SlideShare une entreprise Scribd logo
1  sur  43
© 2019 SPLUNK INC.© 2019 SPLUNK INC.
Drive More Value from Your Security Operations:
Connecting Security to the Business
With Splunk
James Hanlon | Director of Security Specialization, EMEA
13 June 2019
© 2019 SPLUNK INC.
Who am I
▶ Director of Splunk Security
Specialization for EMEA
▶ Work with many large & small
Splunk security customers
▶ Provide customer security
advisory services
▶ 17+ years in Security
© 2019 SPLUNK INC.
We Listen
We Learn
We Understand
We Bring It Back
What is value in security
operations?
© 2019 SPLUNK INC.
What is the value of
Security in 2019?
Even for some security teams, this can be hard to define
© 2019 SPLUNK INC.
How much more valuable is a secure
company worth than an insecure one?
How much security is
enough?
How should security
resources be invested
and applied for optimal
ROI?
What is the impact of
the threat?
© 2019 SPLUNK INC.
Adequate Security
(Risk Managed)
Security ROI (SROI)
Sufficient Security
(Compliance Driven)
Differentiated
Security
© 2019 SPLUNK INC.
© 2019 SPLUNK INC.
▶ Organizational
Awareness
▶ Understanding
the threat
exposure &
profile
▶ Demonstrating
the value of
Security
Organizational Situational Awareness &
Threat Profile
© 2019 SPLUNK INC.
▶ Clarity of
mission
▶ Known
current and
future state
▶ How to
transform
security
The Security
Mission
© 2019 SPLUNK INC.
▶ Ownership
▶ Volume
▶ Technical know how
Getting Data Visibility
for the Security
© 2019 SPLUNK INC.
▶ Legacy IT complexity
▶ Emergent Technology
▶ Consolidation drives &
cost reduction
IT Complexity and Emerging Digital Channels
© 2019 SPLUNK INC.
Security Operations Processes & Resources
▶ Hire ▶ Automate▶ Develop ▶ Optimize▶ Retain
© 2019 SPLUNK INC.
Prescriptive Security Operations Guidance
What to do first, second and last (or not at all)?
© 2019 SPLUNK INC.
416
78
▶ MTTD
▶ MTTR
▶ Dwell Time
▶ TTV
Time
© 2019 SPLUNK INC.
▶ Security Analytics
▶ Machine Learning (AI)
▶ Automation
▶ Cloud based SecOps
The Expansive & Emergent Security
Technology Landscape
© 2019 SPLUNK INC.
So, the value of security can often be characterized by the
organizational strategy…and the barriers
© 2019 SPLUNK INC.
We Listen
We Learn
We Understand
We Bring It Back
© 2019 SPLUNK INC.
Translating the Value of Splunk Security
Security Data Analytics
Value: Gain full data visibility of any
legacy or emergent technology or platform
Driver: Risk mitigation Whether on-prem or cloud,
Splunk data and non-Splunk data sources can easily be
ingested into and segmented by the tool.
Security Automation
Value: lower human workloads, security
process inefficiency & MTTR
Driver: cost avoidance
Security Machine Learning (AI)
Value: Detect unknows / detect faster
Driver: cost avoidance, risk mitigation
Integrated Security Platform
Value: Increase TTV through integrated,
consolidated and contextual toolsets
Driver: cost avoidance r on-prem or cloud, Splunk
data and non-Splunk data sources can easily be ingested into
and segmented by the tool.
Flexible Visualisation & Reporting
Value: Increase security visibility and
organizational business insights
Driver: Risk mitigation
Prescriptive Security Content
Value: be guided by industry led advice
Driver: cost avoidance
© 2019 SPLUNK INC.
NETWORK
THREAT
INTELLIGENCE
MOBILE
ENDPOINTS
IDENTITY
AND ACCESS
CLOUD
SECURITY
WAF AND APP
SECURITY
WEB PROXY
FIREWALL
ANALYTICS
