SlideShare a Scribd company logo
©LogRhythm 2021. All rights reserved. Company Confidential 1
Best Practices for Threat Detection and Response
Holistic Threat Detection using Hybrid Security Analytics with
Automated Incident Response
Vaughn Adams
Product Management
Andrew Pettet
Enterprise Sales Engineer
August 18, 2021
2
©LogRhythm 2021. All rights reserved. Company Confidential
©LogRhythm 2021. All rights reserved. Company Confidential 2
Observations From The Field
3
©LogRhythm 2021. All rights reserved. Company Confidential
©LogRhythm 2021. All rights reserved. Company Confidential 3
Targeted Detections With NDR/XDR
Industrial
Actor
Active Directory
Adversary Profile
IAM & Identity
Services
ICS Profiles
Cloud Config
Network
TAP/Span
Flow/VPC
Firewall
Action
Vulnerability Enterprise Data Center
Enterprise on prem
Remote Workforce
Enterprise Campus
Content Provider
Operating Systems
EDR/Endpoint
Native OS Telemetry
Container/Orchestration
Cloud Resources
IaaS (Azure/AWS/GCP)
SaaS
4
©LogRhythm 2021. All rights reserved. Company Confidential
©LogRhythm 2021. All rights reserved. Company Confidential 4
Typical Enterprise Deployment
Cloud Front-End:
• Public or private cloud
• Real-time & retrospective analytics
• Integrates with Active Directory
• Integrates with existing EDR, threat intel
and firewall solutions
• Proprietary threat detection algorithms
• Scale-out storage architecture
Collector/Analytics Node:
• Virtual machine or appliance
• SecOps metadata capture
• Streaming analytics & machine learning
Cloud and data center threat detection and response that uses mist computing for scale and performance
5
©LogRhythm 2021. All rights reserved. Company Confidential
©LogRhythm 2021. All rights reserved. Company Confidential 5
• Provides easy-to-understand
security narrative
• Automatically maps incidents
to framework in real-time
MITRE ATT&CK Engine
• Uses ML & rules-based detection
with threat intel to analyze
network, user, and host activity
• Automates detection and reduces
false positives by over 90%
Hybrid Security Analytics Mesh Architecture
• Delivers cloud scale and fast
time to value
• Minimizes operating costs and
maximizes scale with geo-
distributed collection &
analytics nodes
MistNet NDR is Smart, Simple, and Scalable
6
©LogRhythm 2021. All rights reserved. Company Confidential
©LogRhythm 2021. All rights reserved. Company Confidential 6
Hybrid Security Analytics with Automated Incident Response
ML & Rules-Based
Detection
Automated
Incident Response
Detect and respond to lateral movement, exfiltration, malware compromise, ransomware and other threats.
EDR Integrations
Firewall Logs Threat Intel Feeds
Network Taps Firewall Actions
7
©LogRhythm 2021. All rights reserved. Company Confidential
©LogRhythm 2021. All rights reserved. Company Confidential 7
Incident and Response
8
©LogRhythm 2021. All rights reserved. Company Confidential
©LogRhythm 2021. All rights reserved. Company Confidential 8
Actions
9
©LogRhythm 2021. All rights reserved. Company Confidential
©LogRhythm 2021. All rights reserved. Company Confidential 9
Actors
10
©LogRhythm 2021. All rights reserved. Company Confidential
©LogRhythm 2021. All rights reserved. Company Confidential 10
Host Scoring
11
©LogRhythm 2021. All rights reserved. Company Confidential
©LogRhythm 2021. All rights reserved. Company Confidential 11
MITRE ATT&CK Hunting
12
©LogRhythm 2021. All rights reserved. Company Confidential
©LogRhythm 2021. All rights reserved. Company Confidential 12
Delivery
MistNet Detections
Infection
• Initialinfectiondetected
• Suspiciousfilewasdownloaded
• Malwareinstalledandcallbacksto CNCserversare
seen
InitialCompromise
• Detecteda vectorusedto get initialfootholdinto
the network
• Executionof adversarycontrolled-codedetected
• Adversarytrying to havepersistentpresenceover
systemrestartsandotherfailures
• Attempt to evadedetectionoravoidother defenses
Recon&Discovery
• Networkhost/port/sweepscanisdetected
• Vulnerabilityscan isdetected
• Applicationscanisdetected
Weaponize
Recon
13
©LogRhythm 2021. All rights reserved. Company Confidential
©LogRhythm 2021. All rights reserved. Company Confidential 13
MistNet Detections (Cont.)
ServiceAttack
• Exploit againstthe specificservice
detected
• DistributedDenialof Service attack
is detected
Exploit
LateralMovement
• Lateralmovement detected,in
searchof
key dataandassets
• Malwareisattemptingto spread
laterallythroughtheenvironment
(e.g. ransomware)
PrivilegesEscalation
• Accessto privilegeddata
detectedby anunauthorizeduser
• Accessto critical servicesis
detectedby anunauthorizeduser
SuspiciousAccess
• Bruteforce attack detected
• Usercompromisedetected
• Accessto an unusualresourcesthat
hasn’tbeenseenbefore
14
©LogRhythm 2021. All rights reserved. Company Confidential
©LogRhythm 2021. All rights reserved. Company Confidential 14
Exploit
MistNet Detections (Cont.)
Collection &Exfiltration
• Sensitivefileandotherinformationbeingcollected,
priorto exfiltration
• Host/userperformsinternaldownloadsand
externaluploads
• Thescoreandtheamountof datatransferredraises
suspicion
• Such activityhasn’tbeenattributedto thathost/user
before
Command &Control
• Detectionof C&C
Ransomware
• Ransomware– A maliciousactoris
encryptingfiles.NoCommand& Control
channelis necessaryfor thisattack pattern
althoughsucha patternis oftenused
C & C
Install
15
©LogRhythm 2021. All rights reserved. Company Confidential
©LogRhythm 2021. All rights reserved. Company Confidential 15
1. Detection should be focused the actors and the actions they
performed
2. Network taps provide an easy way to get telemetry to make
observations about threats, but other information is needed
3. MITRE ATT&CK framework is applicable detection and threat
hunting
4. Response includes building the story and action
5. NDR and EDR are evolving into XDR
Five Tips To Consider
16
©LogRhythm 2021. All rights reserved. Company Confidential
©LogRhythm 2021. All rights reserved. Company Confidential 16
Smart Threat Hunting That’s Simple
Real-time Security “Narrative”
• ATT&CK Tactics
• Techniques
• Threat Group Signatures
• Recommended Remediation Tips
• SmartResponse Actions
Platform includes:
• Real-time and Historical
Visualization Tools
• Reporting Tools
AI-assisted MITRE ATT&CK hunting accurately guides analysts to suspicious activity in real time

