SlideShare a Scribd company logo
© 2019 SPLUNK INC.© 2019 SPLUNK INC.
Drive More Value from Your Security Operations:
Connecting Security to the Business
With Splunk
James Hanlon | Director of Security Specialization, EMEA
13 June 2019
© 2019 SPLUNK INC.
Who am I
▶ Director of Splunk Security
Specialization for EMEA
▶ Work with many large & small
Splunk security customers
▶ Provide customer security
advisory services
▶ 17+ years in Security
© 2019 SPLUNK INC.
We Listen
We Learn
We Understand
We Bring It Back
What is value in security
operations?
© 2019 SPLUNK INC.
What is the value of
Security in 2019?
Even for some security teams, this can be hard to define
© 2019 SPLUNK INC.
How much more valuable is a secure
company worth than an insecure one?
How much security is
enough?
How should security
resources be invested
and applied for optimal
ROI?
What is the impact of
the threat?
© 2019 SPLUNK INC.
Adequate Security
(Risk Managed)
Security ROI (SROI)
Sufficient Security
(Compliance Driven)
Differentiated
Security
© 2019 SPLUNK INC.
© 2019 SPLUNK INC.
▶ Organizational
Awareness
▶ Understanding
the threat
exposure &
profile
▶ Demonstrating
the value of
Security
Organizational Situational Awareness &
Threat Profile
© 2019 SPLUNK INC.
▶ Clarity of
mission
▶ Known
current and
future state
▶ How to
transform
security
The Security
Mission
© 2019 SPLUNK INC.
▶ Ownership
▶ Volume
▶ Technical know how
Getting Data Visibility
for the Security
© 2019 SPLUNK INC.
▶ Legacy IT complexity
▶ Emergent Technology
▶ Consolidation drives &
cost reduction
IT Complexity and Emerging Digital Channels
© 2019 SPLUNK INC.
Security Operations Processes & Resources
▶ Hire ▶ Automate▶ Develop ▶ Optimize▶ Retain
© 2019 SPLUNK INC.
Prescriptive Security Operations Guidance
What to do first, second and last (or not at all)?
© 2019 SPLUNK INC.
416
78
▶ MTTD
▶ MTTR
▶ Dwell Time
▶ TTV
Time
© 2019 SPLUNK INC.
▶ Security Analytics
▶ Machine Learning (AI)
▶ Automation
▶ Cloud based SecOps
The Expansive & Emergent Security
Technology Landscape
© 2019 SPLUNK INC.
So, the value of security can often be characterized by the
organizational strategy…and the barriers
© 2019 SPLUNK INC.
We Listen
We Learn
We Understand
We Bring It Back
© 2019 SPLUNK INC.
Translating the Value of Splunk Security
Security Data Analytics
Value: Gain full data visibility of any
legacy or emergent technology or platform
Driver: Risk mitigation Whether on-prem or cloud,
Splunk data and non-Splunk data sources can easily be
ingested into and segmented by the tool.
Security Automation
Value: lower human workloads, security
process inefficiency & MTTR
Driver: cost avoidance
Security Machine Learning (AI)
Value: Detect unknows / detect faster
Driver: cost avoidance, risk mitigation
Integrated Security Platform
Value: Increase TTV through integrated,
consolidated and contextual toolsets
Driver: cost avoidance r on-prem or cloud, Splunk
data and non-Splunk data sources can easily be ingested into
and segmented by the tool.
Flexible Visualisation & Reporting
Value: Increase security visibility and
organizational business insights
Driver: Risk mitigation
Prescriptive Security Content
Value: be guided by industry led advice
Driver: cost avoidance
© 2019 SPLUNK INC.
