data  Global  Business  Technographics  Security  Survey,  2017
0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
Complexity  of  our  IT  environment
Changing/evolving   nature  of  IT  threats  (internal  and  …
Compliance  with  new  privacy  laws
Day-­to-­day  tactical  activities  taking  up  too  much  time
Building  a  culture  of  data  stewardship
Lack  of  budget
Lack  of  staff  (the  security  team  is  understaffed)
Unavailability  of  security  employees  with  the  right  …
Inability  to  measure  the  effectiveness  of  our  security  …
Other  priorities  in  the  organization  taking  precedence  …
Top  10  Enterprise  Security  Challenges
29©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
State  that  using  automation and  
orchestration  tools  to  improve  security  
operations  is  a  high  or  critical  priority.
Base:  1,169  Security  technology  decision-­makers  (1,000+  employees)
Source:  Forrester  Data  Global  Business  Technographics  Security  Survey,  2017
68%
30©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Security  Is  Evolving  To  Be  More  Automated
31©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
#1  Security  Productivity  Tool
32©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Analysts  Also  Swivel  Chair  Between  Tools
33©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
We  Already  Have  LOTS  Of  Security  Tools
Source:  Momentum  Partners
34©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
More  tools  =  more  security
alerts
35©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
36©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Automation  Will  Help  Break  Down  Silos
37©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Automation  will  help  analysts  become  
more  productive,  but  will  not be  a  
replacement  for  human  analysts.  
38©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Starting  Your  Automation  Journey
39©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Crawl,  Walk,  Run
› What  are  the  tasks/processes  
ready  for  automation  today?
• Repetitive,  manual  tasks
• Low-­risk  processes  like  
investigation,  context  building,  
and  querying
› Build  a  strong  foundation,  then  
work  on  more  advanced  
automation
• Complicated  processes
• Remediation  activities
40©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Targeted  Attack  Hierarchy  of  Needs
Source:  Forrester’s  Targeted-­Attack  Hierarchy  Of  Needs:  Assess  Your  Core  Capabilities  report
41©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
42©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Rules  Of  Engagement
43©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Automating  Response
› Automating  security  is  a  business  requirement
› Security  is  behind  other  parts  of  the  business
Source:  Forrester’s  Rules  Of  Engagement:  A  Call  To  Action  To  Automate  Breach  Response
44©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Automation  Requires  Defined  Rules  Of  Engagement
› To  enable  automation,  security  teams  must:
• Know  the  business
› Understand  key  systems  and  data
• Establish  policies  for  automating
› When  to  automate
› When  to  send  to  a  human  analyst
• Build  consistent  processes
› Bad  process  =  garbage  in  /  garbage  out
› Policies  based  on  business  requirements
• Protect  toxic  data  – IT’S  ALL  ABOUT  THE  DATA
• Build  policies  based  on  data  risk
A  Formula  For  Defining  Toxic  Data
45©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Rules  Of  Engagement
Source:  Forrester’s  Rules  Of  Engagement:  A  Call  To  Action  To  Automate  Breach  Response
46©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Wrap-­Up  And  Next  Steps
› Security  teams  lack  the  speed  and  agility  to  stop  breaches
• Inadequate  tools  and  slow,  manual  processes  impede  progress
• Complex  environments  require  automation
› We  have  to  make  better,  faster  security  decisions
• Security  analytics  tools  help  make  that  happen
• Ability  to  automate  is  dependent  on  more  accurate,  improved  detection
› Automation  can  deliver  faster  response
• Build  a  foundation  before  increasing  complexity
• Define  rules  of  engagement  for  automation
FORRESTER.COM
Thank  you
©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Joseph  Blankenship
www.forrester.com/Joseph-­Blankenship
@infosec_jb

More Related Content

What's hot

2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident ReportCommunity IT Innovators
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityPriyanka Aash
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsPriyanka Aash
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3Shawn Croswell
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security LandscapeArrow ECS UK
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughSavvius, Inc
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Cyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceTom K
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 

What's hot (19)

The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security Landscape
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Cyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General Audience
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 

Similar to Put Analytics And Automation At The Core Of Security – Joseph Blankenship – Senior Analyst, Forrester Research

Splunk Financial Services Forum Boston June, 2017
Splunk Financial Services Forum Boston June, 2017Splunk Financial Services Forum Boston June, 2017
Splunk Financial Services Forum Boston June, 2017Splunk
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesForcepoint LLC
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityForgeRock
 