More Related Content

Similar to Tips and Tricks - Best Practices for Threat Detection and Response - 2021-08.pptx

Containers At-Risk: A Review of 21,000 Cloud Environments
Containers At-Risk: A Review of 21,000 Cloud EnvironmentsContainers At-Risk: A Review of 21,000 Cloud Environments
Containers At-Risk: A Review of 21,000 Cloud Environments
Lacework
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
Fidelis Cybersecurity
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilience
accenture
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
Savvius, Inc
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
TranVu383073
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
Forcepoint LLC
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
Digital Bond
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
EMC
 
AWS Security Week: Lacework - Automating Cloud Security at Scale
AWS Security Week: Lacework - Automating Cloud Security at ScaleAWS Security Week: Lacework - Automating Cloud Security at Scale
AWS Security Week: Lacework - Automating Cloud Security at Scale
Amazon Web Services
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdf
langkahgontay88
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Zivaro Inc
 
Key Elements of a Security Delivery Platform
Key Elements of a Security Delivery PlatformKey Elements of a Security Delivery Platform
Key Elements of a Security Delivery Platform
John Pollack
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
IBM Security
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
Forcepoint LLC
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
IBM Security
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
 
Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's Advantage
Raffael Marty
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
African Cyber Security Summit
 

Similar to Tips and Tricks - Best Practices for Threat Detection and Response - 2021-08.pptx (20)

