SlideShare a Scribd company logo
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Gianluca	
  Gaias	
  
Head	
  of	
  Informa@on	
  Security,	
  
YOOX	
  Group	
  
Building	
  an	
  	
  
Enterprise-­‐grade	
  
Security	
  Intelligence	
  
PlaIorm	
  at	
  Yoox.com	
  
(Gain	
  the	
  Big	
  Picture)	
  	
  
Disclaimer	
  
2	
  
During	
  the	
  course	
  of	
  this	
  presenta@on,	
  we	
  may	
  make	
  forward	
  looking	
  statements	
  regarding	
  future	
  
events	
  or	
  the	
  expected	
  performance	
  of	
  the	
  company.	
  We	
  cau@on	
  you	
  that	
  such	
  statements	
  reflect	
  our	
  
current	
  expecta@ons	
  and	
  es@mates	
  based	
  on	
  factors	
  currently	
  known	
  to	
  us	
  and	
  that	
  actual	
  events	
  or	
  
results	
  could	
  differ	
  materially.	
  For	
  important	
  factors	
  that	
  may	
  cause	
  actual	
  results	
  to	
  differ	
  from	
  those	
  
contained	
  in	
  our	
  forward-­‐looking	
  statements,	
  please	
  review	
  our	
  filings	
  with	
  the	
  SEC.	
  The	
  forward-­‐
looking	
  statements	
  made	
  in	
  the	
  this	
  presenta@on	
  are	
  being	
  made	
  as	
  of	
  the	
  @me	
  and	
  date	
  of	
  its	
  live	
  
presenta@on.	
  If	
  reviewed	
  aWer	
  its	
  live	
  presenta@on,	
  this	
  presenta@on	
  may	
  not	
  contain	
  current	
  or	
  
accurate	
  informa@on.	
  We	
  do	
  not	
  assume	
  any	
  obliga@on	
  to	
  update	
  any	
  forward	
  looking	
  statements	
  we	
  
may	
  make.	
  	
  
	
  
In	
  addi@on,	
  any	
  informa@on	
  about	
  our	
  roadmap	
  outlines	
  our	
  general	
  product	
  direc@on	
  and	
  is	
  subject	
  to	
  
change	
  at	
  any	
  @me	
  without	
  no@ce.	
  It	
  is	
  for	
  informa@onal	
  purposes	
  only	
  and	
  shall	
  not,	
  be	
  incorporated	
  
into	
  any	
  contract	
  or	
  other	
  commitment.	
  Splunk	
  undertakes	
  no	
  obliga@on	
  either	
  to	
  develop	
  the	
  features	
  
or	
  func@onality	
  described	
  or	
  to	
  include	
  any	
  such	
  feature	
  or	
  func@onality	
  in	
  a	
  future	
  release.	
  
Personal	
  Introduc@on	
  
3	
  
Gianluca	
  Gaias,	
  YOOX	
  Group	
  	
  
  YOOX	
  Group	
  is	
  the	
  global	
  Internet	
  retailing	
  partner	
  
for	
  leading	
  fashion	
  and	
  luxury	
  brands	
  
  Head	
  of	
  Informa@on	
  Security:	
  	
  
–  Applica@on	
  Security	
  
–  Organiza@onal	
  Security	
  
–  Compliance	
  
–  Security	
  Monitoring	
  
Key	
  Takeaways	
  	
  
4	
  
  From	
  a	
  technology	
  oriented	
  approach	
  to	
  an	
  info-­‐centric	
  approach	
  
  From	
  log	
  correla2on	
  to	
  pa3ern	
  recogni2on	
  
  From	
  a	
  passive/display	
  pla7orm	
  to	
  a	
  proac2ve/execu2ve	
  pla7orm	
  
  From	
  standard	
  dashboards	
  to	
  real-­‐2me	
  dynamic	
  dashboards	
  
  From	
  a	
  security	
  event	
  to	
  an	
  context-­‐aware	
  security	
  informa2on	
  
Agenda	
  
  YOOX	
  Group:	
  business	
  and	
  challenges.	
  
  Security	
  evolu@on	
  overview	
  
  From	
  Tech	
  Oriented	
  approach	
  to	
  Informa@on	
  Oriented	
  approach	
  
–  Deep	
  Inves@ga@on	
  
–  Proac@ve	
  Dashboard:	
  IP	
  Blacklist	
  	
  
–  Real-­‐@me	
  Dynamic	
  Dashboard:	
  Aback	
  Map	
  
  Risk	
  Management	
  and	
  Pabern	
  Recogni@on	
  
–  Use	
  Case:	
  Abackers	
  Ac@vity	
  
  Reconsidering	
  dashboard	
  design	
  
  Next	
  Steps	
  
	
  
5	
  
YOOX	
  Group	
  	
  
6	
  
  Global	
  reach	
  to	
  more	
  than	
  100	
  countries	
  worldwide	
  
  Five	
  logis@cs	
  centers	
  strategically	
  located,	
  guaranteeing	
  top	
  service	
  to	
  all	
  major	
  fashion	
  
markets	
  (United	
  States,	
  Europe,	
  Japan,	
  China,	
  Hong	
  Kong)	
  
YOOX	
  Group:	
  OS	
  &	
  Mul@-­‐Brand	
  
7	
  
§  The online destination for women
dedicated entirely to in-season high-end
shoes
§  Exclusive shoe-related services and
innovative editorial component
§  Launched in 2012
§  Exclusive	
  official	
  online	
  flagship	
  stores	
  of	
  leading	
  fashion	
  and	
  luxury	
  brands	
  