ORCHESTRATION
Observe
Decide
Orient
Act
Splunk’s Security Vision
90%
TIER 1 ANALYST WORK WILL BE
AUTOMATED
50%
TIME NOW SPENT TUNING DETECTION
AND RESPONSE LOGIC
1PLATFORM TO ORCHESTRATE THEM ALL
© 2019 SPLUNK INC.
Splunk Security Operations Suite
P L A T F O R M
D A T A
S O U R C E S
U S E C A S E S
A P P L I C A T I O N S
Security
ContentUpdates Security Monitoring
Logs Business Context Threat Intelligence
+
Compliance & Data
Privacy
Advanced Threat
Detection
Incident Investigation &
Forensics
Insider Threat
Detection
Incident Response
Fraud Analytics &
Detection
SOC Automation
© 2019 SPLUNK INC.
We Listen
We Learn
We Understand
We Bring It Back
Helping you unlock the
value of Splunk Security
© 2019 SPLUNK INC.
Introducing the Security Prescriptive Path
Helping You Drive More from your Splunk Investment
© 2019 SPLUNK INC.
>
>
Security Paths Value Paths
Security
Operations
Compliance
>Fraud
 faster detection and triage of
security alerts and insider threats
 better discovery of targeted and
advanced threats
 faster investigation and
remediation of security incidents
 reduced risk of breach, disruption,
damage and data leakage
 reduction in compliance
reporting time
 reduction in potential
compliance penalties
 reduction in risk of fraud
 reduction in fraud losses
Compliance
Fraud Monitoring and Investigation
Insider
Threat
SOAR
Security
Investigation
Security
Monitoring
Advanced
Thread
Incident
Response &
Forensics
3 Paths - 8 Security Use Cases - 70 Security Capabilities
© 2019 SPLUNK INC.
Examples of how Customers have realized value Splunk Security
“The How”
© 2019 SPLUNK INC.
Addressing The Barriers to Value:
Data Volume, Data Visibility & IT Complexity
How Splunk Security Analytics Drives Value
Any Data Analytics Investigative Platform
© 2019 SPLUNK INC.
Investigation & Analytics with Splunk
LEARN MORE
© 2019 SPLUNK INC.
Addressing The Barriers to Value:
Integrating Security Tooling | Industry Led Analytics Guidance
How Splunk Security Analytics Drives Value
Pre-built Security
Workflows
Guided Security
Analytics
© 2019 SPLUNK INC.
Triage & Investigation Workflows
LEARN MORE
© 2019 SPLUNK INC.
LEARN MORE
Operationalizing Security Analytics Content Development
© 2019 SPLUNK INC.
Addressing The Barriers to Value:
Human Workload | Process Repeatability
Automate Security
Tasks
Process Efficiency &
Repeatability
How Splunk Security Analytics Drives Value
© 2019 SPLUNK INC.
Security Automation with Splunk
LEARN MORE
© 2019 SPLUNK INC.
Addressing The Barriers to Value:
Reduce MTTD, MTTR I Connecting with the Business
Machine Learning for
Security
How Splunk Security Analytics Drives Value
Business & IT Risk
Reporting
© 2019 SPLUNK INC.
LEARN MORE
Security Risk Reporting with Splunk
© 2019 SPLUNK INC.
© 2019 SPLUNK INC.
Designed to help
optimize value in your
security operations
 Increase security visibility,
tackle IT complexity
 Provide prescriptive guidance
 Increase process efficiency,
lower MTTD, MTTR
 Enable business focused
security risk reporting
Security Mission
© 2019 SPLUNK INC.
We Listen
We Learn
We Understand
We Bring It Back
Using Analytics to
Connect Security to the
Business
© 2019 SPLUNK INC.
© 2019 SPLUNK INC.
Gartner 2017
Analytics is Now A Foundational Security Operations
Capability
© 2019 SPLUNK INC.
Logs Wired DB Mobile IoT APIMetrics
Any volume
Any location
Any type
Machine Data
Storage
Silo 1
Storage
Silo 2
Networ