Containers At-Risk: A Review of 21,000 Cloud Environments
Containers At-Risk: A Review of 21,000 Cloud EnvironmentsContainers At-Risk: A Review of 21,000 Cloud Environments
Containers At-Risk: A Review of 21,000 Cloud Environments
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilience
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 
AWS Security Week: Lacework - Automating Cloud Security at Scale
AWS Security Week: Lacework - Automating Cloud Security at ScaleAWS Security Week: Lacework - Automating Cloud Security at Scale
AWS Security Week: Lacework - Automating Cloud Security at Scale
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdf
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
Key Elements of a Security Delivery Platform
Key Elements of a Security Delivery PlatformKey Elements of a Security Delivery Platform
Key Elements of a Security Delivery Platform
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's Advantage
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
 

Recently uploaded

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Tips and Tricks - Best Practices for Threat Detection and Response - 2021-08.pptx

  • 1. ©LogRhythm 2021. All rights reserved. Company Confidential 1 Best Practices for Threat Detection and Response Holistic Threat Detection using Hybrid Security Analytics with Automated Incident Response Vaughn Adams Product Management Andrew Pettet Enterprise Sales Engineer August 18, 2021
  • 2. 2 ©LogRhythm 2021. All rights reserved. Company Confidential ©LogRhythm 2021. All rights reserved. Company Confidential 2 Observations From The Field
  • 3. 3 ©LogRhythm 2021. All rights reserved. Company Confidential ©LogRhythm 2021. All rights reserved. Company Confidential 3 Targeted Detections With NDR/XDR Industrial Actor Active Directory Adversary Profile IAM & Identity Services ICS Profiles Cloud Config Network TAP/Span Flow/VPC Firewall Action Vulnerability Enterprise Data Center Enterprise on prem Remote Workforce Enterprise Campus Content Provider Operating Systems EDR/Endpoint Native OS Telemetry Container/Orchestration Cloud Resources IaaS (Azure/AWS/GCP) SaaS
  • 4. 4 ©LogRhythm 2021. All rights reserved. Company Confidential ©LogRhythm 2021. All rights reserved. Company Confidential 4 Typical Enterprise Deployment Cloud Front-End: • Public or private cloud • Real-time & retrospective analytics • Integrates with Active Directory • Integrates with existing EDR, threat intel and firewall solutions • Proprietary threat detection algorithms • Scale-out storage architecture Collector/Analytics Node: • Virtual machine or appliance • SecOps metadata capture • Streaming analytics & machine learning Cloud and data center threat detection and response that uses mist computing for scale and performance
  • 5. 5 ©LogRhythm 2021. All rights reserved. Company Confidential ©LogRhythm 2021. All rights reserved. Company Confidential 5 • Provides easy-to-understand security narrative • Automatically maps incidents to framework in real-time MITRE ATT&CK Engine • Uses ML & rules-based detection with threat intel to analyze network, user, and host activity • Automates detection and reduces false positives by over 90% Hybrid Security Analytics Mesh Architecture • Delivers cloud scale and fast time to value • Minimizes operating costs and maximizes scale with geo- distributed collection & analytics nodes MistNet NDR is Smart, Simple, and Scalable
  • 6. 6 ©LogRhythm 2021. All rights reserved. Company Confidential ©LogRhythm 2021. All rights reserved. Company Confidential 6 Hybrid Security Analytics with Automated Incident Response ML & Rules-Based Detection Automated Incident Response Detect and respond to lateral movement, exfiltration, malware compromise, ransomware and other threats. EDR Integrations Firewall Logs Threat Intel Feeds Network Taps Firewall Actions
  • 7. 7 ©LogRhythm 2021. All rights reserved. Company Confidential ©LogRhythm 2021. All rights reserved. Company Confidential 7 Incident and Response
  • 8. 8 ©LogRhythm 2021. All rights reserved. Company Confidential ©LogRhythm 2021. All rights reserved. Company Confidential 8 Actions
  • 9. 9 ©LogRhythm 2021. All rights reserved. Company Confidential ©LogRhythm 2021. All rights reserved. Company Confidential 9 Actors
  • 10. 10 ©LogRhythm 2021. All rights reserved. Company Confidential ©LogRhythm 2021. All rights reserved. Company Confidential 10 Host Scoring