§  Long-­‐term	
  partnerships	
  
MONO-­‐BRAND	
  
§  The luxury online boutique with in-season
assortment of high fashion and directional
designers for men and women
§  Dedicated mini-stores
§  Launched in 2008
Online stores “Powered by YOOX Group”
MULTI-­‐BRAND	
  
§  The	
  world’s	
  leading	
  online	
  lifestyle	
  store	
  for	
  
fashion,	
  design	
  and	
  art	
  
§  Broad	
  offering	
  of	
  end-­‐of-­‐season	
  premium	
  
apparel	
  and	
  accessories,	
  exclusive	
  collec@ons,	
  
vintage,	
  home	
  &	
  design	
  and	
  artworks	
  
§  Launched	
  in	
  2000	
  	
  
JVCo with Kering
and	
  many	
  more	
  …
YOOX	
  Group:	
  Challenges	
  
  Keep	
  the	
  trust	
  	
  
–  Data	
  Confiden@ality	
  
–  Data	
  Integrity	
  and	
  Completeness	
  
–  Data	
  Processing	
  Transparency	
  
  High	
  Availability	
  in	
  hos@le	
  enviroment	
  
	
  
  Gain	
  the	
  big	
  picture:	
  
–  Challenge	
  and	
  Enabler	
  
8	
  
ü  Shareholders	
  
ü  Customers	
  
ü  Stakeholders	
  
Security	
  Evolu@on	
  Overview	
  
9	
  
0	
  
1	
  
2	
  
3	
  
4	
  
5	
  
6	
  
7	
  
8	
  
9	
  
Data	
  Leakage	
  Preven@on	
  
Informa@on	
  Security	
  
Compliance	
  
IPS	
  &	
  Anomaly	
  Detec@on	
  
Administra@ve	
  Access	
  
Control	
  
PCI-­‐DSS	
  Compliance	
  
Sites	
  Vulnerability	
  Checks	
  
Code	
  Review	
  
Logical	
  Access	
  
Governance	
  
Security	
  Intelligence	
  
PlaIorm	
  
Online	
  Brand	
  Protec@on	
  
Privacy	
  Compliance	
  
Informa@on	
  Process	
  
Analysis	
  
2011	
   2013	
   2015	
  
Security	
  Evolu@on	
  –	
  Tech	
  vs	
  Info	
  
  Technology	
  Oriented:	
  
–  Info	
  confined	
  to	
  technology	
  
–  Par@al	
  iden@ty	
  defini@on	
  
–  No	
  covered	
  gaps	
  
  Informa@on	
  Oriented	
  -­‐	
  Splunk:	
  
–  Enrichement	
  of	
  tech	
  logs	
  
–  Event	
  correla@on	
  
–  Clear	
  iden@ty	
  defini@on	
  
10	
  
From	
  Tech	
  to	
  Info	
  
  “From	
  a	
  technology	
  oriented	
  approach	
  to	
  an	
  info-­‐centric	
  approach.”	
  
11	
  
Inves@ga@on	
  
12	
  
Inves@ga@on:	
  Show	
  Details	
  
13	
  
Advanced	
  Dashboard:	
  IP	
  Blacklist	
  
14	
  
•  Proac@ve	
  Dashboard	
  
•  One-­‐click	
  blacklist	
  on	
  
Akamai	
  WAF	
  through	
  
Akamai	
  API	
  calls	
  
•  Splunk	
  is	
  able	
  to	
  run	
  a	
  
command	
  on	
  input	
  source	
  	
  	
   Drilldown	
  
«From	
  a	
  passive/display	
  pla7orm	
  to	
  a	
  	
  
proac2ve/execu2ve	
  pla7orm»	
  
WAF	
  Ac@vity	
  Representa@on:	
  Standard	
  Dashboard	
  
15	
  
•  Sta@s@cal	
  evidences	
  by:	
  
–  Source	
  IP	
  
–  Aback	
  type	
  
–  WAF	
  Ac@on	
  
•  Event	
  distribu@on	
  over	
  the	
  @me	
  
•  Spike	
  visibility	
  depends	
  from	
  the	
  scale	
  
•  Is	
  not	
  evident:	
  
–  Aback	
  frequency	
  
–  Rela@on	
  between	
  Source	
  IP,	
  Aback	
  type	
  
and	
  WAF	
  ac@on	
  
Pros	
   Cons	
  
“From	
  standard	
  dashboards	
  to	
  real-­‐2me	
  dynamic	
  dashboards”	
  
Real-­‐@me	
  Dynamic	
  Dashboard:	
  Aback	
  Map	
  
16	
  
Security	
  Evolu@on	
  –	
  Risk	
  Mgmt	
  &	
  Pabern	
  Rec.	
  
  Risk	
  Management:	
  
–  Correla@on	
  of	
  Tech	
  Elements	
  and	
  Business	
  Elements	
  
–  Support	
  to	
  quan@ta@ve	
  risk	
  analysis	
  
–  Assigning	
  Risk	
  value	
  to	
  alerts	
  
	
  
  Pabern	
  Recogni@on:	
  
–  Different	
  levels	
  of	
  correla@on	
  
–  Pabern	
  as	
  result	
  of	
  several	
  high-­‐level	
  events	
  from	
  different	
  systems	
  by	
  iden@ty	
  
–  Knowledge	
  from	
  historical	
  incidents	
  and	
  analysts	
  experience	
  
–  Goal:	
  detect	
  user	
  behavior	
  and	
  recurrent	
  aback	
  paberns	
  
17	
  
Pabern	
  Recogni@on	
  
  Single	
  security	
  events	
  may	
  be	
  part	
  of	
  a	
  more	
  complex	
  ac@on.	
  
