SlideShare une entreprise Scribd logo
1  sur  21
Intelligent Security Orchestration and Automation hexadite.com
If We Only Had the Time:
How Security Teams Can Focus On What’s Important
Barak Klinghofer, Co-Founder and Chief Product Officer, Hexadite
Intelligent Security Orchestration and Automation hexadite.com
Session
Overview
• Background
• Example 1: Alert from C&C Connection
• Example 2: Alert from Antivirus
• The Problem: Alert Volume and Resources
• Automating the 2 Previous Examples
• What to do with Your Newly Found Time
• Wrap Up
Intelligent Security Orchestration and Automation hexadite.com
Barak Klinghofer
CURRENT
PREVIOUS
What I Did Why It Matters
My Background
Our entire reason for existing is to minimize
the time to investigate and remediate.
Lead technology strategy for a company
focused on going from alert to remediation in
minutes at scale.
Co-Founder &Chief Product
Officer, Hexadite
Cyber Solutions Architect
Elbit Systems
Senior Security Consultant
COMSEC
Elite Intelligence Unit
Israeli Defense Forces
Designed solutions for both public and private
sectors, and trained personnel in National
Cyber Security centers.
Reviewed companies’ security polices and
technologies for global organizations.
Helped in building a security team from the
ground up. From 0 to 100 in 4 years.
I’ve designed training systems to teach
cyber analysts how to rigorously investigate
and remediate cyber threats.
I understand how companies in all industries
approach cybersecurity and helped them
increase their security posture.
I worked hands-on to build a team to take on
IR challenges with high stakes.
Intelligent Security Orchestration and Automation hexadite.com
Example 1:
Alert from
C&C
Connection
Intelligent Security Orchestration and Automation hexadite.com
Alert from FireEye (C&C)
Begin Investigating
Alert
Accessing Endpoint Analyze Installed
Services and Drivers
Analyze Persistency Methods
10 Min. 17 Min. 1.5 Hr. 1.8 Hr.
15 Min. 28 Min. +Days
Search for Lateral Movement
Identify Endpoint Upload Forensics
Tools
Analyze Running
Processes
33 Min.
52
Min.
Analyze Open
Connections
1.6 Hr.
Analyze Recently
Created Files
1.9 Hr.
Analyze Installed
Certificates
Create Firewall
Block Rules
2 Hr.
Intelligent Security Orchestration and Automation hexadite.com
Example 2:
Alert from
AV
Intelligent Security Orchestration and Automation hexadite.com
Alert from AV
Begin Investigating
Alert
Locate malicious file Analyze Installed
Services and Drivers
Analyze Persistency Methods
10 Min. 20 Min. 1.5 Hr. 1.8 Hr.
15 Min. 21 Min. +Days
Finish Investigation
Access Endpoint Upload Forensics
Tools
Analyze Running
Processes
22 Min.
52
Min.
Analyze Open
Connections
1.6 Hr.
Analyze Recently
Created Files
1.9 Hr.
Search Firewall
Logs
Search for
Lateral Movement
2 Hr.
Email Alert
Intelligent Security Orchestration and Automation hexadite.comIntelligent Security Orchestration and Automation hexadite.com
Every Day
• How may of these ”easy” use cases do you see a day
within your organization?
• From our experience, SMEs see about 10-20 daily
• But what about all the rest?
Intelligent Security Orchestration and Automation hexadite.comIntelligent Security Orchestration and Automation hexadite.com
The problem is the
increase in attacks.
The problem is the
increase in alerts.Source: EMA Research
The Problem
Intelligent Security Orchestration and Automation hexadite.com
The Problem
• One cyber analyst can handle
roughly 10 alerts per day
• That’s 300 per month (…but
they generally take weekends
off)
• You’d need 150 cyber analysts
working 8 hr shifts to keep up 7
days a week
• That’s just with current alert
volume
• That won’t work
• This is what 500 alerts/day
looks like
• That’s 15,000 per month
• That’s a lot
Intelligent Security Orchestration and Automation hexadite.com
Even 5% is Too Much
• One cyber analyst can handle
roughly 10 alerts per day
• You would still need 3 analysts
to handle just the critical alerts
• That’s after you’ve spent time
filtering, prioritizing
• Even if you’re able to filter out
95%, you’re still left with 25
critical alerts per day
• That’s 750 per month
Intelligent Security Orchestration and Automation hexadite.com
Even 5% is Too Much
Even if 95% of alerts are commodity/benign, the 5% is still too
much to handle.
Intelligent Security Orchestration and Automation hexadite.com
DEMO: Automating the Two Examples
Intelligent Security Orchestration and Automation hexadite.com
What to do
with Your
Newly Found
Time
Intelligent Security Orchestration and Automation hexadite.comIntelligent Security Orchestration and Automation hexadite.com
What to Do with Your Newly Found Time
• Optimize your process and methodology
• Analyze what’s falling through the cracks
• Customize your detection mechanisms
• Risk assessment – Go back and identify the gaps
Intelligent Security Orchestration and Automation hexadite.comIntelligent Security Orchestration and Automation hexadite.com
Optimize your process and methodology
• Constant improvement
• Change your mindset from reactive to proactive
• When was the last time you reviewed your security
policy?
• How can you get your security policy to be more
business-oriented?
• What are you currently doing wrong? (We all have
things that we can and should change)
Intelligent Security Orchestration and Automation hexadite.comIntelligent Security Orchestration and Automation hexadite.com
Analyze what’s falling through the cracks
• An automatic solution will never be able to do 100% of
the work
• Randomly double-check the automatic process, if
something is found update the process, keep improving
• Validate what was found
• Hunt!
Intelligent Security Orchestration and Automation hexadite.comIntelligent Security Orchestration and Automation hexadite.com
Customize your detection mechanisms
• You now have a huge team to do the work, go back
review the statistics, recalibrate you detection solutions.
• Re-think prioritization, make sure it is needed
• What else did you pay for and never use?
Intelligent Security Orchestration and Automation hexadite.comIntelligent Security Orchestration and Automation hexadite.com
Risk assessment –Identify the gaps
• It’s time to go back to the basics - Based on the results
where should we invest more, what is the right move?
• Business enablement should be always on our radar
Intelligent Security Orchestration and Automation hexadite.com
Wrap-Up
Intelligent Security Orchestration and Automation hexadite.com
Thank You!

