SlideShare a Scribd company logo
1 of 31
Download to read offline
Session ID:
Session Classification:
Mark Seward
Splunk Inc.
SPO2-T17
Intermediate
Big Data and Security:
At the Edge of Prediction
Fred Wilmot
Splunk Inc.
TheWay Cyber AdversariesThink
Where is the most
important and
valuable data?
What are the
typical security
defenses?
What structural
information silos that
exist for the security
team?
Who in the organization has
access to the most valuable
data and credentials I can
steal?
What’s the typical
patch cycle for
applications and
operating systems?
How does the IT
team prioritize
vulnerabilities?
Are ‘normal’ IT service
user activities routinely
monitored and
correlated?
Security has out grown the traditional SIEM
“Normal” user and machine
generated data – credentialed
activities – ‘unknown threats’
are behavior based – require
analytics
SIEM
Security Relevant Data
(IT infrastructure logs / Physical
Security / Communication
systems logs / Application data
/ non-traditional data sources)
‘Known’ events as seen by
current security architecture –
vendor supplied – hampered by
lack of context
Required - A Broader Look at Security Data
4
Increasing Threat Complexity
Cloud
Security
Data
Mobile
Security
Data
Industrial Control Systems data
(SCADA) “The Internet of Things”
IncreasingDataAmounts
Traditional
IT Security
Data
The ‘Data Driven’
Business
New Architecture Required for Security
Traditional SIEM Indexed data store
VS.
No contest / No Limits
Vendor Seduction:TheWay Some Security FolksThink
“I hope my AV, IPS,
Firewall, (name
your technology)
vendor catches
these guys.”
“I have 300 rules
on my SIEM. One
of them will catch
the attacker.”
Attackers know that if you have a static correlation engine, you are likely
trusting it, and because often "No news is good news"
Machine Data Security Intelligence for Business
Anomaly /
Unknown Threat
Detection
Proactive Monitoring
for Known Threats
Failure Analysis and
Forensics
Compliance
Indexed data store
with text and
statistical analysis
commands
SaaS
IaaS
7
Business Critical Infrastructure Protection
► Security risks often reviewed
in isolation from each other
and operational risks
► Encourages risk mitigation
at higher levels within an
organization (people and
process)
WhyTake a Platform Approach?
Risk
Visibility
People
Processes
Technology
Business operations and security
data contains information about…
Enabling IT Risk Scenarios
Business
Analytics
App
Mgmt
Third Party
Services
Data
IT
Ops
Web
Analytics
Security Relevant Data
Confidentiality / Integrity / Availability
CSO / CIO / CEO
Views
Applying IT Risk
Scenarios
‘Finding
Abnormal
Behaviors’
Big data indexing solution
► More data is needed to detect stealthy attacks
► To truly address security business risk we need to combine IT
data with less traditional data sources
► The traditional SIEM is not built to handle the volume,
velocity and variety of data needed for business security
risks
► The bad guys can guess what our infrastructure looks like,
how IT Operations and Security function, and deduce who
has access to the data they want
► Attackers use creativity – we use vendor solutions
What we know – so far
Based on our scenarios and
what we know about attacks
and attackers,what can we
predict?
What we hear about Predictive Analytics…
“Vendor X says they’ll be
able to predict what’s going
to happen in my IT
architecture before it
happens.”
“The vendor says it will stop
bad things before they
happen based on super
secret al-go-rhythms.”
This sh@# is expensive!!
Predict: to declare or
indicate in advance;
especially: foretell on the
basis of observation,
experience, or scientific
reason
Analytics: the method
of logical analysis+
Predictive Analytics: To foretell and/or declare in advance
based on observation, experience, or reason using a
method of logical analysis
13
What is Predictive Analytics?
► Predictive Analytics IS only as good as your experience,
observations and method(s) of logical analysis
► Predictive Analytics IS NOT going to help you catch bad guys
that work outside your experience, observations and
methods of logical analysis
► Predictive Analytics IS NOT having a machine or anyone else
‘think’for you
► Predictive Analytics IS using your, or your company’s
collective observations and experience plus one or more
methods of logical analysis to identify patterns in data that
can be used to make predictions about future outcomes.
► Predictive Analytics IS a starting point – not an ending point
for investigation
What is (and is not) Predictive Analytics
Where do we get knowledge about how attackers may behave?
• Our peers /
contacts / events
• Trade journals
• Security threat
reports
Second hand information
• Previous data breach investigation
• ‘Inside knowledge’ of security
procedure and process weaknesses
• ‘Inside knowledge” of technology
weaknesses
• ‘Inside knowledge’ of where our most
valuable data is
• ‘Inside knowledge’ of business
processes
• Evidence of user behavior(s)
First hand information
The need to shift our focus
DEMO 20 min
18
► What does the business care
about?
► What could cause loss of service
or financial harm?
► Performance Degradation
► Unplanned outages (security
related)