18	
  
Correla@on	
  
Brute	
  Force	
  
Exce.	
  Out	
  Data	
  
High	
  Conn.	
  
Correla@on	
  
Level	
  1	
  
Correla@on	
  
Level	
  2	
  
Correla@on	
  
Level	
  n	
  
Data	
  Exfiltra@on	
  
«From	
  log	
  correla2on	
  to	
  pa3ern	
  recogni2on»	
  
Sequence	
  
Introduced	
  by	
  high	
  level	
  analyst	
  
Pabern	
  Consolida@on	
  
Analyst	
  
Risk	
  Management	
  
  Usually	
  single	
  security	
  event	
  has	
  a	
  sta@c	
  risk	
  
  We	
  need	
  risk	
  value	
  based	
  on	
  content	
  and	
  other	
  events	
  correlated	
  
19	
  
“From	
  a	
  security	
  event	
  to	
  
an	
  context-­‐aware	
  security	
  
informa2on”	
  
Risk	
  
Sta@c	
  
Assign.	
  
(Lookup)	
  
N	
  level	
  
correla@on	
  
Content	
  
Eval	
  
Use	
  Case:	
  Abackers	
  Ac@vity	
  
  Detect	
  sequence	
  of	
  relevant	
  event	
  by	
  iden:ty	
  	
  
  Ac@vity	
  Score:	
  ver@cal	
  axes,	
  max	
  of	
  the	
  same	
  alert	
  type	
  
  Ac@vity	
  Frequency:	
  ball	
  diameter	
  
	
  
20	
  
Pa=ern	
  Recogni:on	
  
Risk	
  Value	
  
Reconsidering	
  Dashboard	
  Design	
  
21	
  
Na@ve	
  Log	
  Collec@on	
  
Splunk	
  Log	
  Collec@on	
  
Standard	
  Dashboards	
  
Advanced	
  
Dashboards	
  
Pabern	
  
Recogni@on	
  
Splunk	
  
Engeneers	
  
NOC	
  
SOC	
  
Security	
  Analyst	
  
Head	
  of	
  Security	
  
Knowledge	
  
Data	
  Meaning	
  
The	
  Big	
  Picture	
  
Key	
  Takeaways	
  	
  
22	
  
  From	
  a	
  technology	
  oriented	
  approach	
  to	
  an	
  info-­‐centric	
  approach.	
  
  From	
  log	
  correla2on	
  to	
  pa3ern	
  recogni2on.	
  
  From	
  a	
  passive/display	
  pla7orm	
  to	
  a	
  proac2ve/execu2ve	
  pla7orm.	
  
  From	
  standard	
  dashboards	
  to	
  real-­‐2me	
  dynamic	
  dashboards.	
  
  From	
  a	
  security	
  event	
  to	
  an	
  context-­‐aware	
  security	
  informa2on.	
  
Next	
  Steps	
  
23	
  
Extend	
  the	
  scope	
  (channels,	
  data,	
  devices)	
  
Deep	
  into	
  the	
  noise	
  
24	
  
Ques@ons?	
  
THANK	
  YOU	
  

More Related Content

What's hot

Taking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - ManagerTaking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - Manager
Splunk
 
Splunk IT Service Intelligence
Splunk IT Service IntelligenceSplunk IT Service Intelligence
Splunk IT Service Intelligence
Georg Knon
 
IT Service Intelligence Hands On Breakout Session
IT Service Intelligence Hands On Breakout SessionIT Service Intelligence Hands On Breakout Session
IT Service Intelligence Hands On Breakout Session
Splunk
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Georg Knon
 
SplunkLive! Stockholm 2015 breakout - Splunk IT Service Intelligence
SplunkLive! Stockholm 2015 breakout - Splunk IT Service IntelligenceSplunkLive! Stockholm 2015 breakout - Splunk IT Service Intelligence
SplunkLive! Stockholm 2015 breakout - Splunk IT Service Intelligence
Splunk
 
Devops Powered by Splunk
Devops Powered by SplunkDevops Powered by Splunk
Devops Powered by Splunk
Splunk
 
Taking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to SplunkTaking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to Splunk
Splunk
 
Database Visibility and Troubleshooting Hands-on Lab - AppSphere16
Database Visibility and Troubleshooting Hands-on Lab - AppSphere16Database Visibility and Troubleshooting Hands-on Lab - AppSphere16
Database Visibility and Troubleshooting Hands-on Lab - AppSphere16
AppDynamics
 
From APM to Business Monitoring with AppDynamics Analytics
From APM to Business Monitoring with AppDynamics AnalyticsFrom APM to Business Monitoring with AppDynamics Analytics
From APM to Business Monitoring with AppDynamics Analytics
AppDynamics
 
Manufacturing Webinar AMS
Manufacturing Webinar AMSManufacturing Webinar AMS
Manufacturing Webinar AMS
Splunk
 
How to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in SplunkHow to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in Splunk
Splunk
 
Getting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-OnGetting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-On
Splunk
 
Getting Additional Value from Logs and APM Data with AppDynamics Unified Anal...
Getting Additional Value from Logs and APM Data with AppDynamics Unified Anal...Getting Additional Value from Logs and APM Data with AppDynamics Unified Anal...
Getting Additional Value from Logs and APM Data with AppDynamics Unified Anal...
AppDynamics
 
Under the Hood: Monitoring Azure and .NET - AppSphere16
Under the Hood: Monitoring Azure and .NET - AppSphere16Under the Hood: Monitoring Azure and .NET - AppSphere16
Under the Hood: Monitoring Azure and .NET - AppSphere16
AppDynamics
 
