SlideShare une entreprise Scribd logo
1  sur  34
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied.© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied.
GOOD GUYS VS BAD GUYS:
USING BIG DATA TO COUNTERACT ADVANCED
THREATS
Presented by GTRI
Micah Montgomery
Solutions Architect, Big Data and InfoSec
August 27, 2014
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Security Presentation Template
Scare
them
Unscare
them
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Security Presentation Template
Big Data
Advanced
Threats
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Here Comes the Scary Part…..
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Cisco 2014 Annual Security Report
Key Discoveries
– Attacks against infrastructure are targeting significant
resources across the Internet
– Malicious actors are using trusted applications to exploit
gaps in perimeter security
– Investigations of multinational companies show evidence
of internal compromise. Suspicious traffic is emanating
from their networks and attempting to connect to
questionable sites (100 percent of companies are
calling malicious malware hosts)
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
The Pervasiveness of Malicious Traffic
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
• By 2018, the gigabyte equivalent of all movies ever
made will cross the global Internet every 3 minutes.
• Globally, IP traffic will reach 400 terabits per second
(Tbps) in 2018, the equivalent of 148 million people
streaming Internet HD video simultaneously, all day,
every day.
• Global IP traffic in 2018 will be equivalent to 395 billion
DVDs per year, 33 billion DVDs per month, or 45 million
DVDs per hour.
Traffic demands are only going up…
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Advanced Threats Outpace the Defenders
Adversary
You
Time
Technical
Capabilities
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Advanced Threats Are Hard to Detect
100%
Valid credentials
were used
40
Average # of systems
accessed
243
Median # of days
before detection
63%
Of victims were notified
by external entity
Source: Mandiant M-Trends Report 2012 and 2013
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Advanced Threat Pattern – Not Signature Based
Infiltration
Back
Door
Exfiltration
Data
GatheringRecon
Phishing
or web
drive-by.
Email has
attached
malware or
link to
malware
Malware
installs
remote
access
toolkit(s)
Malware
obtains
credentials
to key
systems
and
identifies
valuable
data
Data is
acquired
and staged
for
exfiltration
Data is
exfiltrated
as
encrypted
files via
HTTP/S,
FTP, DNS
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Traditional SIEMs Miss The Threats
• Limited view of security threats. Difficult to collect all
data sources. Costly, custom collectors. Datastore
w/schema
• Inflexible search/reporting hampers investigations and
threat detection
• Scale/speed issues impede ability to do fast analytics
• Difficult to deploy and manage; often multiple
products
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Better Defensive Cybersecurity Tools Needed
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Here Comes The Solution
Big Data
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
So What is Big Data Anyway?
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
“Big Data” Definition
• Wikipedia: Collection of data sets so large and complex
that it becomes difficult to process using database
management tools
• Gartner: The Three Vs
1. Data Volume
2. Data Variety
3. Data Velocity
• Security has always been a Big Data problem; now we
are finding ways to solve it
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Big Data is Used Across IT and the Business
App Mgmt IT Ops Security Compliance Fraud
Business
Intelligence
Big Data
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Machine Data / Logs are Big Data