► Intellectual property access
► Data theft
A Process for Using Big Data for Security: Identify the Business Issue
19
A Process for Using Big Data for Security: Constructa Hypothesis
20
► How could someone gain access
to data that should be kept
private?
► What could cause a mass system
outage does the business care
about?
► What could cause performance
degradation resulting in an
increase in customers
dissatisfaction?
A Process for Using Big Data for Security: It’s about the Data
21
► Where might our problem be in
evidence?
► For data theft start with
unauthorized access access
issues…
► Facility access data, VPN, AD,
Wireless, Applications, others…
► Beg, Borrow, SME from system
owners
A Process for Using Big Data for Security: Data Analysis
► For data theft start with what’s
normal and what’s not (create a
statistical model)
► How do we‘normally’behave?
► What patterns would we see to
identify outliers?
► Patterns based on ToD, Length of
time, who, organizational role, IP
geo-lookups, the order in which
things happen, how often a
thing normally happens, etc.
A Process for Using Big Data for Security: Interpretand Identify
23
► What are the mitigating factors?
► Does the end of the quarter cause
increased access to financial data?
► Does our statistical model need to
change due to network
architecture changes, employee
growth, etc?
► Can we gather vacation
information to know when it is
appropriate for HPA users to
access data from foreign soil.
► What are the changes in attack
patterns?
Short form - Example
The Steps The Response
Business Issue Service degradation causes monetary damage and
customer satisfaction issues.
Construct one of more hypothesis
(team creativity required)
Unwanted bots can degrade service and steal
content.
Gather data sources and expertise What combinations of data would be considered
definitive evidence? What might be the first signs
of trouble? List all data in which this might be
reflected.
Determine the analysis to be
performed
Determine the types of data searches appropriate
and automation requirements
Interpret the results Do the results represent false positives of false
positives or false negatives? Are there good bots
and bad bots?
Copyright © 2012, Splunk Inc.
Looking Beyond IT for Business Risk
HVAC data
Personnel Data
Industrial Control System
Data
Facility Security Data
Manufacturing
Shipping Data
(when/who loaded the
truck)
Parts/Ingredients (RFID)
Data
Raw Materials Data
Distribution Monitoring
Data (GPS)
Point of Sale Data Traditional IT Data
What manufacturing questions could you ask?
Who is accessing company
data from outside the
company but is sitting at their
desk?
Is the product quality
compromised due to an
increase in ambient
temperature in the plant?
What pattern of user
activity did we see
before they attacked
the website?
Who is accessing
company data from
outside the company but
is sitting at their desk?
Are the large file
exchanges between
these two employees
normal?
What’s the real-time ongoing
drop off rate in sales after a
specific drug promotion ends?
Are there employees that
surf to the same website
at exactly the same time
every day?
What’s the trend of
sentiment on Twitter for
the new product launch?
Looking Beyond IT for Business Risk
HVAC data
Personnel Data
Business associate
access and transmission
data
Facility Security Data
Healthcare
Call Data RecordsEquipment (RFID) Patient Data
Equipment (RFID) Social Media DataTraditional IT Data
What Healthcare Questions CouldYou Ask of Data?
Which shift is more
efficient at delivering
services to the patient?
Is there drug diversion
happening in the
hospital?
Which doctors have the
highest re-admission
rates?
Are there employees
Tweeting about specific
patients?
Are we billing for
equipment that wasn’t
used in patient care?
Are their viewings of
patient data by
caregivers not on shift?
Do phone call follow ups
lead to lower re-
admittance rates?
What’s the public
sentiment about doctors
and the hospital on
Twitter?
1. Confidentiality Integrity and Availability is a holistic view of business security
and risk mitigation growing beyond traditional IT data sources
2. Security is being redefined: Monitoring & mitigating threats that compromise
business reputation, service delivery, confidential data or result in loss of
intellectual property
3. Security folks will want / need more data – not less – for accurate root cause
analysis
4. Complexity of threats will continue to grow and cross from IT to less traditional
data / devices / sources
5. A single investigation will include data from all parts of the business – beyond
IT data
6. Using statistical analysis for Base-lining and understanding outliers is the way
to detect advanced threats
Why Big Data and Analytics are the Futureof Security
NIST Predicts: Sensing big data trend
“The number, volume, and variety of computer
security logs have increased greatly, which has
created the need for computer security log
management—the process for generating,
transmitting, storing, analyzing, and disposing of
computer security log data.”
NIST 800-92 Guide to Computer
Security Log Management 1996
Thank You
Questions
fwilmot@splunk.com
mseward@splunk.com
www.splunk.com