k Silo
Proxy
Silo
App
Silo
VMs
Silo
SCADA
Silo
AWS
Silo
Azure
Silo
APM
Silo
more
Silos
Servers
Silo
Data sources
IT OPERATIONS SECURITY Business AnalyticsDevOps/App analytics
Use
Cases
IoT
Different people asking different questions on the same data, in real time
Splunkbase;
1900+ Free
Apps/add-ons
Splunk>
MINT
Splunk> Industrial Asset
Management
MQTT
Modular Input
Kepware
IDF to Metrics
Splunk>
App for Infrastructure
Splunk>
Stream
JMX
JAVA
Splunk>
DB Connect
Fast Time to Value
Premium
Apps
AI / Machine Learning
accelerators
30%↓ Risk* 4%↑ supply chain
throughput **
70%+↓ QA
troubleshooting*
25%+↓ power/facility***
• 3rd Party (ServiceNow, CMDB, SIEM…)
• Structured data
> Automate
> Collaborative
incident response
SAME DATA, MULTIPLE USE CASES
Splunk Platform
(Cloud / On-prem)
DATA SOURCES CORRELATION
Data to Answers
Splunk>
Machine Learning Toolkit
70% to 90%↓ MTTR*
But an Analytics capability can do much more across
across many IT domains
© 2019 SPLUNK INC.
Converged Analytics for Business Value
We call this..
© 2019 SPLUNK INC.
Extracting Value Through Converged Data Analytics
Security, IoT & Industrial Data Analytics
© 2019 SPLUNK INC.
UCAS
GDPR Compliance, IT Operations & Security
© 2019 SPLUNK INC.
SecOps / SOC
Strategy & Metrics
(Operational Security)
Adversary,Threat,Controls,Vulnerability
orITRiskDrivenSOCstrategies
Corporate/IT
Initiative 1
Corporate
Mission &
Goals
Corporate/IT
Initiative 2
Corporate/IT
Initiative 3
Corporate/IT
Initiative N
Reducing this gap provides business enabling alignment for Security & SOC teams
Business Enabling Data & Security
Insights
(Data Analytics Enabled)
Analytics Driven Approach to Connect Security to the Business
© 2019 SPLUNK INC.
DEMO
Splunk Security Prescriptive Value Path (PVP)
© 2019 SPLUNK INC.
Realities that Worry Executives?
Only 28 percent of companies
use project performance
techniques (PMI, 2017)
Most organizations have a 70%
project failure rate (4PM)
Only 64% of projects meet their
goals (Wrike)
Executives
need prescriptive plans to
mitigate these risks
© 2019 SPLUNK INC.
Introducing the Security Prescriptive Path
Helping You Drive More from your Splunk Investment
© 2019 SPLUNK INC.
>
>
Security Paths Value Paths
Security
Operations
Compliance
>Fraud
 faster detection and triage of
security alerts and insider threats
 better discovery of targeted and
advanced threats
 faster investigation and
remediation of security incidents
 reduced risk of breach, disruption,
damage and data leakage
 reduction in compliance
reporting time
 reduction in potential
compliance penalties
 reduction in risk of fraud
 reduction in fraud losses
Compliance
Fraud Monitoring and Investigation
Insider
Threat
SOAR
Security
Investigation
Security
Monitoring
Advanced
Thread
Incident
Response &
Forensics
3 Paths - 8 Security Use Cases - 70 Security Capabilities
© 2019 SPLUNK INC.
Final Thoughts
Takeaways
© 2019 SPLUNK INC.
Splunk are committed to
helping customer drive
more value from their
investments in Security
Read how other
customers have found
value from their
investments with Splunk
Speak to your account
team about conducting a
prescriptive value path
(PVP) assessment with
Splunk
Key Takeaways
© 2019 SPLUNK INC.
Learn how others have found value with Splunk
https://conf.splunk.com/
© 2019 SPLUNK INC.© 2019 SPLUNK INC.
Thank You.
Don’t forget to rate this session
in the SplunkLive! mobile app