2013-08-09 16:21:38 10.11.36.29 98483 148 TCP_HIT 200 200 0 622 - - OBSERVED GET
www.neverbeenseenbefore.com HTTP/1.1 0 "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1;
.NET CLR 2.0.50727; InfoPath.1; MS-RTC LM 8; .NET CLR 1.1.4322; .NET CLR 3.0.4506.2152; ) User
John Doe,"
08/09/2013 16:23:51.0128event_status="(0)The operation completed successfully. "pid=1300
process_image="John DoeDeviceHarddiskVolume1WindowsSystem32neverseenbefore.exe“
registry_type ="CreateKey"key_path="REGISTRYMACHINESOFTWAREMicrosoftWindows
NTCurrentVersion Printers PrintProviders John Doe-PCPrinters{} NeverSeenbefore" data_type""
Endpoint
Logs
Web Proxy
Aug 08 06:09:13 acmesep01.acmetech.com Aug 09 06:17:24 SymantecServer acmesep01: Virus
found,Computer name: ACME-002,Source: Real Time Scan,Risk name: Hackertool.rootkit,Occurrences:
1,C:/Documents and Settings/smithe/Local Settings/Temp/evil.tmp,"""",Actual action:
Quarantined,Requested action: Cleaned, time: 2009-01-23 03:19:12,Inserted: 2009-01-23
03:20:12,End: 2009-01-23 03:19:12,Domain: Default,Group: My CompanyACME Remote,Server:
acmesep01,User: smithe,Source computer: ,Source IP: 10.11.36.20
20130806041221.000000Caption=ACME-2975EBAdministrator Description=Built-in account for
administering the computer/domainDomain=ACME-2975EB InstallDate=NULLLocalAccount = IP:
10.11.36.20 TrueName=Administrator SID =S-1-5-21-1715567821-926492609-725345543
500SIDType=1 Status=Degradedwmi_ type=UserAccounts
Anti-virus
Authentications
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Big Data Analytics
Security for Business Innovation
Council report, “When
Advanced Persistent Threats
Go Mainstream,”
Chuck Hollis
VP – CTO, EMC Corporation
“The core of the most effective [advanced threat]
response appears to be a new breed of security
analytics that help quickly detect anomalous
patterns -- basically power tools in the hands of a
new and important sub-category of data scientists:
the security analytics expert..”
“[Security teams need] an analytical engine to sift
through massive amounts of real-time and
historical data at high speeds to develop trending
on user and system activity and reveal anomalies
that indicate compromise.”
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Step 1: Collect ALL The Data in One Location
Servers
Service
Desk
Storage
DesktopsEmail Web
Call
Records
Network
Flows
DHCP/ DNS
Hypervisor
Custom
Apps
Industrial
Control /
HVAC
Badges
Databases
Mobile
Intrusion
Detection
Firewall
Data Loss
Prevention
Anti-
Malware
Vulnerability
Scans
Traditional SIEM
Authentication
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Need Both Network and Endpoint
And Inbound/Outbound!
Network
Based
Indicators
Host Based
Indicators
Best
chance of
Detecting
the APT
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Enrich Indexed Data with External Data / Lookups
Geo-IP
Mapping
3rd-party
threat
intel
Asset
Info
Prohibited
Services /
Apps
Critical
Network
Segments /
Honeypots
Employee
Info
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Step 2: Identify Threat Activity
• What’s the M.O. of the attacker? (think like a
criminal)
• What/who are the most critical assets and
employees?
• What minute patterns/correlations in ‘normal’ IT
activities would represent ‘abnormal’ activity?
• What in my environment is
different/new/changed?
• What is rarely seen or standard deviations off the
norm?
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Survey
• Obtain a full picture of an environment: network, endpoint, mobile, and virtual,
including the technologies deployed to secure the environment.
Write
• Create targeted, context-aware malware.
Test
• Ensure the malware works as intended, specifically so it can evade security tools in
place.
Execute
• Navigate through the extended network—being environmentally aware, evading
detection, and moving laterally until reaching the target.
Accomplish
the Mission
• Gather data, create disruption, or cause destruction.
