SlideShare a Scribd company logo
Will the Real AI
Please Stand Up?
Stephan Jou, CTO
Mario Daigle, VP Prod. Mgmt
AI has emerged from
the realm of science
fiction and become
part of our everyday
lives.
Buy
me!
I’m
smart
!
Super
ML!
The best
Bayesian!
I
do it
all!
AI
4ever
!!!
Machine learning is everywhere…
Buy
me!
Super
ML!
The best
Bayesian!
I
do it
all!
Classification
Support Vector Machines
Discriminant Analysis
Naive Bayes
Nearest Neighbor
Regression
Linear Regression | GLM
SVR | GPR
Ensemble Methods
Decision Trees
Neural Networks
Clustering
K-means | Fuzzy C-means
Hidden Markov Model
Neural Networks
Hierarchical
Guassian Mixture
Supervised Unsupervised
2 Categories of Machine Learning
Supervised: Learning by example
Parrot v. Guacamole
Kitten v. Ice cream
Chihuahua v. Muffin
Labradoodle v. Fried chickenDog v. Bagel
Sloth v. Pain au chocolat
Source: Karen Zack
@teenybiscuit Animal vs. Food
“Find specific things and give them
a predetermined name.”
• Algorithm is provided training
data (“labeled”) until it can
learn to make distinctions on its
own.
• Algorithm is deployed in every
environment knowing only what
it learned from training data.
What emotion is he displaying?
Happy Sad Angry
Supervised machine learning is by example. It depends on large collections of
training data (e.g., faces labeled as “happy,” “sad,” or “angry”) to learn; therefore
you must know and have specimens of exactly what it is you’re seeking to find.
Unsupervised: Learning by observation
a. a. a.
b. b. b.
a. Wearing bright clothing?
or…
b. Messing around with props?
a. Cleaning the kitchen?
or…
b. Cooking a meal?
a. Coffee from a shop?
or…
b. A cup of coffee at home?
When is happy “normal” for him?
“Discern commonalities and detect
outliers without naming them.”
• Algorithm is built to watch for
predetermined variance out-of-
the-box.
• Algorithm learns which things in
a specific environment (context)
do or do not belong as data
moves through it.
Unsupervised: Learning by observation
a. a. a.
b. b. b.
a. Wearing bright clothing?
or…
b. Messing around with props?
a. Cleaning the kitchen?
or…
b. Cooking a meal?
a. Coffee from a shop?
or…
b. A cup of coffee at home?
When is happy “normal” for him?
“Discern commonalities and detect
outliers without naming them.”
• Algorithm is built to watch for
predetermined variance out-of-
the-box.
• Algorithm learns which things in
a specific environment (context)
do or do not belong as data
moves through it.
What emotion is expected?
a. a. a.
b. b. b.
a. Wearing bright clothing?
or…
b. Messing around with props?
a. Cleaning the kitchen?
or…
b. Cooking a meal?
a. Coffee from a shop?
or…
b. A cup of coffee at home?
When is happy “normal” for him?
Don’t tell us what to look for…
… this should be handled by
supervised machine learning
algorithms.
Tell us what we’re looking at…
…it’s about identifying similarities and differences without needing to name
them. Unsupervised machine learning doesn’t need specific training data but
does need time in situ to “observe” enough examples.
socializing
drinking coffee
cleaning
It is rare that he wears
brightly colored clothing
while with his friends.
It is unusual for him to
drink store-bought
coffee; he has only ever
been seen with coffee he
brewed himself.
He has never cleaned the
kitchen on a Monday, he
has only ever done it on a
Saturday or Sunday.
happy
angry
sad
It is not about identifying
happy, sad, or angry.
Instead, do we expect
what we’re seeing from
the person?
Do we expect him to be
happy when…
“Classroom” vs. “Real world” education
Find similarities… but no names
Find similarities… but no names
Ideal for finding malware
 Decades of data to study
 Always looks the same no
matter where it manifests
Cybersecurity:
Supervised machine
learning
“Tell me what I’m looking for…”
Cybersecurity: Unsupervised machine learning
When searching for insider threats, how do you determine what is productive or malicious
activity within the enterprise?
 Working at midnight?
 Attaching 500MB to an email?
 Looking at corporate strategy data?
 Checking out software code from Project
X?
 A machine communicating on port 465?
 Machine A & B connecting via HTTP?
 Printer “P015” printing 50 pages at
noon?
 cmd.exe launched on a workstation?
The activities related to insider threats are masked by behavior that, when removed from context,
present as benign. This means we can not simply match a pattern or look for a signature – we
must take a different approach that separates abnormal from normal.
Knowing just this little bit about how ML works can now help you
ask better questions when evaluating vendors.
Find the right tool for the job…
We Uncover the
Threats that
Matter
Mario Daigle, VP Product Management
17 | © 2018 Interset Software17 | © 2018 Interset Software
Log
Mgmt
UEBA Big
Data
Next-Gen
Threat
Hunting
Insider
Threat
Progra
m
Data
Breach
Risk
Log
Analysis
Complicated Landscape
Security is a Fragmented, Noisy Landscape of Disparate Tools and Systems
 Fragmented security industry
 Disparate tools, data and programs