AppDynamics and ME Bank: Use Cases for a Modern Digital Bank - AppSphere16
AppDynamics and ME Bank: Use Cases for a Modern Digital Bank - AppSphere16AppDynamics and ME Bank: Use Cases for a Modern Digital Bank - AppSphere16
AppDynamics and ME Bank: Use Cases for a Modern Digital Bank - AppSphere16
AppDynamics
 
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
AppDynamics
 
Best Practices and Advanced Insights on Browser RUM Users - AppSphere16
Best Practices and Advanced Insights on Browser RUM Users - AppSphere16Best Practices and Advanced Insights on Browser RUM Users - AppSphere16
Best Practices and Advanced Insights on Browser RUM Users - AppSphere16
AppDynamics
 
Keynote Presentation
Keynote PresentationKeynote Presentation
Keynote Presentation
Splunk
 
Advanced Agent Deployment Strategies in Large Scale, Complex Environments - A...
Advanced Agent Deployment Strategies in Large Scale, Complex Environments - A...Advanced Agent Deployment Strategies in Large Scale, Complex Environments - A...
Advanced Agent Deployment Strategies in Large Scale, Complex Environments - A...
AppDynamics
 
Introduction to appDynamics
Introduction to appDynamics Introduction to appDynamics
Introduction to appDynamics
Siddhanta Rath
 

What's hot (20)

Taking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - ManagerTaking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - Manager
 
Splunk IT Service Intelligence
Splunk IT Service IntelligenceSplunk IT Service Intelligence
Splunk IT Service Intelligence
 
IT Service Intelligence Hands On Breakout Session
IT Service Intelligence Hands On Breakout SessionIT Service Intelligence Hands On Breakout Session
IT Service Intelligence Hands On Breakout Session
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
 
SplunkLive! Stockholm 2015 breakout - Splunk IT Service Intelligence
SplunkLive! Stockholm 2015 breakout - Splunk IT Service IntelligenceSplunkLive! Stockholm 2015 breakout - Splunk IT Service Intelligence
SplunkLive! Stockholm 2015 breakout - Splunk IT Service Intelligence
 
Devops Powered by Splunk
Devops Powered by SplunkDevops Powered by Splunk
Devops Powered by Splunk
 
Taking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to SplunkTaking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to Splunk
 
Database Visibility and Troubleshooting Hands-on Lab - AppSphere16
Database Visibility and Troubleshooting Hands-on Lab - AppSphere16Database Visibility and Troubleshooting Hands-on Lab - AppSphere16
Database Visibility and Troubleshooting Hands-on Lab - AppSphere16
 
From APM to Business Monitoring with AppDynamics Analytics
From APM to Business Monitoring with AppDynamics AnalyticsFrom APM to Business Monitoring with AppDynamics Analytics
From APM to Business Monitoring with AppDynamics Analytics
 
Manufacturing Webinar AMS
Manufacturing Webinar AMSManufacturing Webinar AMS
Manufacturing Webinar AMS
 
How to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in SplunkHow to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in Splunk
 
Getting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-OnGetting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-On
 
Getting Additional Value from Logs and APM Data with AppDynamics Unified Anal...
Getting Additional Value from Logs and APM Data with AppDynamics Unified Anal...Getting Additional Value from Logs and APM Data with AppDynamics Unified Anal...
Getting Additional Value from Logs and APM Data with AppDynamics Unified Anal...
 
Under the Hood: Monitoring Azure and .NET - AppSphere16
Under the Hood: Monitoring Azure and .NET - AppSphere16Under the Hood: Monitoring Azure and .NET - AppSphere16
Under the Hood: Monitoring Azure and .NET - AppSphere16
 
AppDynamics and ME Bank: Use Cases for a Modern Digital Bank - AppSphere16
AppDynamics and ME Bank: Use Cases for a Modern Digital Bank - AppSphere16AppDynamics and ME Bank: Use Cases for a Modern Digital Bank - AppSphere16
AppDynamics and ME Bank: Use Cases for a Modern Digital Bank - AppSphere16
 
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
 
Best Practices and Advanced Insights on Browser RUM Users - AppSphere16
Best Practices and Advanced Insights on Browser RUM Users - AppSphere16Best Practices and Advanced Insights on Browser RUM Users - AppSphere16
Best Practices and Advanced Insights on Browser RUM Users - AppSphere16
 
Keynote Presentation
Keynote PresentationKeynote Presentation
Keynote Presentation
 
Advanced Agent Deployment Strategies in Large Scale, Complex Environments - A...
Advanced Agent Deployment Strategies in Large Scale, Complex Environments - A...Advanced Agent Deployment Strategies in Large Scale, Complex Environments - A...
Advanced Agent Deployment Strategies in Large Scale, Complex Environments - A...
 
Introduction to appDynamics
Introduction to appDynamics Introduction to appDynamics
Introduction to appDynamics
 

Similar to Splunk in Yoox: Security and Compliance

Webinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise SecurityWebinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise Security
Georg Knon
 
PPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALPPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINAL
Risi Avila
 
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk
 
A Risk Based Approach to Security Detection and Investigation by Kelby Shelton
A Risk Based Approach to Security Detection and Investigation by Kelby SheltonA Risk Based Approach to Security Detection and Investigation by Kelby Shelton
A Risk Based Approach to Security Detection and Investigation by Kelby Shelton
John Billings CISSP
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk
 
SplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral Analytics
Splunk
 
SplunkSummit 2015 - Security Ninjitsu
SplunkSummit 2015 - Security NinjitsuSplunkSummit 2015 - Security Ninjitsu
SplunkSummit 2015 - Security Ninjitsu
Splunk
 
Splunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident InvestigationSplunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident Investigation
Georg Knon
 
Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014
Finjan Holdings, Inc.
 