How to Scale BI and Analytics with Hadoop-based Platforms
How to Scale BI and Analytics with Hadoop-based PlatformsHow to Scale BI and Analytics with Hadoop-based Platforms
How to Scale BI and Analytics with Hadoop-based PlatformsArcadia Data
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
Deliver Data Governance with a “Yes”
Deliver Data Governance with a “Yes”Deliver Data Governance with a “Yes”
Deliver Data Governance with a “Yes”Jean-Michel Franco
 
Delivering data governance with a Yes
Delivering data governance with a YesDelivering data governance with a Yes
Delivering data governance with a YesJean-Michel Franco
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Flexera
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017Doug Copley
 
Making a Difference through Analytics
Making a Difference through AnalyticsMaking a Difference through Analytics
Making a Difference through AnalyticsTas Chantree
 
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...Splunk
 
Splunk Forum Financial Services Chicago 9/13/17
Splunk Forum Financial Services Chicago 9/13/17Splunk Forum Financial Services Chicago 9/13/17
Splunk Forum Financial Services Chicago 9/13/17Splunk
 
Data Virtualization - Enabling Next Generation Analytics
Data Virtualization - Enabling Next Generation AnalyticsData Virtualization - Enabling Next Generation Analytics
Data Virtualization - Enabling Next Generation AnalyticsDenodo
 
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk OverviewSplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk OverviewSplunk
 
Collaborative Metadata Management with David Loshin
Collaborative Metadata Management with David LoshinCollaborative Metadata Management with David Loshin
Collaborative Metadata Management with David LoshinEmbarcadero Technologies
 
The Value of Pervasive Analytics
The Value of Pervasive AnalyticsThe Value of Pervasive Analytics
The Value of Pervasive AnalyticsCloudera, Inc.
 
Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017Splunk
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Puneet Kukreja
 
Demystify Big Data Breakfast Briefing: Martha Bennett, Forrester
Demystify Big Data Breakfast Briefing: Martha Bennett, Forrester Demystify Big Data Breakfast Briefing: Martha Bennett, Forrester
Demystify Big Data Breakfast Briefing: Martha Bennett, Forrester Hortonworks
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk
 

Similar to Put Analytics And Automation At The Core Of Security – Joseph Blankenship – Senior Analyst, Forrester Research (20)

Splunk Financial Services Forum Boston June, 2017
Splunk Financial Services Forum Boston June, 2017Splunk Financial Services Forum Boston June, 2017
Splunk Financial Services Forum Boston June, 2017
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
How to Scale BI and Analytics with Hadoop-based Platforms
How to Scale BI and Analytics with Hadoop-based PlatformsHow to Scale BI and Analytics with Hadoop-based Platforms
How to Scale BI and Analytics with Hadoop-based Platforms
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Deliver Data Governance with a “Yes”
Deliver Data Governance with a “Yes”Deliver Data Governance with a “Yes”
Deliver Data Governance with a “Yes”
 
Delivering data governance with a Yes
Delivering data governance with a YesDelivering data governance with a Yes
Delivering data governance with a Yes
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
 
Making a Difference through Analytics
Making a Difference through AnalyticsMaking a Difference through Analytics
Making a Difference through Analytics
 
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
 
Splunk Forum Financial Services Chicago 9/13/17
Splunk Forum Financial Services Chicago 9/13/17Splunk Forum Financial Services Chicago 9/13/17
Splunk Forum Financial Services Chicago 9/13/17
 
Data Virtualization - Enabling Next Generation Analytics
Data Virtualization - Enabling Next Generation AnalyticsData Virtualization - Enabling Next Generation Analytics
Data Virtualization - Enabling Next Generation Analytics
 
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk OverviewSplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
 
Collaborative Metadata Management with David Loshin
Collaborative Metadata Management with David LoshinCollaborative Metadata Management with David Loshin
Collaborative Metadata Management with David Loshin
 
The Value of Pervasive Analytics
The Value of Pervasive AnalyticsThe Value of Pervasive Analytics
The Value of Pervasive Analytics
 
Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
 
Demystify Big Data Breakfast Briefing: Martha Bennett, Forrester
Demystify Big Data Breakfast Briefing: Martha Bennett, Forrester Demystify Big Data Breakfast Briefing: Martha Bennett, Forrester
Demystify Big Data Breakfast Briefing: Martha Bennett, Forrester
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
 

