SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
THE STATE OF THREAT
DETECTION 2018
It’s time to lean forward
LIVE WEBINAR
© Fidelis Cybersecurity
Agenda
Introductions
2018 in a Nutshell
Temperature Check
Pain Points
Definitions
Threat Hunting Plans
Bob Flores
Former CIA CTO and current
Advisor, Fidelis Cybersecurity
Tom Clare
Product/Technical Marketing
Fidelis Cybersecurity
2
© Fidelis Cybersecurity
2018 in Nutshell
Email is still delivering the vast majority of malware –with some reports claiming that as
much as 92% of attacks are still delivered by email
The use of sandboxes means attacks are getting better at using phishing, social
engineering and drive-bys to gain initial footholds in private domains
Over 50% of attacks are file-less with macros and PowerShell scripts evading preventive
defenses
The cases of ransomware attacks has reduced, while cryptocurrency mining is stepping up
– reports suggest $1 billion in cryptocurrency has so far been stolen in 2018
Cyber-attacks are the biggest concern for businesses in Europe, Asia and North America,
according to a new survey of executives by the World Economic Forum (WEF)
© Fidelis Cybersecurity
Attackers are Breaching Defenses
How are organizations responding?
Fidelis conducted a study of 582 security professionals to evaluate the adoption of threat hunting
practices and overall threat detection strengths and weaknesses.
REGION
› Europe: 25%
› USA: 29%
› Global: 36%
› Other: 10%
JOB TITLE
› CISO/CITO/CTO: 10%
› VP/Director/Manager:
36%
› Architect/Engineer: 27%
› Analyst: 16%
› Other: 12%
COMPANY SIZE
› Large Enterprise (5000+ employees): 39%
› Medium Enterprise (1000-4999 employees):
18%
› Medium Business (250-999 employees): 19%
› Small Business (1-249 employees): 24%
© Fidelis Cybersecurity
Temperature Check - Preventive Defenses
How effective do you believe your preventive
defenses to be against targeted attacks?
28%
50%
10%
11%
HI GHLY
E FFE CTI V E
E FFE CTI V E NOT V E RY
E FFE CTI V E
DO NOT K NOW
Only 28% of respondents said that they felt their
solutions were highly effective.
AV Test industry averages for real time prevention is
97.4% for Android, 99.7% for MacOS and a
resounding 100% for Windows.
33% of Financial organizations said they believed
their solutions to be highly effective.
Insurance (28%) and technology (25%)
organizations followed closely behind
Just 4% of manufacturing organizations deemed
their preventative solutions to be highly effective.
© Fidelis Cybersecurity
Temperature Check – Detection Capabilities
How effective do you believe your post breach detection to
be?
21%
53%
13%
14%
HI GHLY
E FFE CTI V E
EFFECTI VE NOT VERY
E FFE CTI V E
DO NOT KNOW
Just 21% of respondents cited that they perceive
their post-breach detection measures to be highly
effective
68% do not have an Endpoint Detection and
Response solution
25% of all participants stated that they do not
have a detection and response strategy in place
at all
Healthcare organizations were least confident,
with just 5% citing that they trusted their detection
and response capabilities to be highly effective
© Fidelis Cybersecurity
Pain Points
33% of respondents cited
that ‘insufficient security
resources’ was a main
concern.
30% of respondents cited
‘lack of automation for IR
and investigation’ as a
major issue
29% of respondents cited
‘alert overload’ as a major
issue
What are the main issues facing your organization?
16%
18%
21%
24%
29%
30%
33%
MEAN TIME TO RESPOND IS TOO
LONG
MEAN TIME TO DETECT IS TOO LONG
TOO MANY DISPARATE TOOLS FOR IR
AND INVESTIGATIONS
NONE OF THE ABOVE
ALERT OVERLOAD
LACK OF AUTOMATION FOR IR AND
INVESTIGATIONS
INSUFFICIENT SECURITY
RESOURCES
© Fidelis Cybersecurity
CISO/CIO/CTO
ARCHITECT
41%
41%
34%
ALERT OVERLOAD
LACK OF AUTOMATION
INSUFFICIENT SECURITY RESOURCES
51%
36%
36%
LACK OF AUTOMATION
INSUFFICIENT SECURITY RESOURCES
TOO MANY DISPARATE TOOLS FOR IR AND…
33%
28%
24%
INSUFFICIENT RESOURCES
ALERT OVERLOAD
LACK OF AUTOMATION
ANALYST/RESEARCHER
By Job Title
© Fidelis Cybersecurity
Priorities
62.61%
24.87%
4.52%
8.00%
V E RY I MP ORTA NT I MP ORTA NT NOT V E RY I MP ORTA NT DO NOT K NOW / THI S I S N' T
MY A RE A OF E XP E RT I S E
How important to you is detecting post-breach attacks in the first few minutes and
hours?
• Oil/Gas/Utilities – 81%
• Finance/Banking – 72%
• Manufacturing – 43%
• State and Local Gov – 56%
• Manufacturing – 47%