Contenu connexe

Tendances

Tendances (17)

Still Suffering from IT Outages? Accept Failure, Learn from Failure and Get R...
Still Suffering from IT Outages? Accept Failure, Learn from Failure and Get R...Still Suffering from IT Outages? Accept Failure, Learn from Failure and Get R...
Still Suffering from IT Outages? Accept Failure, Learn from Failure and Get R...
 
The DevOps Promise: Helping Management Realise the Quality, Velocity & Effici...
The DevOps Promise: Helping Management Realise the Quality, Velocity & Effici...The DevOps Promise: Helping Management Realise the Quality, Velocity & Effici...
The DevOps Promise: Helping Management Realise the Quality, Velocity & Effici...
 
Accelerate incident Response Using Orchestration and Automation
Accelerate incident Response Using Orchestration and Automation Accelerate incident Response Using Orchestration and Automation
Accelerate incident Response Using Orchestration and Automation
 
Machine Learning in Action
Machine Learning in ActionMachine Learning in Action
Machine Learning in Action
 
Leveraging Splunk Enterprise Security with the MITRE’s ATT&CK Framework
Leveraging Splunk Enterprise Security with the MITRE’s ATT&CK FrameworkLeveraging Splunk Enterprise Security with the MITRE’s ATT&CK Framework
Leveraging Splunk Enterprise Security with the MITRE’s ATT&CK Framework
 
Splunk Incident Response, Orchestrierung und Automation
Splunk Incident Response, Orchestrierung und AutomationSplunk Incident Response, Orchestrierung und Automation
Splunk Incident Response, Orchestrierung und Automation
 
Best Practices for Splunk Deployments
Best Practices for Splunk DeploymentsBest Practices for Splunk Deployments
Best Practices for Splunk Deployments
 
Mit Splunk Artificial Intelligence und Machine Learning mehr aus Ihren Daten ...
Mit Splunk Artificial Intelligence und Machine Learning mehr aus Ihren Daten ...Mit Splunk Artificial Intelligence und Machine Learning mehr aus Ihren Daten ...
Mit Splunk Artificial Intelligence und Machine Learning mehr aus Ihren Daten ...
 
Splunk und Multi-Cloud
Splunk und Multi-CloudSplunk und Multi-Cloud
Splunk und Multi-Cloud
 
"Splunk Worst Practices"... und wie man diese behebt
"Splunk Worst Practices"... und wie man diese behebt"Splunk Worst Practices"... und wie man diese behebt
"Splunk Worst Practices"... und wie man diese behebt
 
Worst Splunk practices...and how to fix them
Worst Splunk practices...and how to fix them Worst Splunk practices...and how to fix them
Worst Splunk practices...and how to fix them
 
Turning Data Into Business Outcomes with the Splunk Platform
Turning Data Into Business Outcomes with the Splunk PlatformTurning Data Into Business Outcomes with the Splunk Platform
Turning Data Into Business Outcomes with the Splunk Platform
 
Exploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise Security Exploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise Security
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
 
Predictive, Proactive, and Collaborative ML with iT Service Intelligence
Predictive, Proactive, and Collaborative ML with iT Service Intelligence Predictive, Proactive, and Collaborative ML with iT Service Intelligence
Predictive, Proactive, and Collaborative ML with iT Service Intelligence
 
Machine Learning in Action
Machine Learning in Action Machine Learning in Action
Machine Learning in Action
 
Machine Learning in Action
Machine Learning in ActionMachine Learning in Action
Machine Learning in Action
 

Similaire à Drive More Value from your SOC Through Connecting Security to the Business

Similaire à Drive More Value from your SOC Through Connecting Security to the Business (20)

Splunk Discovery Köln - 17-01-2020 - Accelerate Incident Response
Splunk Discovery Köln - 17-01-2020 - Accelerate Incident ResponseSplunk Discovery Köln - 17-01-2020 - Accelerate Incident Response
Splunk Discovery Köln - 17-01-2020 - Accelerate Incident Response
 
Accelerate incident Response Using Orchestration and Automation
Accelerate incident Response Using Orchestration and Automation Accelerate incident Response Using Orchestration and Automation
Accelerate incident Response Using Orchestration and Automation
 
Exploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise SecurityExploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise Security
 
Splunk Enterprise Security
Splunk Enterprise SecuritySplunk Enterprise Security
Splunk Enterprise Security
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
 
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
 
Splunk-Presentation
Splunk-Presentation Splunk-Presentation
Splunk-Presentation
 
Splunk Discovery Köln - 17-01-2020 - Willkommen!
Splunk Discovery Köln - 17-01-2020 - Willkommen!Splunk Discovery Köln - 17-01-2020 - Willkommen!
Splunk Discovery Köln - 17-01-2020 - Willkommen!
 