Contenu connexe

Tendances

To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015
Paul Hogan
 

Tendances (19)

Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
Cylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment DatasheetCylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment Datasheet
 
Challenges of Vulnerability Management
 Challenges of Vulnerability Management Challenges of Vulnerability Management
Challenges of Vulnerability Management
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخدادReview on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Security Program Development for the Hipster Company
Security Program Development for the Hipster CompanySecurity Program Development for the Hipster Company
Security Program Development for the Hipster Company
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
 
Demystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use CasesDemystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use Cases
 
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
 
Make IR Effective with Risk Evaluation and Reporting
Make IR Effective with Risk Evaluation and ReportingMake IR Effective with Risk Evaluation and Reporting
Make IR Effective with Risk Evaluation and Reporting
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
Cylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-OverviewCylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-Overview
 

En vedette

En vedette (15)

Neptune : Re-thinking Incident Response Automation
Neptune : Re-thinking Incident Response Automation Neptune : Re-thinking Incident Response Automation
Neptune : Re-thinking Incident Response Automation
 
Goodbye CLI, hello API: Leveraging network programmability in security incid...
Goodbye CLI, hello API:  Leveraging network programmability in security incid...Goodbye CLI, hello API:  Leveraging network programmability in security incid...
Goodbye CLI, hello API: Leveraging network programmability in security incid...
 
Neptune facebook autoremediation_talk
Neptune facebook autoremediation_talkNeptune facebook autoremediation_talk
Neptune facebook autoremediation_talk
 
WXRCTVYV
WXRCTVYVWXRCTVYV
WXRCTVYV
 
Container con toronto
Container con torontoContainer con toronto
Container con toronto
 
revisedhoneypot429
revisedhoneypot429revisedhoneypot429
revisedhoneypot429
 
In Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect ExfiltrationIn Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect Exfiltration
 
20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends
 
Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Derbycon Bromium Labs: Sandboxes
Derbycon Bromium Labs: SandboxesDerbycon Bromium Labs: Sandboxes
Derbycon Bromium Labs: Sandboxes
 