• State and Local Gov – 30%
• Balance among other industries
• Education – 21%
• State and local Gov – 12%
© Fidelis Cybersecurity
The Knowledge Gap
• Mission brief provided key
intel on first challenge
• Read the brief, averaged
~100 commands
• Did not read, used spray
and pray efforts
• Knowledge before and
during phases reduces
knowledge gap/commands
• Over time hackers become
quieter and harder to detect
• Early detection is critical
• Deception layers need to be
automatically kept current
and dynamic
10
© Fidelis Cybersecurity
How are Organizations Detecting Attacks?
15%
20%
28%
38%
55%
63%
DECEPTION DEFENSE PLATFORMS
DO NOT KNOW/ THIS ISN'T MY AREA OF
EXPERTISE
USER/ENTITY BEHAVIOR ANALYTICS (UEBA)
DATA LOSS PREVENTION (DLP)
ENDPOINT DETECTION AND RESPONSE (EDR)
SIEM OR LOG/EVENT MONITORING (SIM/SEM)
© Fidelis Cybersecurity
What About Threat Hunting?
First,let’sdefineit
Threat Detection
Multiple Detection Techniques:
Signatures, Patterns, Rules, Statistics,
Sandboxing, Emulation, Anomaly
Detection, Machine Learning, Behavior
Analysis, etc.
Matching IoCs, IoAs
Real-time and Retrospectively
Query, Search, Pivot:
Logs, Events, SIEM, Data Lakes,
Metadata, etc.
Threat Modeling
Proactive process to improve
applications, systems and network
security
Assessing potential risks, threats, and
vulnerabilities often from an attacker’s
perspective
Enumerate and prioritize
countermeasures to address the effects
Increasingly important for Cloud, IoT and
autonomous converged IT/OT solutions
Threat Hunting
Proactive, analyst-centric, iterative and
interactive ad hoc process
Driven by expert intuitive hypotheses
assuming a breach
Combines security expertise, data analyst
skills and creative thinking upon a
knowledgebase across applications,
systems and networks
© Fidelis Cybersecurity
What is NOT Threat Hunting…
• Threat hunting is triggered by SIEM or AV alerts…
• Investigating the most frequent AV alert for root cause and hunting on it…
• Constantly monitoring and investigating any suspicious activity or anomalies…
• Non-baseline behavior or triggered events drive analyst investigations…
• Reviewing many logs within a SIEM and developing custom queries…
• Using Endpoint Detection & Response (EDR) to match TI and IOCs…
• Better alert triage or improved investigation capabilities…
• Searching through a data lake…
© Fidelis Cybersecurity
Who is doing it?
Does you security team currently engage in threat hunting?
42%
21%
37%
NO A ND W E DO NOT HA V E P LA NS TO
NO B UT W E HA V E P LA N T O W I THI N T HE NE XT Y E A R
Y E S W E CURRE NTLY HA V E THRE A T HUNTE RS
© Fidelis Cybersecurity
Threat Hunting by Industry
25%
26%
28%
30%
36%
36%
36%
36%
38%
44%
46%
MANUFACTURING
OTHER
STATE & LOCAL GOVERNMENT
TECHNOLOGY
OIL/GAS/UTILITIES
HEALTH CARE
EDUCATION
SERVICES
FEDERAL PUBLIC SECTOR
INSURANCE
FINANCE/BANKING
ORGANIZATIONS WHO ARE THREAT HUNTING
© Fidelis Cybersecurity
What’s Stopping us from Threat Hunting?
48%
35%
4.40%
12.40%
W E DON' T HA V E THE TI ME TE A M DOE S N' T HA V E THE S K I LLS W E DON' T HA V E THE V I S I B I LI TY W E DON' T THI NK I T' S NE CE S S A RY
86% of those who do not threat hunt want to but can’t – due
to lack of time, skills and visibility
© Fidelis Cybersecurity
Hunting
Threat Hunting Evolution
AV
IDS
Events/Logs
SIEMs
Data Lakes
ML/Analytics
NTA/Sensors
EDR
METADATA
- Indexed Ready to Query
- 90% of Content
- 20% of Storage Fees
Skills
Training
Internal Threat
Intelligence
Reactionary
Indicators
Internal Skills
& Resources
Services
Platforms
3rd Party Threat
Intelligence
Detection
Detection
Proactive Hunting
© Fidelis Cybersecurity
Types of Metadata
• Investigation and Response
Alert pivots and hunting by switching
between content and context of sessions
• Automatic Retrospective Application of
Threat Intelligence
• Cross Session Correlation, plus
Security Analytics
• Network Visibility & Profiles
See patterns not seen in firewall logs or
SIEM dashboards
• Anomaly Detection
Frequent and rare instances of attributes,
plus cross session, multi-faceted and
behavioral analysis
18
Plus custom tags!
© Fidelis Cybersecurity
Improving Threat Detection and Hunting in 2019
We suggest 3 areas of focus to improve threat detection capabilities in the coming year:
Collect Metadata
Develop the Skill Sets for Threat Hunting and Threat Detection
1
Incorporate Internal and 3rd Party Threat Intelligence2
3
Thank You!