The APT Attack Chain
Cisco Annual Security Report 2014
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
What a Big Data Solution looks like
Big Data Architecture
Data Inclusion Model
 All the original data from any source
 No database schema to limit investigations/detection
 Lookups against external data sources
 Search & reporting flexibility
 Advanced correlations
 Math/statistics to baseline and find
outliers/anomalies
 Real-time indexing and alerting
 “Known” and “Unknown” threat detection
 Scales horizontally to
 Ideally, One product, UI, and datastore
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Big Data Evolution
Reactive
Search
and
Investigate
Proactive
Monitoring
and Alerting
Operational
Visibility
ProactiveReal-time
Business
Insight
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Sample Correlation of Unknown Threats
2013-08-09 16:21:38 10.11.36.29 98483 148 TCP_HIT 200 200 0 622 - - OBSERVED GET
www.neverbeenseenbefore.com HTTP/1.1 0 "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1;
.NET CLR 2.0.50727; InfoPath.1; MS-RTC LM 8;.NET CLR 3.0.4506.2152; ) User John Doe,"
08/09/2013 16:23:51.0128event_status="(0)The operation completed successfully. "pid=1300
process_image="John DoeDeviceHarddiskVolume1WindowsSystem32neverseenbefore.exe“
registry_type ="CreateKey"key_path="REGISTRYMACHINESOFTWAREMicrosoftWindows
NTCurrentVersion Printers PrintProviders John Doe-PCPrinters{} NeverSeenbefore" data_type""
2013-08-09T12:40:25.475Z,,exch-hub-den-01,,exch-mbx-cup-
00,,,STOREDRIVER,DELIVER,79426,<20130809050115.18154.11234@acme.com>,johndoe@acme.com,
,685191,1,,, hacker@neverseenbefore.com , Please open this attachment with payroll information,,
,2013-08-09T22:40:24.975Z
Endpoint
Logs
Web Proxy
Email Server
All three occurring within a 24-hour period
Example Correlation - Spearphishing
User Name
User Name
Rarely seen email domain
Rarely visited web site
User Name
Rarely seen service
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Fingerprints of an Advanced Threat
What to Look For Why
Data
Source
Attack
Phase
Rarely seen registry, service, DLL. Or they fail
hash checks.
Malware or remote access
toolkit
OS Back door
Account creation or privilege escalation without
corresponding IT service desk ticket
Creating new admin accounts AD/ Service
Desk logs
Lateral
movement
A non-IT machine logging directly into multiple
servers. Or chained logins.
Threat accessing multiple
machines
AD /asset
info
Lateral
movement
For single employee: Badges in at one location,
then logs in countries away
Stealing credentials Badge/
VPN/ Auth
Data
gathering
Employee makes standard deviations more data
requests from file server with confidential data
than normal
Gathering confidential data for
theft
OS Data
gathering
Standard deviations larger traffic flows (incl DNS)
from a host to a given IP
Exfiltration of info NetFlow Exfiltration
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Step 3: Remediate and Automate
• Where else in my environment do I see the
“Indicators of Compromise” (IOC)?
• Remediate infected machines
• Fix weaknesses, including employee education
• Turn IOC into a real-time search for future threats
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Security Realities…
• Big Data is only as good as the data in
it and people behind the UI
• No replacement for capable
practitioners
• Put math and statistics to work for you
• Encourage IT Security creativity and
thinking outside the box
• Fine tuning needed; always will be false
positives
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Recap
• Step 1: Collect ALL The Data in One Location
• Step 2: Identify Threat Activity
• Step 3: Remediate and Automate
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Questions?
© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied.
Thank You
Micah Montgomery
Solutions Architect, Big Data and InfoSec
mmontgomery@gtri.com