 Predicated on protect & defend
Too Many Alerts
 Flood of Rules/Thresholds based alerts
 Manual maintenance of “intelligence”
 Alerts in isolation with no context
Talent Shortage
 Inefficient SOC
 Manual processes and analysis
 Challenge at scale
Millions
of Alerts
Rules and
Thresholds
Hidden Lurking Threats
Manual Analysis Leads to Detection
of SOME Threats
Low risk visibility and alert fatigue skews threat response misaligned to magnitude of risk
Threat
Intelligenc
e
Endpoin
t
Advanced
Fraud
Identit
y &
Access
Cloud
SIEMMobile
Data &
Apps
Networ
k
Product A
Product
G
Product B
Product C
Product
D
Product F
Product
H
Product I
Product E
Product V
Product
Q
Product W
Product Z
Product P
Product R
Product V
Product K
Product
GProduct
M
Product
N
Product J
Product L
Product I
Product BB
Product EE
Product JJ
Product CC
Product AA
Product GG
Product FF
Product T
Product
O
Product S
Product Y
Product DD
Product
HH
Product X
18 | © 2018 Interset Software18 | © 2018 Interset Software
Holistic View of Risks
Interset’s Unsupervised Machine Learning Surfaces Inside(r) Threats
 Contextual data ecosystem
 Integrate hundreds of data sources
 Transform to detect and respond
AI & ML Enabled Analytics
 Auto Pattern Discovery
 Contextual Analysis
 Signal from the Noise
Efficient SOC
 Faster Threat Detection
 Automated Processes
 Guided Threat Hunting
Improved ROI on Existing Tools
Existing Resources See MORE Threats
Machine learning and intuitive UI delivers prioritized threat leads and automated processes
Threat
Intelligence
Endpoint
Advanced
Fraud
Identity
&
Access
Cloud
SIEMMobile
Data &
Apps
Network
Security
Analytics
Security
Analytics
Security
Analytics
19 | © 2018 Interset Software19 | © 2018 Interset Software
Interset’s Mathematically Proven Security Analytics (UEBA) Solution
Faster threat detection; SOC teams can rapidly respond to measured risk with complete context
APISIEM
Endpoint
Network
DLP
IAM
Security
Data Lake
Biz Apps
Custom
Data
Acquire Data
From any system
Interset AI & Machine Learning
Interset Data Lake
Create Baselines
Personalized ‘Unique
Normal”
Detect Anomalies
ML models using big
data storage & compute
Threat Leads
Prioritized, high fidelity,
measured risk scores
SOC APPS
Q&A
SIEM
Case
Management
20 | © 2018 Interset Software20 | © 2018 Interset Software
What We Do: AI Security Analytics, Unique Normal of Every Single Entity
Interset detects, measures, and scores risk with scalable “unique normal” and anomaly detection
Many Data Sources Detect Anomalies Produce Risk Score
Authentication
Logs
Endpoint Logs
Operating
System Logs
Proxy Logs
VPN Logs Printer Logs
Network Logs File/Network
Share Logs
Volumetric Models
Neural Networks
Probability Distribution
Estimation
Other
Detection of Threats like:
 Compromised Account
 Data Breach
 Fraud
 Infected Host
Based on Anomalies like:
 Multiple failed logins
 Unusual locations
 Unusual successful attempt
From Individually Measured
Statistics for Every Entity Like:
 Ann moves a significant volume of data
 Ann accesses and takes from file folders
 Printer had multiple failed logins
 Server accesses unusual locations
 Server shows unusual successful login
 Ann’s peer has different expense report for the same event
 Ann sends email to personal account
Entities:
 Account
 Machine
 File
 IP Addresses
 Servers
 Websites
 Printers
 Projects
96
21 | © 2018 Interset Software21 | © 2018 Interset Software
A Prioritized List of Actionable Threat Leads
Accelerate SOC efficiency with high quality threat leads delivered via an intuitive UI with instant drill-down
Here, Interset distills
more than 5.1 billion
events into 1 million
anomalies, for 29
validated threat leads
22 | © 2018 Interset Software22 | © 2018 Interset Software
Intelligent, Instant Drill-Down for Guided Threat Hunting & Investigation
Faster risk assessment, threat hunting and triage with click through to: who, what, why, when, where, how
What used to
take days,
now only
takes a few
clicks
Prioritized Entity Views
 Leaderboard of mathematically
measured risk scores
Instant Drill Down
 Contextual analysis with click
through to details
Raw Event Search
 Direct access raw events, assisted
by intuitive, dynamic UI
23 | © 2018 Interset Software23 | © 2018 Interset Software
Interset Threat Detection Use Cases
•At-Risk employee
•High-Risk Employees
•Account Misuse
•Privilege Account Misuse
•Terminated Employee
Activity
•Data Staging
•Data Exfiltration
•Email Exfiltration
•Print Exfiltration
•USB Exfiltration
•Unusual data access
•Unusual uploads
•Compromised Account
•C2 Activity Detection
•Impossible Journeys
•Internal Recon
•Dormant Account Usage
•Unusual Login Patterns
•Audit Log Tampering
•Unusual Traffic
•Password Manipulation
•Abnormal Processes
•Unusual Applications
•Infected Host
•Malicious Tunneling
•Bot Detection
•Mooching
•Snooping
•Interactions with dormant
resources/files
•High Risk IP/Data Access
•Lateral Movement
•Transaction Abuse
•Expense Fraud
Insider Threat
Advanced
Threat
IP TheftData Breach Fraud
Thank you!
For more information, contact us at securityai@interset.com