Splunk conf2014 - Getting Deeper Insights into your Virtualization and Storag...
Splunk conf2014 - Getting Deeper Insights into your Virtualization and Storag...Splunk conf2014 - Getting Deeper Insights into your Virtualization and Storag...
Splunk conf2014 - Getting Deeper Insights into your Virtualization and Storag...
Splunk
 
ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...
ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...
ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...
ReidCarlberg
 
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBASplunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBA
Splunk
 
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
apidays
 
Mission possible splunk+paloaltonetworks_6_2015
Mission possible splunk+paloaltonetworks_6_2015Mission possible splunk+paloaltonetworks_6_2015
Mission possible splunk+paloaltonetworks_6_2015
Splunk
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Erin Sweeney
 
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk EMEA Webinar: Scoping infections and disrupting breachesSplunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk
 
Operational Security
Operational SecurityOperational Security
Operational Security
Splunk
 
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
Splunk EMEA
 
SplunkLive! Milano 2016 - customer presentation - Yoox - Net a porter
SplunkLive! Milano 2016 - customer presentation - Yoox - Net a porterSplunkLive! Milano 2016 - customer presentation - Yoox - Net a porter
SplunkLive! Milano 2016 - customer presentation - Yoox - Net a porter
Splunk
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
InvestorSymantec
 

Similar to Splunk in Yoox: Security and Compliance (20)

Webinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise SecurityWebinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise Security
 
PPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALPPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINAL
 
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat Defense
 
A Risk Based Approach to Security Detection and Investigation by Kelby Shelton
A Risk Based Approach to Security Detection and Investigation by Kelby SheltonA Risk Based Approach to Security Detection and Investigation by Kelby Shelton
A Risk Based Approach to Security Detection and Investigation by Kelby Shelton
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
 
SplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral Analytics
 
SplunkSummit 2015 - Security Ninjitsu
SplunkSummit 2015 - Security NinjitsuSplunkSummit 2015 - Security Ninjitsu
SplunkSummit 2015 - Security Ninjitsu
 
Splunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident InvestigationSplunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident Investigation
 
Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014
 
Splunk conf2014 - Getting Deeper Insights into your Virtualization and Storag...
Splunk conf2014 - Getting Deeper Insights into your Virtualization and Storag...Splunk conf2014 - Getting Deeper Insights into your Virtualization and Storag...
Splunk conf2014 - Getting Deeper Insights into your Virtualization and Storag...
 
ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...
ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...
ThingsExpo: Enterprise Internet of Things (IoT) Patterns, Opportunities and P...
 
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBASplunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBA
 
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
 
Mission possible splunk+paloaltonetworks_6_2015
Mission possible splunk+paloaltonetworks_6_2015Mission possible splunk+paloaltonetworks_6_2015
Mission possible splunk+paloaltonetworks_6_2015
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk EMEA Webinar: Scoping infections and disrupting breachesSplunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk EMEA Webinar: Scoping infections and disrupting breaches
 
Operational Security
Operational SecurityOperational Security
Operational Security
 
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
 
SplunkLive! Milano 2016 - customer presentation - Yoox - Net a porter
SplunkLive! Milano 2016 - customer presentation - Yoox - Net a porterSplunkLive! Milano 2016 - customer presentation - Yoox - Net a porter
SplunkLive! Milano 2016 - customer presentation - Yoox - Net a porter
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
 

More from Timur Bagirov

презентация Clever data конференция splunk октябрь 2016 v2
презентация Clever data конференция splunk октябрь 2016 v2презентация Clever data конференция splunk октябрь 2016 v2
презентация Clever data конференция splunk октябрь 2016 v2
Timur Bagirov
 
Splunk for NAC in Yandex
Splunk for NAC in YandexSplunk for NAC in Yandex
Splunk for NAC in Yandex
Timur Bagirov
 
Tinkoff splunk 2016
Tinkoff splunk 2016Tinkoff splunk 2016
Tinkoff splunk 2016
Timur Bagirov
 
Splunk sberbank cib
Splunk sberbank cibSplunk sberbank cib
Splunk sberbank cib
Timur Bagirov
 
11 nov splunk_conf_мониторинг доступности услуг в мегафон
11 nov splunk_conf_мониторинг доступности услуг в мегафон11 nov splunk_conf_мониторинг доступности услуг в мегафон
11 nov splunk_conf_мониторинг доступности услуг в мегафон
Timur Bagirov
 
Splunk in Otto: Business Analytics
Splunk in Otto: Business Analytics Splunk in Otto: Business Analytics
Splunk in Otto: Business Analytics
Timur Bagirov
 
Splunk in Staples: IT Operations
Splunk in Staples: IT OperationsSplunk in Staples: IT Operations
Splunk in Staples: IT Operations
Timur Bagirov
 
Splunk in John Lewis: Business Analytics
Splunk in John Lewis: Business AnalyticsSplunk in John Lewis: Business Analytics
Splunk in John Lewis: Business Analytics
Timur Bagirov
 
Splunk Check Point технологические партнеры
Splunk Check Point технологические партнерыSplunk Check Point технологические партнеры
Splunk Check Point технологические партнеры
Timur Bagirov
 
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Доступная безопасность: смесь инструментов с данными. Советы архитектора OracleДоступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Timur Bagirov
 