Contenu connexe

Tendances

Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Business Continuity A Primer Andrews - September 2015
Business Continuity A Primer  Andrews - September 2015Business Continuity A Primer  Andrews - September 2015
Business Continuity A Primer Andrews - September 2015
Ron Andrews
 

Tendances (20)

The real cost of a cheap security operations center
The real cost of a cheap security operations centerThe real cost of a cheap security operations center
The real cost of a cheap security operations center
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations Center
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Security operation center
Security operation centerSecurity operation center
Security operation center
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
Business Continuity A Primer Andrews - September 2015
Business Continuity A Primer  Andrews - September 2015Business Continuity A Primer  Andrews - September 2015
Business Continuity A Primer Andrews - September 2015
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 

Similaire à The State of Threat Detection 2019

Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
SolarWinds
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
Peggy Lawless
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 

Similaire à The State of Threat Detection 2019 (20)

Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to Cyberattacks
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
ITS Datamatix Gitex Conference 2009 New ICT Security V2
ITS Datamatix Gitex Conference 2009 New ICT Security V2ITS Datamatix Gitex Conference 2009 New ICT Security V2
ITS Datamatix Gitex Conference 2009 New ICT Security V2
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 

Plus de Fidelis Cybersecurity

Plus de Fidelis Cybersecurity (16)

Putting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensivePutting Cyber Attackers on the Defensive
Putting Cyber Attackers on the Defensive
 
Threat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and ResearchThreat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and Research
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in Azure
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
 
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019
 
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Part 1: Identifying  Insider Threats with Fidelis EDR Technology Part 1: Identifying  Insider Threats with Fidelis EDR Technology
Part 1: Identifying Insider Threats with Fidelis EDR Technology
 
Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWS
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chain
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
 
Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration  Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception Defense
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception Solution
 
Cybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCCybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOC
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacks
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