More Related Content

What's hot

Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wpCMR WORLD TECH
 
Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsResilient Systems
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsHappiest Minds Technologies
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDPriyanka Aash
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityEMC
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...Forcepoint LLC
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attackAndreanne Clarke
 
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingHow to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingTony Martin-Vegue
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral AnalyticsInterset
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown JewelsIBM Security
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?IBM Security
 
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management SolutionTop 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management SolutionEnterprise Management Associates
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
rp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responserp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responseMaciej Buczkowski
 
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsVirtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsSplunk
 

What's hot (20)

Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data Incidents
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven Security
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
 
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingHow to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
 
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management SolutionTop 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
rp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responserp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-response
 
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsVirtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
 

Viewers also liked

Escala descritiva para identificação da podridão da base do estipe em pupunheira
Escala descritiva para identificação da podridão da base do estipe em pupunheiraEscala descritiva para identificação da podridão da base do estipe em pupunheira
Escala descritiva para identificação da podridão da base do estipe em pupunheiraRural Pecuária
 
Capsule 21 octobre 2013
Capsule 21 octobre 2013Capsule 21 octobre 2013
Capsule 21 octobre 2013barbarademers
 
Taller de Aproximación a la Usabilidad: definición de Usuarios, Tareas y Cont...
Taller de Aproximación a la Usabilidad: definición de Usuarios, Tareas y Cont...Taller de Aproximación a la Usabilidad: definición de Usuarios, Tareas y Cont...
Taller de Aproximación a la Usabilidad: definición de Usuarios, Tareas y Cont...Mario A Moreno Rocha
 

Viewers also liked (7)

Spo2 w22
Spo2 w22Spo2 w22
Spo2 w22
 
Escala descritiva para identificação da podridão da base do estipe em pupunheira
Escala descritiva para identificação da podridão da base do estipe em pupunheiraEscala descritiva para identificação da podridão da base do estipe em pupunheira
Escala descritiva para identificação da podridão da base do estipe em pupunheira
 
Stu r32 b
Stu r32 bStu r32 b
Stu r32 b
 
Modelo de Emprendimiento en red MER
Modelo de Emprendimiento en red MER Modelo de Emprendimiento en red MER
Modelo de Emprendimiento en red MER
 
Capsule 21 octobre 2013
Capsule 21 octobre 2013Capsule 21 octobre 2013
Capsule 21 octobre 2013
 
Monográfico
MonográficoMonográfico
Monográfico
 
Taller de Aproximación a la Usabilidad: definición de Usuarios, Tareas y Cont...
Taller de Aproximación a la Usabilidad: definición de Usuarios, Tareas y Cont...Taller de Aproximación a la Usabilidad: definición de Usuarios, Tareas y Cont...
Taller de Aproximación a la Usabilidad: definición de Usuarios, Tareas y Cont...
 