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
 
Sec1391
Sec1391Sec1391
Sec1391
 
Spliunk Discovery Köln - 17-01-2020 - Intro to Security Analytics Methods
Spliunk Discovery Köln - 17-01-2020 - Intro to Security Analytics MethodsSpliunk Discovery Köln - 17-01-2020 - Intro to Security Analytics Methods
Spliunk Discovery Köln - 17-01-2020 - Intro to Security Analytics Methods
 
How a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessHow a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the Business
 
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
 
SplunkLive! London 2017 - Splunk Overview
SplunkLive! London 2017 - Splunk OverviewSplunkLive! London 2017 - Splunk Overview
SplunkLive! London 2017 - Splunk Overview
 
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
 
Get More From Your Data with Splunk AI + ML
Get More From Your Data with Splunk AI + MLGet More From Your Data with Splunk AI + ML
Get More From Your Data with Splunk AI + ML
 
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - WebinarUsing Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
 
Abenteuer bei Monitoring und Troubleshooting
Abenteuer bei Monitoring und TroubleshootingAbenteuer bei Monitoring und Troubleshooting
Abenteuer bei Monitoring und Troubleshooting
 
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 

Plus de Splunk

Plus de Splunk (20)

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Drive More Value from your SOC Through Connecting Security to the Business

  • 1. © 2019 SPLUNK INC.© 2019 SPLUNK INC. Drive More Value from Your Security Operations: Connecting Security to the Business With Splunk James Hanlon | Director of Security Specialization, EMEA 13 June 2019
  • 2. © 2019 SPLUNK INC. Who am I ▶ Director of Splunk Security Specialization for EMEA ▶ Work with many large & small Splunk security customers ▶ Provide customer security advisory services ▶ 17+ years in Security
  • 3. © 2019 SPLUNK INC. We Listen We Learn We Understand We Bring It Back What is value in security operations?
  • 4. © 2019 SPLUNK INC. What is the value of Security in 2019? Even for some security teams, this can be hard to define
  • 5. © 2019 SPLUNK INC. How much more valuable is a secure company worth than an insecure one? How much security is enough? How should security resources be invested and applied for optimal ROI? What is the impact of the threat?
  • 6. © 2019 SPLUNK INC. Adequate Security (Risk Managed) Security ROI (SROI) Sufficient Security (Compliance Driven) Differentiated Security
  • 7. © 2019 SPLUNK INC. © 2019 SPLUNK INC. ▶ Organizational Awareness ▶ Understanding the threat exposure & profile ▶ Demonstrating the value of Security Organizational Situational Awareness & Threat Profile © 2019 SPLUNK INC. ▶ Clarity of mission ▶ Known current and future state ▶ How to transform security The Security Mission © 2019 SPLUNK INC. ▶ Ownership ▶ Volume ▶ Technical know how Getting Data Visibility for the Security © 2019 SPLUNK INC. ▶ Legacy IT complexity ▶ Emergent Technology ▶ Consolidation drives & cost reduction IT Complexity and Emerging Digital Channels © 2019 SPLUNK INC. Security Operations Processes & Resources ▶ Hire ▶ Automate▶ Develop ▶ Optimize▶ Retain © 2019 SPLUNK INC. Prescriptive Security Operations Guidance What to do first, second and last (or not at all)? © 2019 SPLUNK INC. 416 78 ▶ MTTD ▶ MTTR ▶ Dwell Time ▶ TTV Time © 2019 SPLUNK INC. ▶ Security Analytics ▶ Machine Learning (AI) ▶ Automation ▶ Cloud based SecOps The Expansive & Emergent Security Technology Landscape
  • 8. © 2019 SPLUNK INC. So, the value of security can often be characterized by the organizational strategy…and the barriers
  • 9. © 2019 SPLUNK INC. We Listen We Learn We Understand We Bring It Back