  • 11. 11 ©LogRhythm 2021. All rights reserved. Company Confidential ©LogRhythm 2021. All rights reserved. Company Confidential 11 MITRE ATT&CK Hunting
  • 12. 12 ©LogRhythm 2021. All rights reserved. Company Confidential ©LogRhythm 2021. All rights reserved. Company Confidential 12 Delivery MistNet Detections Infection • Initialinfectiondetected • Suspiciousfilewasdownloaded • Malwareinstalledandcallbacksto CNCserversare seen InitialCompromise • Detecteda vectorusedto get initialfootholdinto the network • Executionof adversarycontrolled-codedetected • Adversarytrying to havepersistentpresenceover systemrestartsandotherfailures • Attempt to evadedetectionoravoidother defenses Recon&Discovery • Networkhost/port/sweepscanisdetected • Vulnerabilityscan isdetected • Applicationscanisdetected Weaponize Recon
  • 13. 13 ©LogRhythm 2021. All rights reserved. Company Confidential ©LogRhythm 2021. All rights reserved. Company Confidential 13 MistNet Detections (Cont.) ServiceAttack • Exploit againstthe specificservice detected • DistributedDenialof Service attack is detected Exploit LateralMovement • Lateralmovement detected,in searchof key dataandassets • Malwareisattemptingto spread laterallythroughtheenvironment (e.g. ransomware) PrivilegesEscalation • Accessto privilegeddata detectedby anunauthorizeduser • Accessto critical servicesis detectedby anunauthorizeduser SuspiciousAccess • Bruteforce attack detected • Usercompromisedetected • Accessto an unusualresourcesthat hasn’tbeenseenbefore
  • 14. 14 ©LogRhythm 2021. All rights reserved. Company Confidential ©LogRhythm 2021. All rights reserved. Company Confidential 14 Exploit MistNet Detections (Cont.) Collection &Exfiltration • Sensitivefileandotherinformationbeingcollected, priorto exfiltration • Host/userperformsinternaldownloadsand externaluploads • Thescoreandtheamountof datatransferredraises suspicion • Such activityhasn’tbeenattributedto thathost/user before Command &Control • Detectionof C&C Ransomware • Ransomware– A maliciousactoris encryptingfiles.NoCommand& Control channelis necessaryfor thisattack pattern althoughsucha patternis oftenused C & C Install
  • 15. 15 ©LogRhythm 2021. All rights reserved. Company Confidential ©LogRhythm 2021. All rights reserved. Company Confidential 15 1. Detection should be focused the actors and the actions they performed 2. Network taps provide an easy way to get telemetry to make observations about threats, but other information is needed 3. MITRE ATT&CK framework is applicable detection and threat hunting 4. Response includes building the story and action 5. NDR and EDR are evolving into XDR Five Tips To Consider
  • 16. 16 ©LogRhythm 2021. All rights reserved. Company Confidential ©LogRhythm 2021. All rights reserved. Company Confidential 16 Smart Threat Hunting That’s Simple Real-time Security “Narrative” • ATT&CK Tactics • Techniques • Threat Group Signatures • Recommended Remediation Tips • SmartResponse Actions Platform includes: • Real-time and Historical Visualization Tools • Reporting Tools AI-assisted MITRE ATT&CK hunting accurately guides analysts to suspicious activity in real time

Editor's Notes

  1. We need a horror story.
  2. Key points Define NDR and evolution into XDR. Detection is focused on identifying actors and actions It requires telemetry or data to align to the use case Think about the use case first and then the data sets needed to observe and detect.
  3. Key Points Sensor placement can vary We see it on internet connection, by internal lateral is encouraged
  4. Key points: Security observations need a variety of data and use multiple techniques to perform detections Some form of programmatic response is needed to block threats. NEED SUMMARY OF TECHNIQUES
  5. Key points: This is our incident screen that summary information Summary information is needed to cut through the noise. Shows Actors and actions
  6. Key points: We need to identify the actions Multiple observations from telemetry comes together.
  7. Key point: 1. We need to identify the Actors
  8. Key points: 1. We need to identify the actors
  9. Key point: Threat hunting still has a place. MITRE Techniques help with threat hunting Aligned to kill chain
  10. Key points: Detection techniques cover the entire kill chain. Detect early to minimize damage.
  11. Key point: 1. If any of this is helpful to you, contact us to get a demo of MistNet NDR by LogRhythm.