More Related Content

What's hot

Operationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum DallasOperationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum Dallas
Interset
 
Machine Learning + AI for Accelerated Threat-Hunting
Machine Learning + AI for Accelerated Threat-HuntingMachine Learning + AI for Accelerated Threat-Hunting
Machine Learning + AI for Accelerated Threat-Hunting
Interset
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
Forcepoint LLC
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
Interset
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
SaraPia5
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
Raffael Marty
 
The Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning CybersecurityThe Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning Cybersecurity
Interset
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty
 
User and Entity Behavioral Analytics
User and Entity Behavioral AnalyticsUser and Entity Behavioral Analytics
User and Entity Behavioral Analytics
Interset
 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security Data
Raffael Marty
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
Forcepoint LLC
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
MapR Technologies
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Keith Kraus
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
Software Guru
 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0
Raffael Marty
 
A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics
Interset
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
Sridhar Karnam
 
Meetup7 integration microservices_machine_learning
Meetup7 integration microservices_machine_learningMeetup7 integration microservices_machine_learning
Meetup7 integration microservices_machine_learning
Megatris Comp
 
Unified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphUnified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge Graph
Vaticle
 
Data Science Driven Malware Detection
Data Science Driven Malware DetectionData Science Driven Malware Detection
Data Science Driven Malware Detection
VMware Tanzu
 

What's hot (20)

Operationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum DallasOperationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum Dallas
 
Machine Learning + AI for Accelerated Threat-Hunting
Machine Learning + AI for Accelerated Threat-HuntingMachine Learning + AI for Accelerated Threat-Hunting
Machine Learning + AI for Accelerated Threat-Hunting
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
 
The Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning CybersecurityThe Myths + Realities of Machine-Learning Cybersecurity
The Myths + Realities of Machine-Learning Cybersecurity
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are Dangerous
 
User and Entity Behavioral Analytics
User and Entity Behavioral AnalyticsUser and Entity Behavioral Analytics
User and Entity Behavioral Analytics
 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security Data
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0
 
A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Meetup7 integration microservices_machine_learning
Meetup7 integration microservices_machine_learningMeetup7 integration microservices_machine_learning
Meetup7 integration microservices_machine_learning
 
Unified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphUnified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge Graph
 
Data Science Driven Malware Detection
Data Science Driven Malware DetectionData Science Driven Malware Detection
Data Science Driven Malware Detection
 

Similar to Webinar: Will the Real AI Please Stand Up?

IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Seattle: Everything is a Nail! Machine Learning in CybersecurityIANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
Interset
 
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum DC: Everything is a Nail! Machine Learning in CybersecurityIANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
Interset
 
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Charlotte: Everything is a Nail! Machine Learning in CybersecurityIANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
Interset
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
Burhan Ahmed
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
NUS-ISS
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
AI Orange Belt - Session 2
AI Orange Belt - Session 2AI Orange Belt - Session 2
AI Orange Belt - Session 2
AI Black Belt
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
Tasnim Alasali
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
SiskaFitrianingrum
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
Enes Bolfidan
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
IBM Security
 
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdftechinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
seotechinator
 
How AI used in cybersecurity
How AI used in cybersecurityHow AI used in cybersecurity
How AI used in cybersecurity
ArjitDas2
 
Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open Source
Animesh Singh
 
AI-900 Slides.pptx
AI-900 Slides.pptxAI-900 Slides.pptx
AI-900 Slides.pptx
kprasad8
 
Ai and Design: When, Why and How? - Morgenbooster
Ai and Design: When, Why and How? - MorgenboosterAi and Design: When, Why and How? - Morgenbooster
Ai and Design: When, Why and How? - Morgenbooster
1508 A/S
 
How AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdfHow AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdf
MobibizIndia1
 
Splunk for Security-Hands On
Splunk for Security-Hands OnSplunk for Security-Hands On
Splunk for Security-Hands On
Splunk
 
Hands-On Security - ES Guided Tour
Hands-On Security - ES Guided TourHands-On Security - ES Guided Tour
Hands-On Security - ES Guided Tour
Splunk
 
Semantic AI
Semantic AISemantic AI

Similar to Webinar: Will the Real AI Please Stand Up? (20)

IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Seattle: Everything is a Nail! Machine Learning in CybersecurityIANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
 
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum DC: Everything is a Nail! Machine Learning in CybersecurityIANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
 
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Charlotte: Everything is a Nail! Machine Learning in CybersecurityIANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
AI Orange Belt - Session 2
AI Orange Belt - Session 2AI Orange Belt - Session 2
AI Orange Belt - Session 2
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdftechinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
 
How AI used in cybersecurity
How AI used in cybersecurityHow AI used in cybersecurity
How AI used in cybersecurity
 
Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open Source
 
AI-900 Slides.pptx
AI-900 Slides.pptxAI-900 Slides.pptx
AI-900 Slides.pptx
 
Ai and Design: When, Why and How? - Morgenbooster
Ai and Design: When, Why and How? - MorgenboosterAi and Design: When, Why and How? - Morgenbooster
Ai and Design: When, Why and How? - Morgenbooster
 
How AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdfHow AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdf
 
Splunk for Security-Hands On
Splunk for Security-Hands OnSplunk for Security-Hands On
Splunk for Security-Hands On
 
Hands-On Security - ES Guided Tour
Hands-On Security - ES Guided TourHands-On Security - ES Guided Tour
Hands-On Security - ES Guided Tour
 
Semantic AI
Semantic AISemantic AI
Semantic AI
 

More from Interset

IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
Interset
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
Interset
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018
Interset
 
Infographic: Inside Data Breaches
Infographic: Inside Data BreachesInfographic: Inside Data Breaches
Infographic: Inside Data Breaches
Interset
 
Lead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkLead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less Work
Interset
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
Interset
 

More from Interset (6)

IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018
 
Infographic: Inside Data Breaches
Infographic: Inside Data BreachesInfographic: Inside Data Breaches
Infographic: Inside Data Breaches
 
Lead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkLead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less Work
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Webinar: Will the Real AI Please Stand Up?