Similar to Spo2 t17

Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage DetectionIJERA Editor
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael Priyanka Aash
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Satyanandan Atyam
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Ulf Mattsson
 
Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Universidad Cenfotec
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?PECB
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 

Similar to Spo2 t17 (20)

Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 

More from SelectedPresentations

Длительное архивное хранение ЭД: правовые аспекты и технологические решения
Длительное архивное хранение ЭД: правовые аспекты и технологические решенияДлительное архивное хранение ЭД: правовые аспекты и технологические решения
Длительное архивное хранение ЭД: правовые аспекты и технологические решенияSelectedPresentations
 
Трансграничное пространство доверия. Доверенная третья сторона.
Трансграничное пространство доверия. Доверенная третья сторона.Трансграничное пространство доверия. Доверенная третья сторона.
Трансграничное пространство доверия. Доверенная третья сторона.SelectedPresentations
 
Варианты реализации атак через мобильные устройства
Варианты реализации атак через мобильные устройстваВарианты реализации атак через мобильные устройства
Варианты реализации атак через мобильные устройстваSelectedPresentations
 
Новые технологические возможности и безопасность мобильных решений
Новые технологические возможности и безопасность мобильных решенийНовые технологические возможности и безопасность мобильных решений
Новые технологические возможности и безопасность мобильных решенийSelectedPresentations
 
Управление безопасностью мобильных устройств
Управление безопасностью мобильных устройствУправление безопасностью мобильных устройств
Управление безопасностью мобильных устройствSelectedPresentations
 
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...SelectedPresentations
 
Кадровое агентство отрасли информационной безопасности
Кадровое агентство отрасли информационной безопасностиКадровое агентство отрасли информационной безопасности
Кадровое агентство отрасли информационной безопасностиSelectedPresentations
 
Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности и...Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности и...SelectedPresentations
 
Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по безопасности а...Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по безопасности а...SelectedPresentations
 
Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по технической за...Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по технической за...SelectedPresentations
 
Основное содержание профессионального стандарта «Специалист по безопасности т...
Основное содержание профессионального стандарта «Специалист по безопасности т...Основное содержание профессионального стандарта «Специалист по безопасности т...
Основное содержание профессионального стандарта «Специалист по безопасности т...SelectedPresentations
 
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...SelectedPresentations
 
Запись активности пользователей с интеллектуальным анализом данных
Запись активности пользователей с интеллектуальным анализом данныхЗапись активности пользователей с интеллектуальным анализом данных
Запись активности пользователей с интеллектуальным анализом данныхSelectedPresentations
 
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...SelectedPresentations
 
Обеспечение защиты информации на стадиях жизненного цикла ИС
Обеспечение защиты информации на стадиях жизненного цикла ИСОбеспечение защиты информации на стадиях жизненного цикла ИС
Обеспечение защиты информации на стадиях жизненного цикла ИСSelectedPresentations
 
Документ, как средство защиты: ОРД как основа обеспечения ИБ
Документ, как средство защиты: ОРД как основа обеспечения ИБДокумент, как средство защиты: ОРД как основа обеспечения ИБ
Документ, как средство защиты: ОРД как основа обеспечения ИБSelectedPresentations
 
Чего не хватает в современных ids для защиты банковских приложений
Чего не хватает в современных ids для защиты банковских приложенийЧего не хватает в современных ids для защиты банковских приложений
Чего не хватает в современных ids для защиты банковских приложенийSelectedPresentations
 
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...SelectedPresentations
 
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...SelectedPresentations
 
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
Об угрозах информационной безопасности, актуальных для разработчика СЗИОб угрозах информационной безопасности, актуальных для разработчика СЗИ
Об угрозах информационной безопасности, актуальных для разработчика СЗИSelectedPresentations
 