Немного о Splunk в Yota
Немного о Splunk в YotaНемного о Splunk в Yota
Немного о Splunk в Yota
Timur Bagirov
 
Splunk live мегафон 2015 - v4
Splunk live мегафон 2015 - v4Splunk live мегафон 2015 - v4
Splunk live мегафон 2015 - v4
Timur Bagirov
 
Splunk company overview april. 2015
Splunk company overview   april. 2015Splunk company overview   april. 2015
Splunk company overview april. 2015
Timur Bagirov
 

More from Timur Bagirov (13)

презентация Clever data конференция splunk октябрь 2016 v2
презентация Clever data конференция splunk октябрь 2016 v2презентация Clever data конференция splunk октябрь 2016 v2
презентация Clever data конференция splunk октябрь 2016 v2
 
Splunk for NAC in Yandex
Splunk for NAC in YandexSplunk for NAC in Yandex
Splunk for NAC in Yandex
 
Tinkoff splunk 2016
Tinkoff splunk 2016Tinkoff splunk 2016
Tinkoff splunk 2016
 
Splunk sberbank cib
Splunk sberbank cibSplunk sberbank cib
Splunk sberbank cib
 
11 nov splunk_conf_мониторинг доступности услуг в мегафон
11 nov splunk_conf_мониторинг доступности услуг в мегафон11 nov splunk_conf_мониторинг доступности услуг в мегафон
11 nov splunk_conf_мониторинг доступности услуг в мегафон
 
Splunk in Otto: Business Analytics
Splunk in Otto: Business Analytics Splunk in Otto: Business Analytics
Splunk in Otto: Business Analytics
 
Splunk in Staples: IT Operations
Splunk in Staples: IT OperationsSplunk in Staples: IT Operations
Splunk in Staples: IT Operations
 
Splunk in John Lewis: Business Analytics
Splunk in John Lewis: Business AnalyticsSplunk in John Lewis: Business Analytics
Splunk in John Lewis: Business Analytics
 
Splunk Check Point технологические партнеры
Splunk Check Point технологические партнерыSplunk Check Point технологические партнеры
Splunk Check Point технологические партнеры
 
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Доступная безопасность: смесь инструментов с данными. Советы архитектора OracleДоступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
Доступная безопасность: смесь инструментов с данными. Советы архитектора Oracle
 
Немного о Splunk в Yota
Немного о Splunk в YotaНемного о Splunk в Yota
Немного о Splunk в Yota
 
Splunk live мегафон 2015 - v4
Splunk live мегафон 2015 - v4Splunk live мегафон 2015 - v4
Splunk live мегафон 2015 - v4
 
Splunk company overview april. 2015
Splunk company overview   april. 2015Splunk company overview   april. 2015
Splunk company overview april. 2015
 

Recently uploaded

Charles McClure | Retail Scavenger Hunt |
Charles McClure | Retail Scavenger Hunt |Charles McClure | Retail Scavenger Hunt |
Charles McClure | Retail Scavenger Hunt |
YOUNGDOE2
 
原版复制澳洲莫纳什大学毕业证硕士学历原版一模一样
原版复制澳洲莫纳什大学毕业证硕士学历原版一模一样原版复制澳洲莫纳什大学毕业证硕士学历原版一模一样
原版复制澳洲莫纳什大学毕业证硕士学历原版一模一样
w6zyq7uj
 
Introducing Bliss Point by Tinuiti Webinar
Introducing Bliss Point by Tinuiti WebinarIntroducing Bliss Point by Tinuiti Webinar
Introducing Bliss Point by Tinuiti Webinar
Tinuiti
 
Supermarket Floral Ad Roundup- Week 23 2024.pdf
Supermarket Floral Ad Roundup- Week 23  2024.pdfSupermarket Floral Ad Roundup- Week 23  2024.pdf
Supermarket Floral Ad Roundup- Week 23 2024.pdf
KarliNelson4
 
Supermarket Floral Ad Roundup- Week 22 2024.pdf
Supermarket Floral Ad Roundup- Week 22 2024.pdfSupermarket Floral Ad Roundup- Week 22 2024.pdf
Supermarket Floral Ad Roundup- Week 22 2024.pdf
KarliNelson4
 
快速办理(BC毕业证书)波士顿学院毕业证PDF成绩单一模一样
快速办理(BC毕业证书)波士顿学院毕业证PDF成绩单一模一样快速办理(BC毕业证书)波士顿学院毕业证PDF成绩单一模一样
快速办理(BC毕业证书)波士顿学院毕业证PDF成绩单一模一样
aezncfe
 
怎么购买澳洲南十字星大学毕业证文凭毕业证原版一模一样
怎么购买澳洲南十字星大学毕业证文凭毕业证原版一模一样怎么购买澳洲南十字星大学毕业证文凭毕业证原版一模一样
怎么购买澳洲南十字星大学毕业证文凭毕业证原版一模一样
w6zyq7uj
 
Social Media is Eating Retail- The $Trillion Trend You Can't Ignore.pdf
Social Media is Eating Retail- The $Trillion Trend You Can't Ignore.pdfSocial Media is Eating Retail- The $Trillion Trend You Can't Ignore.pdf
Social Media is Eating Retail- The $Trillion Trend You Can't Ignore.pdf
Jasper Colin
 

Recently uploaded (8)

Charles McClure | Retail Scavenger Hunt |
Charles McClure | Retail Scavenger Hunt |Charles McClure | Retail Scavenger Hunt |
Charles McClure | Retail Scavenger Hunt |
 