  • 1. Will the Real AI Please Stand Up? Stephan Jou, CTO Mario Daigle, VP Prod. Mgmt
  • 2. AI has emerged from the realm of science fiction and become part of our everyday lives.
  • 4. Buy me! Super ML! The best Bayesian! I do it all! Classification Support Vector Machines Discriminant Analysis Naive Bayes Nearest Neighbor Regression Linear Regression | GLM SVR | GPR Ensemble Methods Decision Trees Neural Networks Clustering K-means | Fuzzy C-means Hidden Markov Model Neural Networks Hierarchical Guassian Mixture Supervised Unsupervised 2 Categories of Machine Learning
  • 5. Supervised: Learning by example Parrot v. Guacamole Kitten v. Ice cream Chihuahua v. Muffin Labradoodle v. Fried chickenDog v. Bagel Sloth v. Pain au chocolat Source: Karen Zack @teenybiscuit Animal vs. Food “Find specific things and give them a predetermined name.” • Algorithm is provided training data (“labeled”) until it can learn to make distinctions on its own. • Algorithm is deployed in every environment knowing only what it learned from training data.
  • 6. What emotion is he displaying? Happy Sad Angry Supervised machine learning is by example. It depends on large collections of training data (e.g., faces labeled as “happy,” “sad,” or “angry”) to learn; therefore you must know and have specimens of exactly what it is you’re seeking to find.
  • 7. Unsupervised: Learning by observation a. a. a. b. b. b. a. Wearing bright clothing? or… b. Messing around with props? a. Cleaning the kitchen? or… b. Cooking a meal? a. Coffee from a shop? or… b. A cup of coffee at home? When is happy “normal” for him? “Discern commonalities and detect outliers without naming them.” • Algorithm is built to watch for predetermined variance out-of- the-box. • Algorithm learns which things in a specific environment (context) do or do not belong as data moves through it.
  • 8. Unsupervised: Learning by observation a. a. a. b. b. b. a. Wearing bright clothing? or… b. Messing around with props? a. Cleaning the kitchen? or… b. Cooking a meal? a. Coffee from a shop? or… b. A cup of coffee at home? When is happy “normal” for him? “Discern commonalities and detect outliers without naming them.” • Algorithm is built to watch for predetermined variance out-of- the-box. • Algorithm learns which things in a specific environment (context) do or do not belong as data moves through it.
  • 9. What emotion is expected? a. a. a. b. b. b. a. Wearing bright clothing? or… b. Messing around with props? a. Cleaning the kitchen? or… b. Cooking a meal? a. Coffee from a shop? or… b. A cup of coffee at home? When is happy “normal” for him?
  • 10. Don’t tell us what to look for… … this should be handled by supervised machine learning algorithms. Tell us what we’re looking at… …it’s about identifying similarities and differences without needing to name them. Unsupervised machine learning doesn’t need specific training data but does need time in situ to “observe” enough examples. socializing drinking coffee cleaning It is rare that he wears brightly colored clothing while with his friends. It is unusual for him to drink store-bought coffee; he has only ever been seen with coffee he brewed himself. He has never cleaned the kitchen on a Monday, he has only ever done it on a Saturday or Sunday. happy angry sad It is not about identifying happy, sad, or angry. Instead, do we expect what we’re seeing from the person? Do we expect him to be happy when… “Classroom” vs. “Real world” education
  • 13. Ideal for finding malware  Decades of data to study  Always looks the same no matter where it manifests Cybersecurity: Supervised machine learning “Tell me what I’m looking for…”
  • 14. Cybersecurity: Unsupervised machine learning When searching for insider threats, how do you determine what is productive or malicious activity within the enterprise?  Working at midnight?  Attaching 500MB to an email?  Looking at corporate strategy data?  Checking out software code from Project X?  A machine communicating on port 465?  Machine A & B connecting via HTTP?  Printer “P015” printing 50 pages at noon?  cmd.exe launched on a workstation? The activities related to insider threats are masked by behavior that, when removed from context, present as benign. This means we can not simply match a pattern or look for a signature – we must take a different approach that separates abnormal from normal.
  • 15. Knowing just this little bit about how ML works can now help you ask better questions when evaluating vendors. Find the right tool for the job…
  • 16. We Uncover the Threats that Matter Mario Daigle, VP Product Management