More from SelectedPresentations (20)

Длительное архивное хранение ЭД: правовые аспекты и технологические решения
Длительное архивное хранение ЭД: правовые аспекты и технологические решенияДлительное архивное хранение ЭД: правовые аспекты и технологические решения
Длительное архивное хранение ЭД: правовые аспекты и технологические решения
 
Трансграничное пространство доверия. Доверенная третья сторона.
Трансграничное пространство доверия. Доверенная третья сторона.Трансграничное пространство доверия. Доверенная третья сторона.
Трансграничное пространство доверия. Доверенная третья сторона.
 
Варианты реализации атак через мобильные устройства
Варианты реализации атак через мобильные устройстваВарианты реализации атак через мобильные устройства
Варианты реализации атак через мобильные устройства
 
Новые технологические возможности и безопасность мобильных решений
Новые технологические возможности и безопасность мобильных решенийНовые технологические возможности и безопасность мобильных решений
Новые технологические возможности и безопасность мобильных решений
 
Управление безопасностью мобильных устройств
Управление безопасностью мобильных устройствУправление безопасностью мобильных устройств
Управление безопасностью мобильных устройств
 
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
 
Кадровое агентство отрасли информационной безопасности
Кадровое агентство отрасли информационной безопасностиКадровое агентство отрасли информационной безопасности
Кадровое агентство отрасли информационной безопасности
 
Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности и...Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности и...
 
Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по безопасности а...Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по безопасности а...
 
Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по технической за...Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по технической за...
 
Основное содержание профессионального стандарта «Специалист по безопасности т...
Основное содержание профессионального стандарта «Специалист по безопасности т...Основное содержание профессионального стандарта «Специалист по безопасности т...
Основное содержание профессионального стандарта «Специалист по безопасности т...
 
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
 
Запись активности пользователей с интеллектуальным анализом данных
Запись активности пользователей с интеллектуальным анализом данныхЗапись активности пользователей с интеллектуальным анализом данных
Запись активности пользователей с интеллектуальным анализом данных
 
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
 
Обеспечение защиты информации на стадиях жизненного цикла ИС
Обеспечение защиты информации на стадиях жизненного цикла ИСОбеспечение защиты информации на стадиях жизненного цикла ИС
Обеспечение защиты информации на стадиях жизненного цикла ИС
 
Документ, как средство защиты: ОРД как основа обеспечения ИБ
Документ, как средство защиты: ОРД как основа обеспечения ИБДокумент, как средство защиты: ОРД как основа обеспечения ИБ
Документ, как средство защиты: ОРД как основа обеспечения ИБ
 
Чего не хватает в современных ids для защиты банковских приложений
Чего не хватает в современных ids для защиты банковских приложенийЧего не хватает в современных ids для защиты банковских приложений
Чего не хватает в современных ids для защиты банковских приложений
 
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
 
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
 
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
Об угрозах информационной безопасности, актуальных для разработчика СЗИОб угрозах информационной безопасности, актуальных для разработчика СЗИ
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
 