原版复制澳洲莫纳什大学毕业证硕士学历原版一模一样
原版复制澳洲莫纳什大学毕业证硕士学历原版一模一样原版复制澳洲莫纳什大学毕业证硕士学历原版一模一样
原版复制澳洲莫纳什大学毕业证硕士学历原版一模一样
 
Introducing Bliss Point by Tinuiti Webinar
Introducing Bliss Point by Tinuiti WebinarIntroducing Bliss Point by Tinuiti Webinar
Introducing Bliss Point by Tinuiti Webinar
 
Supermarket Floral Ad Roundup- Week 23 2024.pdf
Supermarket Floral Ad Roundup- Week 23  2024.pdfSupermarket Floral Ad Roundup- Week 23  2024.pdf
Supermarket Floral Ad Roundup- Week 23 2024.pdf
 
Supermarket Floral Ad Roundup- Week 22 2024.pdf
Supermarket Floral Ad Roundup- Week 22 2024.pdfSupermarket Floral Ad Roundup- Week 22 2024.pdf
Supermarket Floral Ad Roundup- Week 22 2024.pdf
 
快速办理(BC毕业证书)波士顿学院毕业证PDF成绩单一模一样
快速办理(BC毕业证书)波士顿学院毕业证PDF成绩单一模一样快速办理(BC毕业证书)波士顿学院毕业证PDF成绩单一模一样
快速办理(BC毕业证书)波士顿学院毕业证PDF成绩单一模一样
 
怎么购买澳洲南十字星大学毕业证文凭毕业证原版一模一样
怎么购买澳洲南十字星大学毕业证文凭毕业证原版一模一样怎么购买澳洲南十字星大学毕业证文凭毕业证原版一模一样
怎么购买澳洲南十字星大学毕业证文凭毕业证原版一模一样
 
Social Media is Eating Retail- The $Trillion Trend You Can't Ignore.pdf
Social Media is Eating Retail- The $Trillion Trend You Can't Ignore.pdfSocial Media is Eating Retail- The $Trillion Trend You Can't Ignore.pdf
Social Media is Eating Retail- The $Trillion Trend You Can't Ignore.pdf
 