  • 17. 17 | © 2018 Interset Software17 | © 2018 Interset Software Log Mgmt UEBA Big Data Next-Gen Threat Hunting Insider Threat Progra m Data Breach Risk Log Analysis Complicated Landscape Security is a Fragmented, Noisy Landscape of Disparate Tools and Systems  Fragmented security industry  Disparate tools, data and programs  Predicated on protect & defend Too Many Alerts  Flood of Rules/Thresholds based alerts  Manual maintenance of “intelligence”  Alerts in isolation with no context Talent Shortage  Inefficient SOC  Manual processes and analysis  Challenge at scale Millions of Alerts Rules and Thresholds Hidden Lurking Threats Manual Analysis Leads to Detection of SOME Threats Low risk visibility and alert fatigue skews threat response misaligned to magnitude of risk Threat Intelligenc e Endpoin t Advanced Fraud Identit y & Access Cloud SIEMMobile Data & Apps Networ k Product A Product G Product B Product C Product D Product F Product H Product I Product E Product V Product Q Product W Product Z Product P Product R Product V Product K Product GProduct M Product N Product J Product L Product I Product BB Product EE Product JJ Product CC Product AA Product GG Product FF Product T Product O Product S Product Y Product DD Product HH Product X
  • 18. 18 | © 2018 Interset Software18 | © 2018 Interset Software Holistic View of Risks Interset’s Unsupervised Machine Learning Surfaces Inside(r) Threats  Contextual data ecosystem  Integrate hundreds of data sources  Transform to detect and respond AI & ML Enabled Analytics  Auto Pattern Discovery  Contextual Analysis  Signal from the Noise Efficient SOC  Faster Threat Detection  Automated Processes  Guided Threat Hunting Improved ROI on Existing Tools Existing Resources See MORE Threats Machine learning and intuitive UI delivers prioritized threat leads and automated processes Threat Intelligence Endpoint Advanced Fraud Identity & Access Cloud SIEMMobile Data & Apps Network Security Analytics Security Analytics Security Analytics
  • 19. 19 | © 2018 Interset Software19 | © 2018 Interset Software Interset’s Mathematically Proven Security Analytics (UEBA) Solution Faster threat detection; SOC teams can rapidly respond to measured risk with complete context APISIEM Endpoint Network DLP IAM Security Data Lake Biz Apps Custom Data Acquire Data From any system Interset AI & Machine Learning Interset Data Lake Create Baselines Personalized ‘Unique Normal” Detect Anomalies ML models using big data storage & compute Threat Leads Prioritized, high fidelity, measured risk scores SOC APPS Q&A SIEM Case Management
  • 20. 20 | © 2018 Interset Software20 | © 2018 Interset Software What We Do: AI Security Analytics, Unique Normal of Every Single Entity Interset detects, measures, and scores risk with scalable “unique normal” and anomaly detection Many Data Sources Detect Anomalies Produce Risk Score Authentication Logs Endpoint Logs Operating System Logs Proxy Logs VPN Logs Printer Logs Network Logs File/Network Share Logs Volumetric Models Neural Networks Probability Distribution Estimation Other Detection of Threats like:  Compromised Account  Data Breach  Fraud  Infected Host Based on Anomalies like:  Multiple failed logins  Unusual locations  Unusual successful attempt From Individually Measured Statistics for Every Entity Like:  Ann moves a significant volume of data  Ann accesses and takes from file folders  Printer had multiple failed logins  Server accesses unusual locations  Server shows unusual successful login  Ann’s peer has different expense report for the same event  Ann sends email to personal account Entities:  Account  Machine  File  IP Addresses  Servers  Websites  Printers  Projects 96
  • 21. 21 | © 2018 Interset Software21 | © 2018 Interset Software A Prioritized List of Actionable Threat Leads Accelerate SOC efficiency with high quality threat leads delivered via an intuitive UI with instant drill-down Here, Interset distills more than 5.1 billion events into 1 million anomalies, for 29 validated threat leads
  • 22. 22 | © 2018 Interset Software22 | © 2018 Interset Software Intelligent, Instant Drill-Down for Guided Threat Hunting & Investigation Faster risk assessment, threat hunting and triage with click through to: who, what, why, when, where, how What used to take days, now only takes a few clicks Prioritized Entity Views  Leaderboard of mathematically measured risk scores Instant Drill Down  Contextual analysis with click through to details Raw Event Search  Direct access raw events, assisted by intuitive, dynamic UI
  • 23. 23 | © 2018 Interset Software23 | © 2018 Interset Software Interset Threat Detection Use Cases •At-Risk employee •High-Risk Employees •Account Misuse •Privilege Account Misuse •Terminated Employee Activity •Data Staging •Data Exfiltration •Email Exfiltration •Print Exfiltration •USB Exfiltration •Unusual data access •Unusual uploads •Compromised Account •C2 Activity Detection •Impossible Journeys •Internal Recon •Dormant Account Usage •Unusual Login Patterns •Audit Log Tampering •Unusual Traffic •Password Manipulation •Abnormal Processes •Unusual Applications •Infected Host •Malicious Tunneling •Bot Detection •Mooching •Snooping •Interactions with dormant resources/files •High Risk IP/Data Access •Lateral Movement •Transaction Abuse •Expense Fraud Insider Threat Advanced Threat IP TheftData Breach Fraud
  • 24. Thank you! For more information, contact us at securityai@interset.com