Spo2 t17

  • 1. Session ID: Session Classification: Mark Seward Splunk Inc. SPO2-T17 Intermediate Big Data and Security: At the Edge of Prediction Fred Wilmot Splunk Inc.
  • 2. TheWay Cyber AdversariesThink Where is the most important and valuable data? What are the typical security defenses? What structural information silos that exist for the security team? Who in the organization has access to the most valuable data and credentials I can steal? What’s the typical patch cycle for applications and operating systems? How does the IT team prioritize vulnerabilities? Are ‘normal’ IT service user activities routinely monitored and correlated?
  • 3. Security has out grown the traditional SIEM “Normal” user and machine generated data – credentialed activities – ‘unknown threats’ are behavior based – require analytics SIEM Security Relevant Data (IT infrastructure logs / Physical Security / Communication systems logs / Application data / non-traditional data sources) ‘Known’ events as seen by current security architecture – vendor supplied – hampered by lack of context
  • 4. Required - A Broader Look at Security Data 4 Increasing Threat Complexity Cloud Security Data Mobile Security Data Industrial Control Systems data (SCADA) “The Internet of Things” IncreasingDataAmounts Traditional IT Security Data The ‘Data Driven’ Business
  • 5. New Architecture Required for Security Traditional SIEM Indexed data store VS. No contest / No Limits
  • 6. Vendor Seduction:TheWay Some Security FolksThink “I hope my AV, IPS, Firewall, (name your technology) vendor catches these guys.” “I have 300 rules on my SIEM. One of them will catch the attacker.” Attackers know that if you have a static correlation engine, you are likely trusting it, and because often "No news is good news"
  • 7. Machine Data Security Intelligence for Business Anomaly / Unknown Threat Detection Proactive Monitoring for Known Threats Failure Analysis and Forensics Compliance Indexed data store with text and statistical analysis commands SaaS IaaS 7 Business Critical Infrastructure Protection
  • 8. ► Security risks often reviewed in isolation from each other and operational risks ► Encourages risk mitigation at higher levels within an organization (people and process) WhyTake a Platform Approach? Risk Visibility People Processes Technology Business operations and security data contains information about…
  • 9. Enabling IT Risk Scenarios Business Analytics App Mgmt Third Party Services Data IT Ops Web Analytics Security Relevant Data Confidentiality / Integrity / Availability CSO / CIO / CEO Views Applying IT Risk Scenarios ‘Finding Abnormal Behaviors’ Big data indexing solution
  • 10. ► More data is needed to detect stealthy attacks ► To truly address security business risk we need to combine IT data with less traditional data sources ► The traditional SIEM is not built to handle the volume, velocity and variety of data needed for business security risks ► The bad guys can guess what our infrastructure looks like, how IT Operations and Security function, and deduce who has access to the data they want ► Attackers use creativity – we use vendor solutions What we know – so far
  • 11. Based on our scenarios and what we know about attacks and attackers,what can we predict?
  • 12. What we hear about Predictive Analytics… “Vendor X says they’ll be able to predict what’s going to happen in my IT architecture before it happens.” “The vendor says it will stop bad things before they happen based on super secret al-go-rhythms.” This sh@# is expensive!!
  • 13. Predict: to declare or indicate in advance; especially: foretell on the basis of observation, experience, or scientific reason Analytics: the method of logical analysis+ Predictive Analytics: To foretell and/or declare in advance based on observation, experience, or reason using a method of logical analysis 13 What is Predictive Analytics?
  • 14. ► Predictive Analytics IS only as good as your experience, observations and method(s) of logical analysis ► Predictive Analytics IS NOT going to help you catch bad guys that work outside your experience, observations and methods of logical analysis ► Predictive Analytics IS NOT having a machine or anyone else ‘think’for you ► Predictive Analytics IS using your, or your company’s collective observations and experience plus one or more methods of logical analysis to identify patterns in data that can be used to make predictions about future outcomes. ► Predictive Analytics IS a starting point – not an ending point for investigation What is (and is not) Predictive Analytics
  • 15. Where do we get knowledge about how attackers may behave? • Our peers / contacts / events • Trade journals • Security threat reports Second hand information • Previous data breach investigation • ‘Inside knowledge’ of security procedure and process weaknesses • ‘Inside knowledge” of technology weaknesses • ‘Inside knowledge’ of where our most valuable data is • ‘Inside knowledge’ of business processes • Evidence of user behavior(s) First hand information The need to shift our focus
  • 16.
  • 18. 18