NETWORK
THREAT
INTELLIGENCE
MOBILE
ENDPOINTS
IDENTITY
AND ACCESS
CLOUD
SECURITY
WAF AND APP
SECURITY
WEB PROXY
FIREWALL
ANALYTICS
ORCHESTRATION
Observe
Decide
Orient
Act
Splunk’s Security Vision
90%
TIER 1 ANALYST WORK WILL BE
AUTOMATED
50%
TIME NOW SPENT TUNING DETECTION
AND RESPONSE LOGIC
1PLATFORM TO ORCHESTRATE THEM ALL
© 2019 SPLUNK INC.
Splunk Security Operations Suite
P L A T F O R M
D A T A
S O U R C E S
U S E C A S E S
A P P L I C A T I O N S
Security
ContentUpdates Security Monitoring
Logs Business Context Threat Intelligence
+
Compliance & Data
Privacy
Advanced Threat
Detection
Incident Investigation &
Forensics
Insider Threat
Detection
Incident Response
Fraud Analytics &
Detection
SOC Automation
© 2019 SPLUNK INC.
We Listen
We Learn
We Understand
We Bring It Back
Helping you unlock the
value of Splunk Security
© 2019 SPLUNK INC.
Introducing the Security Prescriptive Path
Helping You Drive More from your Splunk Investment
© 2019 SPLUNK INC.
>
>
Security Paths Value Paths
Security
Operations
Compliance
>Fraud
 faster detection and triage of
security alerts and insider threats
 better discovery of targeted and
advanced threats
 faster investigation and
remediation of security incidents
 reduced risk of breach, disruption,
damage and data leakage
 reduction in compliance
reporting time
 reduction in potential
compliance penalties
 reduction in risk of fraud
 reduction in fraud losses
Compliance
Fraud Monitoring and Investigation
Insider
Threat
SOAR
Security
Investigation
Security
Monitoring
Advanced
Thread
Incident
Response &
Forensics
3 Paths - 8 Security Use Cases - 70 Security Capabilities
© 2019 SPLUNK INC.
Examples of how Customers have realized value Splunk Security
“The How”
© 2019 SPLUNK INC.
Addressing The Barriers to Value:
Data Volume, Data Visibility & IT Complexity
How Splunk Security Analytics Drives Value
Any Data Analytics Investigative Platform
© 2019 SPLUNK INC.
Investigation & Analytics with Splunk
LEARN MORE
© 2019 SPLUNK INC.
Addressing The Barriers to Value:
Integrating Security Tooling | Industry Led Analytics Guidance
How Splunk Security Analytics Drives Value
Pre-built Security
Workflows
Guided Security
Analytics
© 2019 SPLUNK INC.
Triage & Investigation Workflows
LEARN MORE
© 2019 SPLUNK INC.
LEARN MORE
Operationalizing Security Analytics Content Development
© 2019 SPLUNK INC.
Addressing The Barriers to Value:
Human Workload | Process Repeatability
Automate Security
Tasks
Process Efficiency &
Repeatability
How Splunk Security Analytics Drives Value
© 2019 SPLUNK INC.
Security Automation with Splunk
LEARN MORE
© 2019 SPLUNK INC.
Addressing The Barriers to Value:
Reduce MTTD, MTTR I Connecting with the Business
Machine Learning for
Security
How Splunk Security Analytics Drives Value
Business & IT Risk
Reporting
© 2019 SPLUNK INC.
LEARN MORE
Security Risk Reporting with Splunk
© 2019 SPLUNK INC.
© 2019 SPLUNK INC.
Designed to help
optimize value in your
security operations
 Increase security visibility,
tackle IT complexity
 Provide prescriptive guidance
 Increase process efficiency,
lower MTTD, MTTR
 Enable business focused
security risk reporting
Security Mission
© 2019 SPLUNK INC.
We Listen
We Learn
We Understand
We Bring It Back
Using Analytics to
Connect Security to the
Business
© 2019 SPLUNK INC.
© 2019 SPLUNK INC.
Gartner 2017
Analytics is Now A Foundational Security Operations
Capability
© 2019 SPLUNK INC.