The State of Threat Detection 2019

  • 1. THE STATE OF THREAT DETECTION 2018 It’s time to lean forward LIVE WEBINAR
  • 2. © Fidelis Cybersecurity Agenda Introductions 2018 in a Nutshell Temperature Check Pain Points Definitions Threat Hunting Plans Bob Flores Former CIA CTO and current Advisor, Fidelis Cybersecurity Tom Clare Product/Technical Marketing Fidelis Cybersecurity 2
  • 3. © Fidelis Cybersecurity 2018 in Nutshell Email is still delivering the vast majority of malware –with some reports claiming that as much as 92% of attacks are still delivered by email The use of sandboxes means attacks are getting better at using phishing, social engineering and drive-bys to gain initial footholds in private domains Over 50% of attacks are file-less with macros and PowerShell scripts evading preventive defenses The cases of ransomware attacks has reduced, while cryptocurrency mining is stepping up – reports suggest $1 billion in cryptocurrency has so far been stolen in 2018 Cyber-attacks are the biggest concern for businesses in Europe, Asia and North America, according to a new survey of executives by the World Economic Forum (WEF)
  • 4. © Fidelis Cybersecurity Attackers are Breaching Defenses How are organizations responding? Fidelis conducted a study of 582 security professionals to evaluate the adoption of threat hunting practices and overall threat detection strengths and weaknesses. REGION › Europe: 25% › USA: 29% › Global: 36% › Other: 10% JOB TITLE › CISO/CITO/CTO: 10% › VP/Director/Manager: 36% › Architect/Engineer: 27% › Analyst: 16% › Other: 12% COMPANY SIZE › Large Enterprise (5000+ employees): 39% › Medium Enterprise (1000-4999 employees): 18% › Medium Business (250-999 employees): 19% › Small Business (1-249 employees): 24%
  • 5. © Fidelis Cybersecurity Temperature Check - Preventive Defenses How effective do you believe your preventive defenses to be against targeted attacks? 28% 50% 10% 11% HI GHLY E FFE CTI V E E FFE CTI V E NOT V E RY E FFE CTI V E DO NOT K NOW Only 28% of respondents said that they felt their solutions were highly effective. AV Test industry averages for real time prevention is 97.4% for Android, 99.7% for MacOS and a resounding 100% for Windows. 33% of Financial organizations said they believed their solutions to be highly effective. Insurance (28%) and technology (25%) organizations followed closely behind Just 4% of manufacturing organizations deemed their preventative solutions to be highly effective.
  • 6. © Fidelis Cybersecurity Temperature Check – Detection Capabilities How effective do you believe your post breach detection to be? 21% 53% 13% 14% HI GHLY E FFE CTI V E EFFECTI VE NOT VERY E FFE CTI V E DO NOT KNOW Just 21% of respondents cited that they perceive their post-breach detection measures to be highly effective 68% do not have an Endpoint Detection and Response solution 25% of all participants stated that they do not have a detection and response strategy in place at all Healthcare organizations were least confident, with just 5% citing that they trusted their detection and response capabilities to be highly effective
  • 7. © Fidelis Cybersecurity Pain Points 33% of respondents cited that ‘insufficient security resources’ was a main concern. 30% of respondents cited ‘lack of automation for IR and investigation’ as a major issue 29% of respondents cited ‘alert overload’ as a major issue What are the main issues facing your organization? 16% 18% 21% 24% 29% 30% 33% MEAN TIME TO RESPOND IS TOO LONG MEAN TIME TO DETECT IS TOO LONG TOO MANY DISPARATE TOOLS FOR IR AND INVESTIGATIONS NONE OF THE ABOVE ALERT OVERLOAD LACK OF AUTOMATION FOR IR AND INVESTIGATIONS INSUFFICIENT SECURITY RESOURCES
  • 8. © Fidelis Cybersecurity CISO/CIO/CTO ARCHITECT 41% 41% 34% ALERT OVERLOAD LACK OF AUTOMATION INSUFFICIENT SECURITY RESOURCES 51% 36% 36% LACK OF AUTOMATION INSUFFICIENT SECURITY RESOURCES TOO MANY DISPARATE TOOLS FOR IR AND… 33% 28% 24% INSUFFICIENT RESOURCES ALERT OVERLOAD LACK OF AUTOMATION ANALYST/RESEARCHER By Job Title
  • 9. © Fidelis Cybersecurity Priorities 62.61% 24.87% 4.52% 8.00% V E RY I MP ORTA NT I MP ORTA NT NOT V E RY I MP ORTA NT DO NOT K NOW / THI S I S N' T MY A RE A OF E XP E RT I S E How important to you is detecting post-breach attacks in the first few minutes and hours? • Oil/Gas/Utilities – 81% • Finance/Banking – 72% • Manufacturing – 43% • State and Local Gov – 56% • Manufacturing – 47% • State and Local Gov – 30% • Balance among other industries • Education – 21% • State and local Gov – 12%