CASBs: Real World Use Cases
CASBs: Real World Use CasesCASBs: Real World Use Cases
CASBs: Real World Use Cases
 
zero day exploits
zero day exploitszero day exploits
zero day exploits
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New Hope
 
8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker
 

Similaire à If We Only Had the Time: How Security Teams Can Focus On What’s Important

2013 michael coates-javaone
2013 michael coates-javaone2013 michael coates-javaone
2013 michael coates-javaone
Michael Coates
 
[EMC] Source Code Protection
[EMC] Source Code Protection[EMC] Source Code Protection
[EMC] Source Code Protection
Perforce
 

Similaire à If We Only Had the Time: How Security Teams Can Focus On What’s Important (20)

2013 michael coates-javaone
2013 michael coates-javaone2013 michael coates-javaone
2013 michael coates-javaone
 
[EMC] Source Code Protection
[EMC] Source Code Protection[EMC] Source Code Protection
[EMC] Source Code Protection
 
How to Leverage Log Data for Effective Threat Detection
How to Leverage Log Data for Effective Threat DetectionHow to Leverage Log Data for Effective Threat Detection
How to Leverage Log Data for Effective Threat Detection
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранГірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
 
Sigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecuritySigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software Security
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
WordPress Security: Beyond The Plugin
WordPress Security:  Beyond The PluginWordPress Security:  Beyond The Plugin
WordPress Security: Beyond The Plugin
 
SpiceWorks Webinar: Whose logs, what logs, why logs
SpiceWorks Webinar: Whose logs, what logs, why logs  SpiceWorks Webinar: Whose logs, what logs, why logs
SpiceWorks Webinar: Whose logs, what logs, why logs
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionWebinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM Solution
 
Isms3
Isms3Isms3
Isms3
 
computer security audit ,erp audit,software systems audit
computer security audit ,erp audit,software systems auditcomputer security audit ,erp audit,software systems audit
computer security audit ,erp audit,software systems audit
 
The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0
 
Can You Really Automate Yourself Secure
Can You Really Automate Yourself SecureCan You Really Automate Yourself Secure
Can You Really Automate Yourself Secure
 
Generative AI for Regulatory Analysis
Generative AI for Regulatory AnalysisGenerative AI for Regulatory Analysis
Generative AI for Regulatory Analysis
 
ComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityComResource - NW Agent Cybersecurity
ComResource - NW Agent Cybersecurity
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for Organization
 
Safety and security in mission critical IoT systems
Safety and security in mission critical IoT systemsSafety and security in mission critical IoT systems
Safety and security in mission critical IoT systems
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 

Plus de Nathan Burke (8)

Axonius One Page Summary
Axonius One Page SummaryAxonius One Page Summary
Axonius One Page Summary
 
Startup Marketing is Art
Startup Marketing is ArtStartup Marketing is Art
Startup Marketing is Art
 
Content Workflows for Startups: Planning, Executing, and Promoting the Hell ...
Content Workflows for Startups: Planning, Executing, and Promoting  the Hell ...Content Workflows for Startups: Planning, Executing, and Promoting  the Hell ...
Content Workflows for Startups: Planning, Executing, and Promoting the Hell ...
 
Google apps email on iphone
Google apps email on iphoneGoogle apps email on iphone
Google apps email on iphone
 
Setting Up Google Apps email on iPhone
Setting Up Google Apps email on iPhoneSetting Up Google Apps email on iPhone
Setting Up Google Apps email on iPhone
 
Getting Your Startup Noticed Online
Getting Your Startup Noticed OnlineGetting Your Startup Noticed Online
Getting Your Startup Noticed Online
 
Subprime Crisis For Dummies
Subprime Crisis For DummiesSubprime Crisis For Dummies
Subprime Crisis For Dummies
 
Sub Prime Crisis For Dummies
Sub Prime Crisis For DummiesSub Prime Crisis For Dummies
Sub Prime Crisis For Dummies
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