Contenu connexe

Tendances

Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!centralohioissa
 
Threat hunting in cyber world
Threat hunting in cyber worldThreat hunting in cyber world
Threat hunting in cyber worldAkash Sarode
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9UISGCON
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Burton Lee
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...REVULN
 
The Business Benefits of Threat Intelligence Webinar
The Business Benefits of Threat Intelligence WebinarThe Business Benefits of Threat Intelligence Webinar
The Business Benefits of Threat Intelligence WebinarThreatConnect
 
Honeynet architecture
Honeynet architectureHoneynet architecture
Honeynet architectureamar koppal
 
The Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceThe Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceImperva
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
 
Statistical analysis of HTTPS reachability
Statistical analysis of HTTPS reachabilityStatistical analysis of HTTPS reachability
Statistical analysis of HTTPS reachabilityAPNIC
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsMark Arena
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Raffael Marty
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
Jerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTJerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTcentralohioissa
 
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response TeamBGA Cyber Security
 

Tendances (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Red team Engagement
Red team EngagementRed team Engagement
Red team Engagement
 
Ransomware ly
Ransomware lyRansomware ly
Ransomware ly
 
Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!
 
Threat hunting in cyber world
Threat hunting in cyber worldThreat hunting in cyber world
Threat hunting in cyber world
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
 
The Business Benefits of Threat Intelligence Webinar
The Business Benefits of Threat Intelligence WebinarThe Business Benefits of Threat Intelligence Webinar
The Business Benefits of Threat Intelligence Webinar
 
Honeynet architecture
Honeynet architectureHoneynet architecture
Honeynet architecture
 
The Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceThe Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat Intelligence
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Statistical analysis of HTTPS reachability
Statistical analysis of HTTPS reachabilityStatistical analysis of HTTPS reachability
Statistical analysis of HTTPS reachability
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Jerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTJerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINT
 
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
 

En vedette

Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6Zivaro Inc
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6Zivaro Inc
 
Single Glass of Pain: See Your World, Maybe You Wish You Hadn't
Single Glass of Pain: See Your World, Maybe You Wish You Hadn'tSingle Glass of Pain: See Your World, Maybe You Wish You Hadn't
Single Glass of Pain: See Your World, Maybe You Wish You Hadn'tZivaro Inc
 
Post IPv6 Implementation and Security: Now What?
Post IPv6 Implementation and Security: Now What?Post IPv6 Implementation and Security: Now What?
Post IPv6 Implementation and Security: Now What?Zivaro Inc
 
Using Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsUsing Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsZivaro Inc
 
IPv6 Security - Hacker Halted 2013
IPv6 Security - Hacker Halted 2013IPv6 Security - Hacker Halted 2013
IPv6 Security - Hacker Halted 2013Zivaro Inc
 
Support Software Defined Networking with Dynamic Network Architecture
Support Software Defined Networking with Dynamic Network ArchitectureSupport Software Defined Networking with Dynamic Network Architecture
Support Software Defined Networking with Dynamic Network ArchitectureZivaro Inc
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefZivaro Inc
 
GTRI.com Splunk for Vmware APP
GTRI.com Splunk for Vmware APPGTRI.com Splunk for Vmware APP
GTRI.com Splunk for Vmware APPZivaro Inc
 
Splunk for Real time alerting and monitoring. www.gtri.com
Splunk for Real time alerting and monitoring. www.gtri.comSplunk for Real time alerting and monitoring. www.gtri.com
Splunk for Real time alerting and monitoring. www.gtri.comZivaro Inc
 
Splunk Enterprise 6.3 - Splunk Tech Day
Splunk Enterprise 6.3 - Splunk Tech DaySplunk Enterprise 6.3 - Splunk Tech Day
Splunk Enterprise 6.3 - Splunk Tech DayZivaro Inc
 
Software-Defined WAN 101
Software-Defined WAN 101Software-Defined WAN 101
Software-Defined WAN 101Zivaro Inc
 
Software Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXSoftware Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXZivaro Inc
 
GTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech DayGTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech DayZivaro Inc
 
Petit Déj' "Ergonomie et SEO" organisé par Use Age le 26 Septembre 2013
Petit Déj' "Ergonomie et SEO" organisé par Use Age le 26 Septembre 2013Petit Déj' "Ergonomie et SEO" organisé par Use Age le 26 Septembre 2013
Petit Déj' "Ergonomie et SEO" organisé par Use Age le 26 Septembre 2013Use Age
 
GTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech DayGTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech DayZivaro Inc
 
Big Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better TogetherBig Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better TogetherZivaro Inc
 
Organizational Change Management
Organizational Change ManagementOrganizational Change Management
Organizational Change ManagementZivaro Inc
 
Enib cours c.a.i. web - séance #1 - html5 css3-js - 1
Enib   cours c.a.i. web - séance #1 - html5 css3-js - 1Enib   cours c.a.i. web - séance #1 - html5 css3-js - 1
Enib cours c.a.i. web - séance #1 - html5 css3-js - 1Horacio Gonzalez
 
Beyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security TechnologiesBeyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security TechnologiesZivaro Inc
 

En vedette (20)

Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6
 
Single Glass of Pain: See Your World, Maybe You Wish You Hadn't
Single Glass of Pain: See Your World, Maybe You Wish You Hadn'tSingle Glass of Pain: See Your World, Maybe You Wish You Hadn't
Single Glass of Pain: See Your World, Maybe You Wish You Hadn't
 
Post IPv6 Implementation and Security: Now What?
Post IPv6 Implementation and Security: Now What?Post IPv6 Implementation and Security: Now What?
Post IPv6 Implementation and Security: Now What?
 