  • 10. © 2019 SPLUNK INC. Translating the Value of Splunk Security Security Data Analytics Value: Gain full data visibility of any legacy or emergent technology or platform Driver: Risk mitigation Whether on-prem or cloud, Splunk data and non-Splunk data sources can easily be ingested into and segmented by the tool. Security Automation Value: lower human workloads, security process inefficiency & MTTR Driver: cost avoidance Security Machine Learning (AI) Value: Detect unknows / detect faster Driver: cost avoidance, risk mitigation Integrated Security Platform Value: Increase TTV through integrated, consolidated and contextual toolsets Driver: cost avoidance r on-prem or cloud, Splunk data and non-Splunk data sources can easily be ingested into and segmented by the tool. Flexible Visualisation & Reporting Value: Increase security visibility and organizational business insights Driver: Risk mitigation Prescriptive Security Content Value: be guided by industry led advice Driver: cost avoidance
  • 11. © 2019 SPLUNK INC. NETWORK THREAT INTELLIGENCE MOBILE ENDPOINTS IDENTITY AND ACCESS CLOUD SECURITY WAF AND APP SECURITY WEB PROXY FIREWALL ANALYTICS ORCHESTRATION Observe Decide Orient Act Splunk’s Security Vision 90% TIER 1 ANALYST WORK WILL BE AUTOMATED 50% TIME NOW SPENT TUNING DETECTION AND RESPONSE LOGIC 1PLATFORM TO ORCHESTRATE THEM ALL
  • 12. © 2019 SPLUNK INC. Splunk Security Operations Suite P L A T F O R M D A T A S O U R C E S U S E C A S E S A P P L I C A T I O N S Security ContentUpdates Security Monitoring Logs Business Context Threat Intelligence + Compliance & Data Privacy Advanced Threat Detection Incident Investigation & Forensics Insider Threat Detection Incident Response Fraud Analytics & Detection SOC Automation
  • 13. © 2019 SPLUNK INC. We Listen We Learn We Understand We Bring It Back Helping you unlock the value of Splunk Security
  • 14. © 2019 SPLUNK INC. Introducing the Security Prescriptive Path Helping You Drive More from your Splunk Investment
  • 15. © 2019 SPLUNK INC. > > Security Paths Value Paths Security Operations Compliance >Fraud  faster detection and triage of security alerts and insider threats  better discovery of targeted and advanced threats  faster investigation and remediation of security incidents  reduced risk of breach, disruption, damage and data leakage  reduction in compliance reporting time  reduction in potential compliance penalties  reduction in risk of fraud  reduction in fraud losses Compliance Fraud Monitoring and Investigation Insider Threat SOAR Security Investigation Security Monitoring Advanced Thread Incident Response & Forensics 3 Paths - 8 Security Use Cases - 70 Security Capabilities
  • 16. © 2019 SPLUNK INC. Examples of how Customers have realized value Splunk Security “The How”
  • 17. © 2019 SPLUNK INC. Addressing The Barriers to Value: Data Volume, Data Visibility & IT Complexity How Splunk Security Analytics Drives Value Any Data Analytics Investigative Platform
  • 18. © 2019 SPLUNK INC. Investigation & Analytics with Splunk LEARN MORE
  • 19. © 2019 SPLUNK INC. Addressing The Barriers to Value: Integrating Security Tooling | Industry Led Analytics Guidance How Splunk Security Analytics Drives Value Pre-built Security Workflows Guided Security Analytics
  • 20. © 2019 SPLUNK INC. Triage & Investigation Workflows LEARN MORE
  • 21. © 2019 SPLUNK INC. LEARN MORE Operationalizing Security Analytics Content Development
  • 22. © 2019 SPLUNK INC. Addressing The Barriers to Value: Human Workload | Process Repeatability Automate Security Tasks Process Efficiency & Repeatability How Splunk Security Analytics Drives Value
  • 23. © 2019 SPLUNK INC. Security Automation with Splunk LEARN MORE
  • 24. © 2019 SPLUNK INC. Addressing The Barriers to Value: Reduce MTTD, MTTR I Connecting with the Business Machine Learning for Security How Splunk Security Analytics Drives Value Business & IT Risk Reporting
  • 25. © 2019 SPLUNK INC. LEARN MORE Security Risk Reporting with Splunk
  • 27. © 2019 SPLUNK INC. Designed to help optimize value in your security operations  Increase security visibility, tackle IT complexity  Provide prescriptive guidance  Increase process efficiency, lower MTTD, MTTR  Enable business focused security risk reporting Security Mission