More from Core Security

How to Solve the Top 3 Struggles with Identity Governance and Administration ...
How to Solve the Top 3 Struggles with Identity Governance and Administration ...How to Solve the Top 3 Struggles with Identity Governance and Administration ...
How to Solve the Top 3 Struggles with Identity Governance and Administration ...Core Security
 
Lazy Penetration Tester Tricks
Lazy Penetration Tester Tricks Lazy Penetration Tester Tricks
Lazy Penetration Tester Tricks Core Security
 
Thanks for All the Phish: Introducing Core Impact 18.1
Thanks for All the Phish: Introducing Core Impact 18.1Thanks for All the Phish: Introducing Core Impact 18.1
Thanks for All the Phish: Introducing Core Impact 18.1Core Security
 
Identity + Security: Welcome to Your New Career
Identity + Security: Welcome to Your New Career Identity + Security: Welcome to Your New Career
Identity + Security: Welcome to Your New Career Core Security
 
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Core Security
 
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core SecurityThreat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core SecurityCore Security
 
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...Core Security
 
Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...Core Security
 
Product Vision - Stephen Newman – SecureAuth+Core Security
Product Vision - Stephen Newman  – SecureAuth+Core Security Product Vision - Stephen Newman  – SecureAuth+Core Security
Product Vision - Stephen Newman – SecureAuth+Core Security Core Security
 
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...Core Security
 
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...Core Security
 
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...Core Security
 
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...Core Security
 
The Why - Keith Graham, CTO – SecureAuth+Core Security
The Why - Keith Graham, CTO – SecureAuth+Core Security The Why - Keith Graham, CTO – SecureAuth+Core Security
The Why - Keith Graham, CTO – SecureAuth+Core Security Core Security
 
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core SecurityVulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core SecurityCore Security
 
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...Core Security
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016Core Security
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sectorCore Security
 
What your scanner isn't telling you
What your scanner isn't telling youWhat your scanner isn't telling you
What your scanner isn't telling youCore Security
 
Advanced Pen Testing Techniques-DNS-WMI
Advanced Pen Testing Techniques-DNS-WMIAdvanced Pen Testing Techniques-DNS-WMI
Advanced Pen Testing Techniques-DNS-WMICore Security
 

More from Core Security (20)

How to Solve the Top 3 Struggles with Identity Governance and Administration ...
How to Solve the Top 3 Struggles with Identity Governance and Administration ...How to Solve the Top 3 Struggles with Identity Governance and Administration ...
How to Solve the Top 3 Struggles with Identity Governance and Administration ...
 
Lazy Penetration Tester Tricks
Lazy Penetration Tester Tricks Lazy Penetration Tester Tricks
Lazy Penetration Tester Tricks
 
Thanks for All the Phish: Introducing Core Impact 18.1
Thanks for All the Phish: Introducing Core Impact 18.1Thanks for All the Phish: Introducing Core Impact 18.1
Thanks for All the Phish: Introducing Core Impact 18.1
 
Identity + Security: Welcome to Your New Career
Identity + Security: Welcome to Your New Career Identity + Security: Welcome to Your New Career
Identity + Security: Welcome to Your New Career
 
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
 
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core SecurityThreat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
 
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
 
Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...
 
Product Vision - Stephen Newman – SecureAuth+Core Security
Product Vision - Stephen Newman  – SecureAuth+Core Security Product Vision - Stephen Newman  – SecureAuth+Core Security
Product Vision - Stephen Newman – SecureAuth+Core Security
 
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
 
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
 
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
 
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
 
The Why - Keith Graham, CTO – SecureAuth+Core Security
The Why - Keith Graham, CTO – SecureAuth+Core Security The Why - Keith Graham, CTO – SecureAuth+Core Security
The Why - Keith Graham, CTO – SecureAuth+Core Security
 
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core SecurityVulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
 
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 
What your scanner isn't telling you
What your scanner isn't telling youWhat your scanner isn't telling you
What your scanner isn't telling you
 
Advanced Pen Testing Techniques-DNS-WMI
Advanced Pen Testing Techniques-DNS-WMIAdvanced Pen Testing Techniques-DNS-WMI
Advanced Pen Testing Techniques-DNS-WMI
 

Recently uploaded

Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 

Recently uploaded (20)

Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 

Put Analytics And Automation At The Core Of Security – Joseph Blankenship – Senior Analyst, Forrester Research