Using Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsUsing Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced Threats
 
IPv6 Security - Hacker Halted 2013
IPv6 Security - Hacker Halted 2013IPv6 Security - Hacker Halted 2013
IPv6 Security - Hacker Halted 2013
 
Support Software Defined Networking with Dynamic Network Architecture
Support Software Defined Networking with Dynamic Network ArchitectureSupport Software Defined Networking with Dynamic Network Architecture
Support Software Defined Networking with Dynamic Network Architecture
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology Brief
 
GTRI.com Splunk for Vmware APP
GTRI.com Splunk for Vmware APPGTRI.com Splunk for Vmware APP
GTRI.com Splunk for Vmware APP
 
Splunk for Real time alerting and monitoring. www.gtri.com
Splunk for Real time alerting and monitoring. www.gtri.comSplunk for Real time alerting and monitoring. www.gtri.com
Splunk for Real time alerting and monitoring. www.gtri.com
 
Splunk Enterprise 6.3 - Splunk Tech Day
Splunk Enterprise 6.3 - Splunk Tech DaySplunk Enterprise 6.3 - Splunk Tech Day
Splunk Enterprise 6.3 - Splunk Tech Day
 
Software-Defined WAN 101
Software-Defined WAN 101Software-Defined WAN 101
Software-Defined WAN 101
 
Software Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXSoftware Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSX
 
GTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech DayGTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech Day
 
Petit Déj' "Ergonomie et SEO" organisé par Use Age le 26 Septembre 2013
Petit Déj' "Ergonomie et SEO" organisé par Use Age le 26 Septembre 2013Petit Déj' "Ergonomie et SEO" organisé par Use Age le 26 Septembre 2013
Petit Déj' "Ergonomie et SEO" organisé par Use Age le 26 Septembre 2013
 
GTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech DayGTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech Day
 
Big Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better TogetherBig Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better Together
 
Organizational Change Management
Organizational Change ManagementOrganizational Change Management
Organizational Change Management
 
Enib cours c.a.i. web - séance #1 - html5 css3-js - 1
Enib   cours c.a.i. web - séance #1 - html5 css3-js - 1Enib   cours c.a.i. web - séance #1 - html5 css3-js - 1
Enib cours c.a.i. web - séance #1 - html5 css3-js - 1
 
Beyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security TechnologiesBeyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security Technologies
 

Similaire à Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats

Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tBeau Christensen
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?360mnbsu
 
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]Interset
 
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]Interset
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfKerimBozkanli
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacksAppSense
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTSimone Onofri
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetWatcher
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datosSoftware Guru
 
Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Niel Dunnage
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the UnionCloudera, Inc.
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoHP Enterprise Italia
 
IANS Forum Dallas - Technology Spotlight Session
IANS Forum Dallas - Technology Spotlight SessionIANS Forum Dallas - Technology Spotlight Session
IANS Forum Dallas - Technology Spotlight SessionInterset
 

Similaire à Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats (20)

Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_t
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
 
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
 
Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
IANS Forum Dallas - Technology Spotlight Session
IANS Forum Dallas - Technology Spotlight SessionIANS Forum Dallas - Technology Spotlight Session
IANS Forum Dallas - Technology Spotlight Session
 

Plus de Zivaro Inc

How to Rightsize Your Citrix Investment
How to Rightsize Your Citrix InvestmentHow to Rightsize Your Citrix Investment
How to Rightsize Your Citrix InvestmentZivaro Inc
 
On-Prem vs. Cloud Collaboration Showdown
On-Prem vs. Cloud Collaboration ShowdownOn-Prem vs. Cloud Collaboration Showdown
On-Prem vs. Cloud Collaboration ShowdownZivaro Inc
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRIZivaro Inc
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinZivaro Inc
 
Denver Big Data Analytics Day
Denver Big Data Analytics DayDenver Big Data Analytics Day
Denver Big Data Analytics DayZivaro Inc
 
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingCisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingZivaro Inc
 
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech DaySplunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech DayZivaro Inc
 
GTRI Splunk Elite Partner Capabilities
GTRI Splunk Elite Partner CapabilitiesGTRI Splunk Elite Partner Capabilities
GTRI Splunk Elite Partner CapabilitiesZivaro Inc
 

Plus de Zivaro Inc (8)