  • 10. © Fidelis Cybersecurity The Knowledge Gap • Mission brief provided key intel on first challenge • Read the brief, averaged ~100 commands • Did not read, used spray and pray efforts • Knowledge before and during phases reduces knowledge gap/commands • Over time hackers become quieter and harder to detect • Early detection is critical • Deception layers need to be automatically kept current and dynamic 10
  • 11. © Fidelis Cybersecurity How are Organizations Detecting Attacks? 15% 20% 28% 38% 55% 63% DECEPTION DEFENSE PLATFORMS DO NOT KNOW/ THIS ISN'T MY AREA OF EXPERTISE USER/ENTITY BEHAVIOR ANALYTICS (UEBA) DATA LOSS PREVENTION (DLP) ENDPOINT DETECTION AND RESPONSE (EDR) SIEM OR LOG/EVENT MONITORING (SIM/SEM)
  • 12. © Fidelis Cybersecurity What About Threat Hunting? First,let’sdefineit Threat Detection Multiple Detection Techniques: Signatures, Patterns, Rules, Statistics, Sandboxing, Emulation, Anomaly Detection, Machine Learning, Behavior Analysis, etc. Matching IoCs, IoAs Real-time and Retrospectively Query, Search, Pivot: Logs, Events, SIEM, Data Lakes, Metadata, etc. Threat Modeling Proactive process to improve applications, systems and network security Assessing potential risks, threats, and vulnerabilities often from an attacker’s perspective Enumerate and prioritize countermeasures to address the effects Increasingly important for Cloud, IoT and autonomous converged IT/OT solutions Threat Hunting Proactive, analyst-centric, iterative and interactive ad hoc process Driven by expert intuitive hypotheses assuming a breach Combines security expertise, data analyst skills and creative thinking upon a knowledgebase across applications, systems and networks
  • 13. © Fidelis Cybersecurity What is NOT Threat Hunting… • Threat hunting is triggered by SIEM or AV alerts… • Investigating the most frequent AV alert for root cause and hunting on it… • Constantly monitoring and investigating any suspicious activity or anomalies… • Non-baseline behavior or triggered events drive analyst investigations… • Reviewing many logs within a SIEM and developing custom queries… • Using Endpoint Detection & Response (EDR) to match TI and IOCs… • Better alert triage or improved investigation capabilities… • Searching through a data lake…
  • 14. © Fidelis Cybersecurity Who is doing it? Does you security team currently engage in threat hunting? 42% 21% 37% NO A ND W E DO NOT HA V E P LA NS TO NO B UT W E HA V E P LA N T O W I THI N T HE NE XT Y E A R Y E S W E CURRE NTLY HA V E THRE A T HUNTE RS
  • 15. © Fidelis Cybersecurity Threat Hunting by Industry 25% 26% 28% 30% 36% 36% 36% 36% 38% 44% 46% MANUFACTURING OTHER STATE & LOCAL GOVERNMENT TECHNOLOGY OIL/GAS/UTILITIES HEALTH CARE EDUCATION SERVICES FEDERAL PUBLIC SECTOR INSURANCE FINANCE/BANKING ORGANIZATIONS WHO ARE THREAT HUNTING
  • 16. © Fidelis Cybersecurity What’s Stopping us from Threat Hunting? 48% 35% 4.40% 12.40% W E DON' T HA V E THE TI ME TE A M DOE S N' T HA V E THE S K I LLS W E DON' T HA V E THE V I S I B I LI TY W E DON' T THI NK I T' S NE CE S S A RY 86% of those who do not threat hunt want to but can’t – due to lack of time, skills and visibility
  • 17. © Fidelis Cybersecurity Hunting Threat Hunting Evolution AV IDS Events/Logs SIEMs Data Lakes ML/Analytics NTA/Sensors EDR METADATA - Indexed Ready to Query - 90% of Content - 20% of Storage Fees Skills Training Internal Threat Intelligence Reactionary Indicators Internal Skills & Resources Services Platforms 3rd Party Threat Intelligence Detection Detection Proactive Hunting
  • 18. © Fidelis Cybersecurity Types of Metadata • Investigation and Response Alert pivots and hunting by switching between content and context of sessions • Automatic Retrospective Application of Threat Intelligence • Cross Session Correlation, plus Security Analytics • Network Visibility & Profiles See patterns not seen in firewall logs or SIEM dashboards • Anomaly Detection Frequent and rare instances of attributes, plus cross session, multi-faceted and behavioral analysis 18 Plus custom tags!
  • 19. © Fidelis Cybersecurity Improving Threat Detection and Hunting in 2019 We suggest 3 areas of focus to improve threat detection capabilities in the coming year: Collect Metadata Develop the Skill Sets for Threat Hunting and Threat Detection 1 Incorporate Internal and 3rd Party Threat Intelligence2 3