  • 19. ► What does the business care about? ► What could cause loss of service or financial harm? ► Performance Degradation ► Unplanned outages (security related) ► Intellectual property access ► Data theft A Process for Using Big Data for Security: Identify the Business Issue 19
  • 20. A Process for Using Big Data for Security: Constructa Hypothesis 20 ► How could someone gain access to data that should be kept private? ► What could cause a mass system outage does the business care about? ► What could cause performance degradation resulting in an increase in customers dissatisfaction?
  • 21. A Process for Using Big Data for Security: It’s about the Data 21 ► Where might our problem be in evidence? ► For data theft start with unauthorized access access issues… ► Facility access data, VPN, AD, Wireless, Applications, others… ► Beg, Borrow, SME from system owners
  • 22. A Process for Using Big Data for Security: Data Analysis ► For data theft start with what’s normal and what’s not (create a statistical model) ► How do we‘normally’behave? ► What patterns would we see to identify outliers? ► Patterns based on ToD, Length of time, who, organizational role, IP geo-lookups, the order in which things happen, how often a thing normally happens, etc.
  • 23. A Process for Using Big Data for Security: Interpretand Identify 23 ► What are the mitigating factors? ► Does the end of the quarter cause increased access to financial data? ► Does our statistical model need to change due to network architecture changes, employee growth, etc? ► Can we gather vacation information to know when it is appropriate for HPA users to access data from foreign soil. ► What are the changes in attack patterns?
  • 24. Short form - Example The Steps The Response Business Issue Service degradation causes monetary damage and customer satisfaction issues. Construct one of more hypothesis (team creativity required) Unwanted bots can degrade service and steal content. Gather data sources and expertise What combinations of data would be considered definitive evidence? What might be the first signs of trouble? List all data in which this might be reflected. Determine the analysis to be performed Determine the types of data searches appropriate and automation requirements Interpret the results Do the results represent false positives of false positives or false negatives? Are there good bots and bad bots? Copyright © 2012, Splunk Inc.
  • 25. Looking Beyond IT for Business Risk HVAC data Personnel Data Industrial Control System Data Facility Security Data Manufacturing Shipping Data (when/who loaded the truck) Parts/Ingredients (RFID) Data Raw Materials Data Distribution Monitoring Data (GPS) Point of Sale Data Traditional IT Data
  • 26. What manufacturing questions could you ask? Who is accessing company data from outside the company but is sitting at their desk? Is the product quality compromised due to an increase in ambient temperature in the plant? What pattern of user activity did we see before they attacked the website? Who is accessing company data from outside the company but is sitting at their desk? Are the large file exchanges between these two employees normal? What’s the real-time ongoing drop off rate in sales after a specific drug promotion ends? Are there employees that surf to the same website at exactly the same time every day? What’s the trend of sentiment on Twitter for the new product launch?
  • 27. Looking Beyond IT for Business Risk HVAC data Personnel Data Business associate access and transmission data Facility Security Data Healthcare Call Data RecordsEquipment (RFID) Patient Data Equipment (RFID) Social Media DataTraditional IT Data
  • 28. What Healthcare Questions CouldYou Ask of Data? Which shift is more efficient at delivering services to the patient? Is there drug diversion happening in the hospital? Which doctors have the highest re-admission rates? Are there employees Tweeting about specific patients? Are we billing for equipment that wasn’t used in patient care? Are their viewings of patient data by caregivers not on shift? Do phone call follow ups lead to lower re- admittance rates? What’s the public sentiment about doctors and the hospital on Twitter?
  • 29. 1. Confidentiality Integrity and Availability is a holistic view of business security and risk mitigation growing beyond traditional IT data sources 2. Security is being redefined: Monitoring & mitigating threats that compromise business reputation, service delivery, confidential data or result in loss of intellectual property 3. Security folks will want / need more data – not less – for accurate root cause analysis 4. Complexity of threats will continue to grow and cross from IT to less traditional data / devices / sources 5. A single investigation will include data from all parts of the business – beyond IT data 6. Using statistical analysis for Base-lining and understanding outliers is the way to detect advanced threats Why Big Data and Analytics are the Futureof Security
  • 30. NIST Predicts: Sensing big data trend “The number, volume, and variety of computer security logs have increased greatly, which has created the need for computer security log management—the process for generating, transmitting, storing, analyzing, and disposing of computer security log data.” NIST 800-92 Guide to Computer Security Log Management 1996