If We Only Had the Time: How Security Teams Can Focus On What’s Important

  • 1. Intelligent Security Orchestration and Automation hexadite.com If We Only Had the Time: How Security Teams Can Focus On What’s Important Barak Klinghofer, Co-Founder and Chief Product Officer, Hexadite
  • 2. Intelligent Security Orchestration and Automation hexadite.com Session Overview • Background • Example 1: Alert from C&C Connection • Example 2: Alert from Antivirus • The Problem: Alert Volume and Resources • Automating the 2 Previous Examples • What to do with Your Newly Found Time • Wrap Up
  • 3. Intelligent Security Orchestration and Automation hexadite.com Barak Klinghofer CURRENT PREVIOUS What I Did Why It Matters My Background Our entire reason for existing is to minimize the time to investigate and remediate. Lead technology strategy for a company focused on going from alert to remediation in minutes at scale. Co-Founder &Chief Product Officer, Hexadite Cyber Solutions Architect Elbit Systems Senior Security Consultant COMSEC Elite Intelligence Unit Israeli Defense Forces Designed solutions for both public and private sectors, and trained personnel in National Cyber Security centers. Reviewed companies’ security polices and technologies for global organizations. Helped in building a security team from the ground up. From 0 to 100 in 4 years. I’ve designed training systems to teach cyber analysts how to rigorously investigate and remediate cyber threats. I understand how companies in all industries approach cybersecurity and helped them increase their security posture. I worked hands-on to build a team to take on IR challenges with high stakes.
  • 4. Intelligent Security Orchestration and Automation hexadite.com Example 1: Alert from C&C Connection
  • 5. Intelligent Security Orchestration and Automation hexadite.com Alert from FireEye (C&C) Begin Investigating Alert Accessing Endpoint Analyze Installed Services and Drivers Analyze Persistency Methods 10 Min. 17 Min. 1.5 Hr. 1.8 Hr. 15 Min. 28 Min. +Days Search for Lateral Movement Identify Endpoint Upload Forensics Tools Analyze Running Processes 33 Min. 52 Min. Analyze Open Connections 1.6 Hr. Analyze Recently Created Files 1.9 Hr. Analyze Installed Certificates Create Firewall Block Rules 2 Hr.
  • 6. Intelligent Security Orchestration and Automation hexadite.com Example 2: Alert from AV
  • 7. Intelligent Security Orchestration and Automation hexadite.com Alert from AV Begin Investigating Alert Locate malicious file Analyze Installed Services and Drivers Analyze Persistency Methods 10 Min. 20 Min. 1.5 Hr. 1.8 Hr. 15 Min. 21 Min. +Days Finish Investigation Access Endpoint Upload Forensics Tools Analyze Running Processes 22 Min. 52 Min. Analyze Open Connections 1.6 Hr. Analyze Recently Created Files 1.9 Hr. Search Firewall Logs Search for Lateral Movement 2 Hr. Email Alert
  • 8. Intelligent Security Orchestration and Automation hexadite.comIntelligent Security Orchestration and Automation hexadite.com Every Day • How may of these ”easy” use cases do you see a day within your organization? • From our experience, SMEs see about 10-20 daily • But what about all the rest?
  • 9. Intelligent Security Orchestration and Automation hexadite.comIntelligent Security Orchestration and Automation hexadite.com The problem is the increase in attacks. The problem is the increase in alerts.Source: EMA Research The Problem
  • 10. Intelligent Security Orchestration and Automation hexadite.com The Problem • One cyber analyst can handle roughly 10 alerts per day • That’s 300 per month (…but they generally take weekends off) • You’d need 150 cyber analysts working 8 hr shifts to keep up 7 days a week • That’s just with current alert volume • That won’t work • This is what 500 alerts/day looks like • That’s 15,000 per month • That’s a lot
  • 11. Intelligent Security Orchestration and Automation hexadite.com Even 5% is Too Much • One cyber analyst can handle roughly 10 alerts per day • You would still need 3 analysts to handle just the critical alerts • That’s after you’ve spent time filtering, prioritizing • Even if you’re able to filter out 95%, you’re still left with 25 critical alerts per day • That’s 750 per month
  • 12. Intelligent Security Orchestration and Automation hexadite.com Even 5% is Too Much Even if 95% of alerts are commodity/benign, the 5% is still too much to handle.
  • 13. Intelligent Security Orchestration and Automation hexadite.com DEMO: Automating the Two Examples
  • 14. Intelligent Security Orchestration and Automation hexadite.com What to do with Your Newly Found Time
  • 15. Intelligent Security Orchestration and Automation hexadite.comIntelligent Security Orchestration and Automation hexadite.com What to Do with Your Newly Found Time • Optimize your process and methodology • Analyze what’s falling through the cracks • Customize your detection mechanisms • Risk assessment – Go back and identify the gaps
  • 16. Intelligent Security Orchestration and Automation hexadite.comIntelligent Security Orchestration and Automation hexadite.com Optimize your process and methodology • Constant improvement • Change your mindset from reactive to proactive • When was the last time you reviewed your security policy? • How can you get your security policy to be more business-oriented? • What are you currently doing wrong? (We all have things that we can and should change)
  • 17. Intelligent Security Orchestration and Automation hexadite.comIntelligent Security Orchestration and Automation hexadite.com Analyze what’s falling through the cracks • An automatic solution will never be able to do 100% of the work • Randomly double-check the automatic process, if something is found update the process, keep improving • Validate what was found • Hunt!
  • 18. Intelligent Security Orchestration and Automation hexadite.comIntelligent Security Orchestration and Automation hexadite.com Customize your detection mechanisms • You now have a huge team to do the work, go back review the statistics, recalibrate you detection solutions. • Re-think prioritization, make sure it is needed • What else did you pay for and never use?
  • 19. Intelligent Security Orchestration and Automation hexadite.comIntelligent Security Orchestration and Automation hexadite.com Risk assessment –Identify the gaps • It’s time to go back to the basics - Based on the results where should we invest more, what is the right move? • Business enablement should be always on our radar
  • 20. Intelligent Security Orchestration and Automation hexadite.com Wrap-Up
  • 21. Intelligent Security Orchestration and Automation hexadite.com Thank You!