How to Rightsize Your Citrix Investment
How to Rightsize Your Citrix InvestmentHow to Rightsize Your Citrix Investment
How to Rightsize Your Citrix Investment
 
On-Prem vs. Cloud Collaboration Showdown
On-Prem vs. Cloud Collaboration ShowdownOn-Prem vs. Cloud Collaboration Showdown
On-Prem vs. Cloud Collaboration Showdown
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same Coin
 
Denver Big Data Analytics Day
Denver Big Data Analytics DayDenver Big Data Analytics Day
Denver Big Data Analytics Day
 
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingCisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined Networking
 
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech DaySplunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
 
GTRI Splunk Elite Partner Capabilities
GTRI Splunk Elite Partner CapabilitiesGTRI Splunk Elite Partner Capabilities
GTRI Splunk Elite Partner Capabilities
 

Dernier

Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 

Dernier (20)

Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 

Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats

  • 1. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied.© 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS Presented by GTRI Micah Montgomery Solutions Architect, Big Data and InfoSec August 27, 2014
  • 2. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Security Presentation Template Scare them Unscare them
  • 3. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Security Presentation Template Big Data Advanced Threats
  • 4. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Here Comes the Scary Part…..
  • 5. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Cisco 2014 Annual Security Report Key Discoveries – Attacks against infrastructure are targeting significant resources across the Internet – Malicious actors are using trusted applications to exploit gaps in perimeter security – Investigations of multinational companies show evidence of internal compromise. Suspicious traffic is emanating from their networks and attempting to connect to questionable sites (100 percent of companies are calling malicious malware hosts)
  • 6. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. The Pervasiveness of Malicious Traffic
  • 7. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. • By 2018, the gigabyte equivalent of all movies ever made will cross the global Internet every 3 minutes. • Globally, IP traffic will reach 400 terabits per second (Tbps) in 2018, the equivalent of 148 million people streaming Internet HD video simultaneously, all day, every day. • Global IP traffic in 2018 will be equivalent to 395 billion DVDs per year, 33 billion DVDs per month, or 45 million DVDs per hour. Traffic demands are only going up…
  • 8. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied.
  • 9. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Advanced Threats Outpace the Defenders Adversary You Time Technical Capabilities
  • 10. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Advanced Threats Are Hard to Detect 100% Valid credentials were used 40 Average # of systems accessed 243 Median # of days before detection 63% Of victims were notified by external entity Source: Mandiant M-Trends Report 2012 and 2013
  • 11. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Advanced Threat Pattern – Not Signature Based Infiltration Back Door Exfiltration Data GatheringRecon Phishing or web drive-by. Email has attached malware or link to malware Malware installs remote access toolkit(s) Malware obtains credentials to key systems and identifies valuable data Data is acquired and staged for exfiltration Data is exfiltrated as encrypted files via HTTP/S, FTP, DNS
  • 12. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Traditional SIEMs Miss The Threats • Limited view of security threats. Difficult to collect all data sources. Costly, custom collectors. Datastore w/schema • Inflexible search/reporting hampers investigations and threat detection • Scale/speed issues impede ability to do fast analytics • Difficult to deploy and manage; often multiple products
  • 13. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Better Defensive Cybersecurity Tools Needed
  • 14. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Here Comes The Solution Big Data
  • 15. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. So What is Big Data Anyway?
  • 16. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. “Big Data” Definition • Wikipedia: Collection of data sets so large and complex that it becomes difficult to process using database management tools • Gartner: The Three Vs 1. Data Volume 2. Data Variety 3. Data Velocity • Security has always been a Big Data problem; now we are finding ways to solve it
  • 17. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Big Data is Used Across IT and the Business App Mgmt IT Ops Security Compliance Fraud Business Intelligence Big Data