  • 1. ©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D.
  • 2. ©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Put  Analytics  And  Automation  At  The   Core  Of  Security Joseph  Blankenship,  Senior  Analyst October  18,  2017
  • 3. We  work  with  business  and   technology  leaders  to  develop   customer-­obsessed  strategies   that  drive  growth. 3©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D.
  • 4. 4©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Analyst  Bio Joseph  (aka  JB)  supports  Security  &  Risk   professionals,  helping  clients  develop   security  strategies  and  make  informed   decisions  to  protect  against  risk.  He  covers   security  infrastructure  and  operations,   including  security  information  management   (SIM),  security  analytics,  security  automation   and  orchestration  (SAO),  distributed  denial  of   service  (DDoS),  and  network  security.  His   research  focuses  on  security  monitoring,   threat  detection,  insider  threat,  operations,   and  management.Joseph  Blankenship,  Senior  Analyst Forrester
  • 5. 5©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. My  Challenge  For  Today
  • 6. 6©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Agenda › The Evolving World › Cybersecurity Has To Evolve › Analytics And Automation › Starting Your Automation Journey › Rules of Engagement › Wrap-Up
  • 7. 7©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. The  Evolving  World
  • 8. 8©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. People  And  Technology  Continue  To  Evolve www.vexels.com/vectors/preview/71108/evolution-­of-­human-­work-­silhouettes
  • 9. 9©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Delivering  A  5  MB  Hard  Drive  In  1956 1.25in .94in .08in  thick
  • 10. 10©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Smartphones  Replaced  A  Host  Of  Devices
  • 11. 11©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Concerts  Have  Evolved
  • 12. 12©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Remember  Telephone  Operators? Image  Source:  www.flickr.com/photos/jill_carlson/11085936793,  www.flickr.com/photos/70251312,  
  • 13. 13©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Cybersecurity  Has  To  Evolve
  • 14. 14©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. 51%  of  firms   were  breached  in   the  past  12   months. 48%  of  Enterprise  Firms  Suffered  2+  Breaches  in  2017
  • 15. 15©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Top  Data  Types  Breached Base:  614  global  network  security  decision-­makers  whose  firms  have  had  a  security  breach  in  the  past  12  months Source:  Forrester  Data  Global  Business  Technographics  Security  Survey,  2017 41% 34% 29% 28% 26% 22% 20% 16% 8% Personally  identifiable  information  (name,  address,  phone,   Social  Security  number) Authentication  credentials  (user  IDs  and  passwords,  other   forms  of  credentials) Account  numbers Intellectual  property Corporate  financial  data Website  defacement Payment/credit  card  data Other  personal  data  (e.g.,  customer  service  data) Other  sensitive  corporate  data  (e.g.,  marketing/strategy  plans,   pricing) “What  types  of  data  were  potentially  compromised  or  breached  in  the  past  12   months?”
  • 16. 16©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Security  Analysis  Is  A  Manual  Activity Source:  Forrester’s  Security  Operations  Center  (SOC)  Staffing
  • 17. 17©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Too  Many  Alerts  /  Too  Few  Analysts Source:  Forrester’s  Security  Operations  Center  (SOC)  Staffing
  • 18. 18©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Attacker  Dwell  Time  Still  Averages  99  Days   › Dwell  times  have  dropped  from  146 days  in  2015  to  99 days  in  2016 › While  this  is  a  substantial   improvement,  it’s  still  far  too  long 2017  FireEye  M-­Trends  Report Obligatory  Picture  Of  Guy  In  Hoodie  With  Ones  And  Zeroes
  • 19. 19©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. The  lack  of  speed  and  agility  when  responding   to  a  suspected  data  breach  is  the  most   significant  issue  facing  security  teams  today. Source:   Forrester’s  “Rules  of  Engagement:   A  Call  to  Action  to  Automate   Breach   Response”   report.
  • 20. 20©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Infrastructures  Are  Increasingly  Complex
  • 21. 21©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Organizations  can't  handle  increased   complexity  with  manual  processes.
  • 22. 22©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Increasing   Complexity   Necessitates   The  Use  Of   Automation Source:  Reduce  Risk  And  Improve  Security  Through  Infrastructure  Automation Forrester  report
  • 23. 23©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Analytics  And  Automation
  • 24. 24©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D.
  • 25. 25©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Security  Analytics  Enables  Better  Detection Source:  Forrester’s  Vendor  Landscape:  Security  Analytics  (SA)