Logs Wired DB Mobile IoT APIMetrics
Any volume
Any location
Any type
Machine Data
Storage
Silo 1
Storage
Silo 2
Networ
k Silo
Proxy
Silo
App
Silo
VMs
Silo
SCADA
Silo
AWS
Silo
Azure
Silo
APM
Silo
more
Silos
Servers
Silo
Data sources
IT OPERATIONS SECURITY Business AnalyticsDevOps/App analytics
Use
Cases
IoT
Different people asking different questions on the same data, in real time
Splunkbase;
1900+ Free
Apps/add-ons
Splunk>
MINT
Splunk> Industrial Asset
Management
MQTT
Modular Input
Kepware
IDF to Metrics
Splunk>
App for Infrastructure
Splunk>
Stream
JMX
JAVA
Splunk>
DB Connect
Fast Time to Value
Premium
Apps
AI / Machine Learning
accelerators
30%↓ Risk* 4%↑ supply chain
throughput **
70%+↓ QA
troubleshooting*
25%+↓ power/facility***
• 3rd Party (ServiceNow, CMDB, SIEM…)
• Structured data
> Automate
> Collaborative
incident response
SAME DATA, MULTIPLE USE CASES
Splunk Platform
(Cloud / On-prem)
DATA SOURCES CORRELATION
Data to Answers
Splunk>
Machine Learning Toolkit
70% to 90%↓ MTTR*
But an Analytics capability can do much more across
across many IT domains
© 2019 SPLUNK INC.
Converged Analytics for Business Value
We call this..
© 2019 SPLUNK INC.
Extracting Value Through Converged Data Analytics
Security, IoT & Industrial Data Analytics
© 2019 SPLUNK INC.
UCAS
GDPR Compliance, IT Operations & Security
© 2019 SPLUNK INC.
SecOps / SOC
Strategy & Metrics
(Operational Security)
Adversary,Threat,Controls,Vulnerability
orITRiskDrivenSOCstrategies
Corporate/IT
Initiative 1
Corporate
Mission &
Goals
Corporate/IT
Initiative 2
Corporate/IT
Initiative 3
Corporate/IT
Initiative N
Reducing this gap provides business enabling alignment for Security & SOC teams
Business Enabling Data & Security
Insights
(Data Analytics Enabled)
Analytics Driven Approach to Connect Security to the Business
© 2019 SPLUNK INC.
DEMO
Splunk Security Prescriptive Value Path (PVP)
© 2019 SPLUNK INC.
Realities that Worry Executives?
Only 28 percent of companies
use project performance
techniques (PMI, 2017)
Most organizations have a 70%
project failure rate (4PM)
Only 64% of projects meet their
goals (Wrike)
Executives
need prescriptive plans to
mitigate these risks
© 2019 SPLUNK INC.
Introducing the Security Prescriptive Path
Helping You Drive More from your Splunk Investment
© 2019 SPLUNK INC.
>
>
Security Paths Value Paths
Security
Operations
Compliance
>Fraud
 faster detection and triage of
security alerts and insider threats
 better discovery of targeted and
advanced threats
 faster investigation and
remediation of security incidents
 reduced risk of breach, disruption,
damage and data leakage
 reduction in compliance
reporting time
 reduction in potential
compliance penalties
 reduction in risk of fraud
 reduction in fraud losses
Compliance
Fraud Monitoring and Investigation
Insider
Threat
SOAR
Security
Investigation
Security
Monitoring
Advanced
Thread
Incident
Response &
Forensics
3 Paths - 8 Security Use Cases - 70 Security Capabilities
© 2019 SPLUNK INC.
Final Thoughts
Takeaways
© 2019 SPLUNK INC.
Splunk are committed to
helping customer drive
more value from their
investments in Security
Read how other
customers have found
value from their
investments with Splunk
Speak to your account
team about conducting a
prescriptive value path
(PVP) assessment with
Splunk
Key Takeaways
© 2019 SPLUNK INC.
Learn how others have found value with Splunk
https://conf.splunk.com/
© 2019 SPLUNK INC.© 2019 SPLUNK INC.
Thank You.