  • 18. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Machine Data / Logs are Big Data 2013-08-09 16:21:38 10.11.36.29 98483 148 TCP_HIT 200 200 0 622 - - OBSERVED GET www.neverbeenseenbefore.com HTTP/1.1 0 "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; InfoPath.1; MS-RTC LM 8; .NET CLR 1.1.4322; .NET CLR 3.0.4506.2152; ) User John Doe," 08/09/2013 16:23:51.0128event_status="(0)The operation completed successfully. "pid=1300 process_image="John DoeDeviceHarddiskVolume1WindowsSystem32neverseenbefore.exe“ registry_type ="CreateKey"key_path="REGISTRYMACHINESOFTWAREMicrosoftWindows NTCurrentVersion Printers PrintProviders John Doe-PCPrinters{} NeverSeenbefore" data_type"" Endpoint Logs Web Proxy Aug 08 06:09:13 acmesep01.acmetech.com Aug 09 06:17:24 SymantecServer acmesep01: Virus found,Computer name: ACME-002,Source: Real Time Scan,Risk name: Hackertool.rootkit,Occurrences: 1,C:/Documents and Settings/smithe/Local Settings/Temp/evil.tmp,"""",Actual action: Quarantined,Requested action: Cleaned, time: 2009-01-23 03:19:12,Inserted: 2009-01-23 03:20:12,End: 2009-01-23 03:19:12,Domain: Default,Group: My CompanyACME Remote,Server: acmesep01,User: smithe,Source computer: ,Source IP: 10.11.36.20 20130806041221.000000Caption=ACME-2975EBAdministrator Description=Built-in account for administering the computer/domainDomain=ACME-2975EB InstallDate=NULLLocalAccount = IP: 10.11.36.20 TrueName=Administrator SID =S-1-5-21-1715567821-926492609-725345543 500SIDType=1 Status=Degradedwmi_ type=UserAccounts Anti-virus Authentications
  • 19. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Big Data Analytics Security for Business Innovation Council report, “When Advanced Persistent Threats Go Mainstream,” Chuck Hollis VP – CTO, EMC Corporation “The core of the most effective [advanced threat] response appears to be a new breed of security analytics that help quickly detect anomalous patterns -- basically power tools in the hands of a new and important sub-category of data scientists: the security analytics expert..” “[Security teams need] an analytical engine to sift through massive amounts of real-time and historical data at high speeds to develop trending on user and system activity and reveal anomalies that indicate compromise.”
  • 20. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Step 1: Collect ALL The Data in One Location Servers Service Desk Storage DesktopsEmail Web Call Records Network Flows DHCP/ DNS Hypervisor Custom Apps Industrial Control / HVAC Badges Databases Mobile Intrusion Detection Firewall Data Loss Prevention Anti- Malware Vulnerability Scans Traditional SIEM Authentication
  • 21. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Need Both Network and Endpoint And Inbound/Outbound! Network Based Indicators Host Based Indicators Best chance of Detecting the APT
  • 22. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Enrich Indexed Data with External Data / Lookups Geo-IP Mapping 3rd-party threat intel Asset Info Prohibited Services / Apps Critical Network Segments / Honeypots Employee Info
  • 23. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Step 2: Identify Threat Activity • What’s the M.O. of the attacker? (think like a criminal) • What/who are the most critical assets and employees? • What minute patterns/correlations in ‘normal’ IT activities would represent ‘abnormal’ activity? • What in my environment is different/new/changed? • What is rarely seen or standard deviations off the norm?
  • 24. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Survey • Obtain a full picture of an environment: network, endpoint, mobile, and virtual, including the technologies deployed to secure the environment. Write • Create targeted, context-aware malware. Test • Ensure the malware works as intended, specifically so it can evade security tools in place. Execute • Navigate through the extended network—being environmentally aware, evading detection, and moving laterally until reaching the target. Accomplish the Mission • Gather data, create disruption, or cause destruction. The APT Attack Chain Cisco Annual Security Report 2014
  • 25. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. What a Big Data Solution looks like Big Data Architecture Data Inclusion Model  All the original data from any source  No database schema to limit investigations/detection  Lookups against external data sources  Search & reporting flexibility  Advanced correlations  Math/statistics to baseline and find outliers/anomalies  Real-time indexing and alerting  “Known” and “Unknown” threat detection  Scales horizontally to  Ideally, One product, UI, and datastore
  • 26. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Big Data Evolution Reactive Search and Investigate Proactive Monitoring and Alerting Operational Visibility ProactiveReal-time Business Insight