Splunk in Yoox: Security and Compliance

  • 1. Copyright  ©  2015  Splunk  Inc.   Gianluca  Gaias   Head  of  Informa@on  Security,   YOOX  Group   Building  an     Enterprise-­‐grade   Security  Intelligence   PlaIorm  at  Yoox.com   (Gain  the  Big  Picture)    
  • 2. Disclaimer   2   During  the  course  of  this  presenta@on,  we  may  make  forward  looking  statements  regarding  future   events  or  the  expected  performance  of  the  company.  We  cau@on  you  that  such  statements  reflect  our   current  expecta@ons  and  es@mates  based  on  factors  currently  known  to  us  and  that  actual  events  or   results  could  differ  materially.  For  important  factors  that  may  cause  actual  results  to  differ  from  those   contained  in  our  forward-­‐looking  statements,  please  review  our  filings  with  the  SEC.  The  forward-­‐ looking  statements  made  in  the  this  presenta@on  are  being  made  as  of  the  @me  and  date  of  its  live   presenta@on.  If  reviewed  aWer  its  live  presenta@on,  this  presenta@on  may  not  contain  current  or   accurate  informa@on.  We  do  not  assume  any  obliga@on  to  update  any  forward  looking  statements  we   may  make.       In  addi@on,  any  informa@on  about  our  roadmap  outlines  our  general  product  direc@on  and  is  subject  to   change  at  any  @me  without  no@ce.  It  is  for  informa@onal  purposes  only  and  shall  not,  be  incorporated   into  any  contract  or  other  commitment.  Splunk  undertakes  no  obliga@on  either  to  develop  the  features   or  func@onality  described  or  to  include  any  such  feature  or  func@onality  in  a  future  release.  
  • 3. Personal  Introduc@on   3   Gianluca  Gaias,  YOOX  Group       YOOX  Group  is  the  global  Internet  retailing  partner   for  leading  fashion  and  luxury  brands     Head  of  Informa@on  Security:     –  Applica@on  Security   –  Organiza@onal  Security   –  Compliance   –  Security  Monitoring  
  • 4. Key  Takeaways     4     From  a  technology  oriented  approach  to  an  info-­‐centric  approach     From  log  correla2on  to  pa3ern  recogni2on     From  a  passive/display  pla7orm  to  a  proac2ve/execu2ve  pla7orm     From  standard  dashboards  to  real-­‐2me  dynamic  dashboards     From  a  security  event  to  an  context-­‐aware  security  informa2on  
  • 5. Agenda     YOOX  Group:  business  and  challenges.     Security  evolu@on  overview     From  Tech  Oriented  approach  to  Informa@on  Oriented  approach   –  Deep  Inves@ga@on   –  Proac@ve  Dashboard:  IP  Blacklist     –  Real-­‐@me  Dynamic  Dashboard:  Aback  Map     Risk  Management  and  Pabern  Recogni@on   –  Use  Case:  Abackers  Ac@vity     Reconsidering  dashboard  design     Next  Steps     5  
  • 6. YOOX  Group     6     Global  reach  to  more  than  100  countries  worldwide     Five  logis@cs  centers  strategically  located,  guaranteeing  top  service  to  all  major  fashion   markets  (United  States,  Europe,  Japan,  China,  Hong  Kong)  
  • 7. YOOX  Group:  OS  &  Mul@-­‐Brand   7   §  The online destination for women dedicated entirely to in-season high-end shoes §  Exclusive shoe-related services and innovative editorial component §  Launched in 2012 §  Exclusive  official  online  flagship  stores  of  leading  fashion  and  luxury  brands   §  Long-­‐term  partnerships   MONO-­‐BRAND   §  The luxury online boutique with in-season assortment of high fashion and directional designers for men and women §  Dedicated mini-stores §  Launched in 2008 Online stores “Powered by YOOX Group” MULTI-­‐BRAND   §  The  world’s  leading  online  lifestyle  store  for   fashion,  design  and  art   §  Broad  offering  of  end-­‐of-­‐season  premium   apparel  and  accessories,  exclusive  collec@ons,   vintage,  home  &  design  and  artworks   §  Launched  in  2000     JVCo with Kering and  many  more  …
  • 8. YOOX  Group:  Challenges     Keep  the  trust     –  Data  Confiden@ality   –  Data  Integrity  and  Completeness   –  Data  Processing  Transparency     High  Availability  in  hos@le  enviroment       Gain  the  big  picture:   –  Challenge  and  Enabler   8   ü  Shareholders   ü  Customers   ü  Stakeholders  
  • 9. Security  Evolu@on  Overview   9   0   1   2   3   4   5   6   7   8   9   Data  Leakage  Preven@on   Informa@on  Security   Compliance   IPS  &  Anomaly  Detec@on   Administra@ve  Access   Control   PCI-­‐DSS  Compliance   Sites  Vulnerability  Checks   Code  Review   Logical  Access   Governance   Security  Intelligence   PlaIorm   Online  Brand  Protec@on   Privacy  Compliance   Informa@on  Process   Analysis   2011   2013   2015  
  • 10. Security  Evolu@on  –  Tech  vs  Info     Technology  Oriented:   –  Info  confined  to  technology   –  Par@al  iden@ty  defini@on   –  No  covered  gaps     Informa@on  Oriented  -­‐  Splunk:   –  Enrichement  of  tech  logs   –  Event  correla@on   –  Clear  iden@ty  defini@on   10  
  • 11. From  Tech  to  Info     “From  a  technology  oriented  approach  to  an  info-­‐centric  approach.”   11  
  • 14. Advanced  Dashboard:  IP  Blacklist   14   •  Proac@ve  Dashboard   •  One-­‐click  blacklist  on   Akamai  WAF  through   Akamai  API  calls   •  Splunk  is  able  to  run  a   command  on  input  source       Drilldown   «From  a  passive/display  pla7orm  to  a     proac2ve/execu2ve  pla7orm»  
  • 15. WAF  Ac@vity  Representa@on:  Standard  Dashboard   15   •  Sta@s@cal  evidences  by:   –  Source  IP   –  Aback  type   –  WAF  Ac@on   •  Event  distribu@on  over  the  @me   •  Spike  visibility  depends  from  the  scale   •  Is  not  evident:   –  Aback  frequency   –  Rela@on  between  Source  IP,  Aback  type   and  WAF  ac@on   Pros   Cons  
  • 16. “From  standard  dashboards  to  real-­‐2me  dynamic  dashboards”   Real-­‐@me  Dynamic  Dashboard:  Aback  Map   16  
  • 17. Security  Evolu@on  –  Risk  Mgmt  &  Pabern  Rec.     Risk  Management:   –  Correla@on  of  Tech  Elements  and  Business  Elements   –  Support  to  quan@ta@ve  risk  analysis   –  Assigning  Risk  value  to  alerts       Pabern  Recogni@on:   –  Different  levels  of  correla@on   –  Pabern  as  result  of  several  high-­‐level  events  from  different  systems  by  iden@ty   –  Knowledge  from  historical  incidents  and  analysts  experience   –  Goal:  detect  user  behavior  and  recurrent  aback  paberns   17  
  • 18. Pabern  Recogni@on     Single  security  events  may  be  part  of  a  more  complex  ac@on.   18   Correla@on   Brute  Force   Exce.  Out  Data   High  Conn.   Correla@on   Level  1   Correla@on   Level  2   Correla@on   Level  n   Data  Exfiltra@on   «From  log  correla2on  to  pa3ern  recogni2on»   Sequence   Introduced  by  high  level  analyst   Pabern  Consolida@on   Analyst  
  • 19. Risk  Management     Usually  single  security  event  has  a  sta@c  risk     We  need  risk  value  based  on  content  and  other  events  correlated   19   “From  a  security  event  to   an  context-­‐aware  security   informa2on”   Risk   Sta@c   Assign.   (Lookup)   N  level   correla@on   Content   Eval  
  • 20. Use  Case:  Abackers  Ac@vity     Detect  sequence  of  relevant  event  by  iden:ty       Ac@vity  Score:  ver@cal  axes,  max  of  the  same  alert  type     Ac@vity  Frequency:  ball  diameter     20   Pa=ern  Recogni:on   Risk  Value  
  • 21. Reconsidering  Dashboard  Design   21   Na@ve  Log  Collec@on   Splunk  Log  Collec@on   Standard  Dashboards   Advanced   Dashboards   Pabern   Recogni@on   Splunk   Engeneers   NOC   SOC   Security  Analyst   Head  of  Security   Knowledge   Data  Meaning   The  Big  Picture  
  • 22. Key  Takeaways     22     From  a  technology  oriented  approach  to  an  info-­‐centric  approach.     From  log  correla2on  to  pa3ern  recogni2on.     From  a  passive/display  pla7orm  to  a  proac2ve/execu2ve  pla7orm.     From  standard  dashboards  to  real-­‐2me  dynamic  dashboards.     From  a  security  event  to  an  context-­‐aware  security  informa2on.  
  • 23. Next  Steps   23   Extend  the  scope  (channels,  data,  devices)   Deep  into  the  noise