Big Data, Security
Intelligence,
(And Why I Hate This Title)
Introduction / Who Am I
• Matt Yonchak
• Director of Security
Services
• Hurricane Labs
• Avid Cleveland
sports cynic
What are we going to
talk about?
Security Intelligence
Fact #1
Attacks are happening on our networks and we don't know:
•How it happened
•Who got in
•How pervasive this attack is
Fact #2
Traditional tools are insufficient to the task of real
security analysis
Intrusion Prevention
Systems (IPS)
Firewalls
Incredible tool or amazing distraction?
SIEM
Fact #3
All Data Is Security Relevant
• WAF
• IPS
• Proxy
• Firewall
Typical Security Data
Non-Typical Data
(but still relevant to security)
• Web Application Data
• Voice and Communication
• Email
• Performance Monitoring
• ID Management
• External Data Sources
Problem
We’ve Been Attacked
How Did It Happen?
Social Engineering
Attacking the User
What Does It Look Like?
• Evades normal security controls
• Moves slow and stays quiet
• Knows what data it's after
• Propagates itself internally
We've Been Compromised
Looking At The Problem
Differently
Security Intelligence Is:
Analysis Outside the Box
Security Intelligence Is:
Behavior-Based Analysis
Security Intelligence Is:
Working a Little Harder
Security Intelligence Is:
Understanding the
Big Picture
Security Intelligence: How
Do We Get It?
Understand the Attack / Attackers
Logs
Security Intelligence: How
Do We Get It?
Understand Your Network
Security Intelligence: How
Do We Get It?
Understand Your Network
Security Intelligence: How
Do We Get It?
Back to Our Problem
How would we have detected/stopped the
attack?
Finding The Attack
Finding The Attack
Bring In Some
External Data
• GeoIP
• Blacklists / Watchlists
• Our own intelligence
Finding The Attack
Think Outside the Box
Going Forward
How do we build out this practice within
our organizations?
Going Forward
Accept that what we're doing now:
• Traditional Incident
Response
• Our typical security
controls
• Our SIEMs
Going Forward
Legitimize the Security
Intelligence Concept
Security Intelligence
Legitimacy
Train For It
Security Intelligence
Legitimacy
• Security
Intelligence
Analyst?
• Security
Intelligence
Engineer?
• Security
Intelligence...
Ninja?
Security Intelligence
Legitimacy
Results
Results
Closing
The only way to really get where we need to
be in security analysis is if we:
•Put in the work to get there
•Think outside the box
•Change what is normal for security analysis
Questions?
• Twitter: @mattyonchak
• Email: matt@hurricanelabs.com

Big Data, Security Intelligence, (And Why I Hate This Title)