  • 27. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied.
  • 28. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Sample Correlation of Unknown Threats 2013-08-09 16:21:38 10.11.36.29 98483 148 TCP_HIT 200 200 0 622 - - OBSERVED GET www.neverbeenseenbefore.com HTTP/1.1 0 "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; InfoPath.1; MS-RTC LM 8;.NET CLR 3.0.4506.2152; ) User John Doe," 08/09/2013 16:23:51.0128event_status="(0)The operation completed successfully. "pid=1300 process_image="John DoeDeviceHarddiskVolume1WindowsSystem32neverseenbefore.exe“ registry_type ="CreateKey"key_path="REGISTRYMACHINESOFTWAREMicrosoftWindows NTCurrentVersion Printers PrintProviders John Doe-PCPrinters{} NeverSeenbefore" data_type"" 2013-08-09T12:40:25.475Z,,exch-hub-den-01,,exch-mbx-cup- 00,,,STOREDRIVER,DELIVER,79426,<20130809050115.18154.11234@acme.com>,johndoe@acme.com, ,685191,1,,, hacker@neverseenbefore.com , Please open this attachment with payroll information,, ,2013-08-09T22:40:24.975Z Endpoint Logs Web Proxy Email Server All three occurring within a 24-hour period Example Correlation - Spearphishing User Name User Name Rarely seen email domain Rarely visited web site User Name Rarely seen service
  • 29. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Fingerprints of an Advanced Threat What to Look For Why Data Source Attack Phase Rarely seen registry, service, DLL. Or they fail hash checks. Malware or remote access toolkit OS Back door Account creation or privilege escalation without corresponding IT service desk ticket Creating new admin accounts AD/ Service Desk logs Lateral movement A non-IT machine logging directly into multiple servers. Or chained logins. Threat accessing multiple machines AD /asset info Lateral movement For single employee: Badges in at one location, then logs in countries away Stealing credentials Badge/ VPN/ Auth Data gathering Employee makes standard deviations more data requests from file server with confidential data than normal Gathering confidential data for theft OS Data gathering Standard deviations larger traffic flows (incl DNS) from a host to a given IP Exfiltration of info NetFlow Exfiltration
  • 30. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Step 3: Remediate and Automate • Where else in my environment do I see the “Indicators of Compromise” (IOC)? • Remediate infected machines • Fix weaknesses, including employee education • Turn IOC into a real-time search for future threats
  • 31. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Security Realities… • Big Data is only as good as the data in it and people behind the UI • No replacement for capable practitioners • Put math and statistics to work for you • Encourage IT Security creativity and thinking outside the box • Fine tuning needed; always will be false positives
  • 32. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Recap • Step 1: Collect ALL The Data in One Location • Step 2: Identify Threat Activity • Step 3: Remediate and Automate
  • 33. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Questions?
  • 34. © 2014 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Thank You Micah Montgomery Solutions Architect, Big Data and InfoSec mmontgomery@gtri.com

Notes de l'éditeur

  1. https://www.cisco.com/web/offers/lp/2014-annual-security-report/index.html
  2. Here is why SIEMs are not catching the advanced threats and not generating value in general. For point 1, traditional SIEMs suffer from: Collectors or backend database require data reduction or normalization – hampers security use cases Little support for custom data sources Brittle collectors break when data format changes Clock icon indicates slow searches and long time to deploy. Dollar sign is the expensive costs behind the long deployment (lots of prof serv) and multiple products.
  3. Better visibility on advanced threats and also way to do incident investigations after the fact
  4. Important – initially IT Ops and App mgmt. Takes in non-security data
  5. Key part of IT security is protecting confidential data. Which means detecting advanced threats, like cybercriminals or malicious insiders, before they can steal your data. To detect or investigate them, you need non-security and security data because advanced threats avoid detection from signature-based security products; the fingerprints of an advanced threat often are in the “non-security” data. Most traditional SIEMs just focus on gathering signature-based threats which do *not* have the fingerprints of advanced threats. Also the above scenario is worse if there is no SIEM. Instead point UIs and grep are used and aggregating data is very manual and time consuming.
  6. What is not big data - data warehouses/database. They cannot take in all the original data. Also often batch-oriented, not real-time. Explain the key security use cases