  • 26. 26©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Automation  Will  Speed  Response › Alert  triaging › Context  gathering › Containment › Remediation
  • 27. 27©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Automation  Isn’t  A  Four  Letter  Word › Historically,  security  pros  have  shied  away  from  automation • Risk  of  stopping  legitimate  traffic  or  disrupting  business • Need  for  human  analyst  to  research  and  make  decisions
  • 28. 28©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Base:  1,700  Security  technology  decision-­makers  (1,000+  employees) Source:  Forrester  Data  Global  Business  Technographics  Security  Survey,  2017 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Complexity  of  our  IT  environment Changing/evolving   nature  of  IT  threats  (internal  and  … Compliance  with  new  privacy  laws Day-­to-­day  tactical  activities  taking  up  too  much  time Building  a  culture  of  data  stewardship Lack  of  budget Lack  of  staff  (the  security  team  is  understaffed) Unavailability  of  security  employees  with  the  right  … Inability  to  measure  the  effectiveness  of  our  security  … Other  priorities  in  the  organization  taking  precedence  … Top  10  Enterprise  Security  Challenges
  • 29. 29©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. State  that  using  automation and   orchestration  tools  to  improve  security   operations  is  a  high  or  critical  priority. Base:  1,169  Security  technology  decision-­makers  (1,000+  employees) Source:  Forrester  Data  Global  Business  Technographics  Security  Survey,  2017 68%
  • 30. 30©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Security  Is  Evolving  To  Be  More  Automated
  • 31. 31©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. #1  Security  Productivity  Tool
  • 32. 32©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Analysts  Also  Swivel  Chair  Between  Tools
  • 33. 33©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. We  Already  Have  LOTS  Of  Security  Tools Source:  Momentum  Partners
  • 34. 34©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. More  tools  =  more  security alerts
  • 35. 35©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D.
  • 36. 36©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Automation  Will  Help  Break  Down  Silos
  • 37. 37©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Automation  will  help  analysts  become   more  productive,  but  will  not be  a   replacement  for  human  analysts.  
  • 38. 38©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Starting  Your  Automation  Journey
  • 39. 39©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Crawl,  Walk,  Run › What  are  the  tasks/processes   ready  for  automation  today? • Repetitive,  manual  tasks • Low-­risk  processes  like   investigation,  context  building,   and  querying › Build  a  strong  foundation,  then   work  on  more  advanced   automation • Complicated  processes • Remediation  activities
  • 40. 40©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Targeted  Attack  Hierarchy  of  Needs Source:  Forrester’s  Targeted-­Attack  Hierarchy  Of  Needs:  Assess  Your  Core  Capabilities  report
  • 41. 41©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D.
  • 42. 42©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Rules  Of  Engagement
  • 43. 43©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Automating  Response › Automating  security  is  a  business  requirement › Security  is  behind  other  parts  of  the  business Source:  Forrester’s  Rules  Of  Engagement:  A  Call  To  Action  To  Automate  Breach  Response
  • 44. 44©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Automation  Requires  Defined  Rules  Of  Engagement › To  enable  automation,  security  teams  must: • Know  the  business › Understand  key  systems  and  data • Establish  policies  for  automating › When  to  automate › When  to  send  to  a  human  analyst • Build  consistent  processes › Bad  process  =  garbage  in  /  garbage  out › Policies  based  on  business  requirements • Protect  toxic  data  – IT’S  ALL  ABOUT  THE  DATA • Build  policies  based  on  data  risk A  Formula  For  Defining  Toxic  Data
  • 45. 45©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Rules  Of  Engagement Source:  Forrester’s  Rules  Of  Engagement:  A  Call  To  Action  To  Automate  Breach  Response
  • 46. 46©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Wrap-­Up  And  Next  Steps › Security  teams  lack  the  speed  and  agility  to  stop  breaches • Inadequate  tools  and  slow,  manual  processes  impede  progress • Complex  environments  require  automation › We  have  to  make  better,  faster  security  decisions • Security  analytics  tools  help  make  that  happen • Ability  to  automate  is  dependent  on  more  accurate,  improved  detection › Automation  can  deliver  faster  response • Build  a  foundation  before  increasing  complexity • Define  rules  of  engagement  for  automation
  • 47. FORRESTER.COM Thank  you ©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Joseph  Blankenship www.forrester.com/Joseph-­Blankenship @infosec_jb