  • 28. © 2019 SPLUNK INC. We Listen We Learn We Understand We Bring It Back Using Analytics to Connect Security to the Business
  • 30. © 2019 SPLUNK INC. Gartner 2017 Analytics is Now A Foundational Security Operations Capability
  • 31. © 2019 SPLUNK INC. Logs Wired DB Mobile IoT APIMetrics Any volume Any location Any type Machine Data Storage Silo 1 Storage Silo 2 Networ k Silo Proxy Silo App Silo VMs Silo SCADA Silo AWS Silo Azure Silo APM Silo more Silos Servers Silo Data sources IT OPERATIONS SECURITY Business AnalyticsDevOps/App analytics Use Cases IoT Different people asking different questions on the same data, in real time Splunkbase; 1900+ Free Apps/add-ons Splunk> MINT Splunk> Industrial Asset Management MQTT Modular Input Kepware IDF to Metrics Splunk> App for Infrastructure Splunk> Stream JMX JAVA Splunk> DB Connect Fast Time to Value Premium Apps AI / Machine Learning accelerators 30%↓ Risk* 4%↑ supply chain throughput ** 70%+↓ QA troubleshooting* 25%+↓ power/facility*** • 3rd Party (ServiceNow, CMDB, SIEM…) • Structured data > Automate > Collaborative incident response SAME DATA, MULTIPLE USE CASES Splunk Platform (Cloud / On-prem) DATA SOURCES CORRELATION Data to Answers Splunk> Machine Learning Toolkit 70% to 90%↓ MTTR* But an Analytics capability can do much more across across many IT domains
  • 32. © 2019 SPLUNK INC. Converged Analytics for Business Value We call this..
  • 33. © 2019 SPLUNK INC. Extracting Value Through Converged Data Analytics Security, IoT & Industrial Data Analytics
  • 34. © 2019 SPLUNK INC. UCAS GDPR Compliance, IT Operations & Security
  • 35. © 2019 SPLUNK INC. SecOps / SOC Strategy & Metrics (Operational Security) Adversary,Threat,Controls,Vulnerability orITRiskDrivenSOCstrategies Corporate/IT Initiative 1 Corporate Mission & Goals Corporate/IT Initiative 2 Corporate/IT Initiative 3 Corporate/IT Initiative N Reducing this gap provides business enabling alignment for Security & SOC teams Business Enabling Data & Security Insights (Data Analytics Enabled) Analytics Driven Approach to Connect Security to the Business
  • 36. © 2019 SPLUNK INC. DEMO Splunk Security Prescriptive Value Path (PVP)
  • 37. © 2019 SPLUNK INC. Realities that Worry Executives? Only 28 percent of companies use project performance techniques (PMI, 2017) Most organizations have a 70% project failure rate (4PM) Only 64% of projects meet their goals (Wrike) Executives need prescriptive plans to mitigate these risks
  • 38. © 2019 SPLUNK INC. Introducing the Security Prescriptive Path Helping You Drive More from your Splunk Investment
  • 39. © 2019 SPLUNK INC. > > Security Paths Value Paths Security Operations Compliance >Fraud  faster detection and triage of security alerts and insider threats  better discovery of targeted and advanced threats  faster investigation and remediation of security incidents  reduced risk of breach, disruption, damage and data leakage  reduction in compliance reporting time  reduction in potential compliance penalties  reduction in risk of fraud  reduction in fraud losses Compliance Fraud Monitoring and Investigation Insider Threat SOAR Security Investigation Security Monitoring Advanced Thread Incident Response & Forensics 3 Paths - 8 Security Use Cases - 70 Security Capabilities
  • 40. © 2019 SPLUNK INC. Final Thoughts Takeaways
  • 41. © 2019 SPLUNK INC. Splunk are committed to helping customer drive more value from their investments in Security Read how other customers have found value from their investments with Splunk Speak to your account team about conducting a prescriptive value path (PVP) assessment with Splunk Key Takeaways
  • 42. © 2019 SPLUNK INC. Learn how others have found value with Splunk https://conf.splunk.com/
  • 43. © 2019 SPLUNK INC.© 2019 SPLUNK INC. Thank You. Don’t forget to rate this session in the SplunkLive! mobile app