Notes de l'éditeur

  1. Connection to a C&C was detected by your IPS/FireEye/etc. T+0 Alert was received by Arcsight ESM and pushed to the main channel (We can do correlation of threat intelligence feed) T+5 Analyst opens the alert and start the investigation flow (10 Minutes) The analyst identify the alerted endpoint ? (Not always as trivial as you would imagine) Some organization will go an re-image the endpoint (what if there were to 2 endpoint or 20 or 200 or 2000…. Were do you draw the line). Will re-image the endpoint solve the problem? For other organizations the analyst will not to go and investigate Access the endpoint and verify if something happens (What does that mean?) Use the forensics tools you have, (To search for what?) Analyze all running process We should give an example on how would you analyze running process (I will provide some screen shots) Analyze all files created/modified/deleted? In the attach timeframe Analyze all open connections? Analyze all known persistency methods (Auto-runs, Scheduled tasks ,etc.)? Analyze installed certificates, What else should I Analyze ? (Does the word should analyze got effort as part of it ?) Analyze memory? What should I search for? Go back to your firewall logs and search for incoming and outgoing connection in the time of the attack Check what local credentials are stored and if a lateral movement was preformed (How do I do that?) And few other task … And this is a simple flow ()
  2. Your endpoint AV alert you about a malicious file that was identified. Analyst open the alert In most cases if the AV removed the “Threat” the analyst will skip that alert (Wrong move) If the threat was not removed (and even if it was removed by the AV) the analyst will identify the alerted endpoint The analyst will access the endpoint and try to locate the malicious file If the file is identified the analyst will try to delete the file (Not that easy in some cases ) The next step is to identify if something else happed, how would the analyst do that ? Use the forensics tools you have, (To search for what?) Analyze all running process Analyze all files created/modified/deleted? In the attach timeframe Analyze all open connections? Analyze all known persistency methods (Auto-runs, Scheduled tasks ,etc.)? Analyze memory? What should I search for? Go back to your firewall logs and search for incoming and outgoing connection in the time of the attack Check what local credentials are stored and if a lateral movement was preformed And few other task … Overall time and effort ….. (This is why we try to filter those alerts by using the vulnerabilites scanners)
  3. We should say something about that this number is usually after filtering AKA prioritizations. Should we add another slide about that 90% or more of the attacks are commodity ? We can show our statistics Even if we have a way to remove 95% of the noise, it’s still not manageable.
  4. We should say something about that this number is usually after filtering AKA prioritizations. Should we add another slide about that 90% or more of the attacks are commodity ? We can show our statistics Even if we have a way to remove 95% of the noise, it’s still not manageable.