Don’t forget to rate this session
in the SplunkLive! mobile app

More Related Content

PPTX
What's New with the Latest Splunk Platform Release
PPTX
Accelerate Incident Response with Orchestration & Automation
PPTX
How to Move from Monitoring to Observability, On-Premises and in a Multi-Clou...
PPTX
Vorausschauendes, proaktives und collaboratives Machine Learning mit Splunk ITSI
PPTX
Make Your SOC Work Smarter, Not Harder
PPTX
Splunk Cloud and Splunk Enterprise 7.2
PPTX
Einführung in Security Analytics Methoden
PPTX
Clear the Mist from your Clouds with Splunk
What's New with the Latest Splunk Platform Release
Accelerate Incident Response with Orchestration & Automation
How to Move from Monitoring to Observability, On-Premises and in a Multi-Clou...
Vorausschauendes, proaktives und collaboratives Machine Learning mit Splunk ITSI
Make Your SOC Work Smarter, Not Harder
Splunk Cloud and Splunk Enterprise 7.2
Einführung in Security Analytics Methoden
Clear the Mist from your Clouds with Splunk

What's hot (17)

PPTX
Still Suffering from IT Outages? Accept Failure, Learn from Failure and Get R...
PPTX
The DevOps Promise: Helping Management Realise the Quality, Velocity & Effici...
PPTX
Accelerate incident Response Using Orchestration and Automation
PPTX
Machine Learning in Action
PPTX
Leveraging Splunk Enterprise Security with the MITRE’s ATT&CK Framework
PPTX
Splunk Incident Response, Orchestrierung und Automation
PPTX
Best Practices for Splunk Deployments
PPTX
Mit Splunk Artificial Intelligence und Machine Learning mehr aus Ihren Daten ...
PPTX
Splunk und Multi-Cloud
PPTX
"Splunk Worst Practices"... und wie man diese behebt
PPTX
Worst Splunk practices...and how to fix them
PPTX
Turning Data Into Business Outcomes with the Splunk Platform
PPTX
Exploring Frameworks of Splunk Enterprise Security
PPTX
Splunk Phantom SOAR Roundtable
PPTX
Predictive, Proactive, and Collaborative ML with iT Service Intelligence
PPTX
Machine Learning in Action
PPTX
Machine Learning in Action
Still Suffering from IT Outages? Accept Failure, Learn from Failure and Get R...
The DevOps Promise: Helping Management Realise the Quality, Velocity & Effici...
Accelerate incident Response Using Orchestration and Automation
Machine Learning in Action
Leveraging Splunk Enterprise Security with the MITRE’s ATT&CK Framework
Splunk Incident Response, Orchestrierung und Automation
Best Practices for Splunk Deployments
Mit Splunk Artificial Intelligence und Machine Learning mehr aus Ihren Daten ...
Splunk und Multi-Cloud
"Splunk Worst Practices"... und wie man diese behebt
Worst Splunk practices...and how to fix them
Turning Data Into Business Outcomes with the Splunk Platform
Exploring Frameworks of Splunk Enterprise Security
Splunk Phantom SOAR Roundtable
Predictive, Proactive, and Collaborative ML with iT Service Intelligence
Machine Learning in Action
Machine Learning in Action
Ad

Similar to Drive More Value from your SOC Through Connecting Security to the Business (20)

PPTX
Splunk Discovery Köln - 17-01-2020 - Accelerate Incident Response
PPTX
Accelerate incident Response Using Orchestration and Automation
PPTX
Exploring Frameworks of Splunk Enterprise Security
PPTX
Splunk Enterprise Security
PPTX
Splunk Discovery Day Dubai 2017 - Security Keynote
PPTX
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
PDF
Splunk-Presentation
PPTX
Splunk Discovery Köln - 17-01-2020 - Willkommen!
PPTX
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
PDF
Sec1391
PPTX
Spliunk Discovery Köln - 17-01-2020 - Intro to Security Analytics Methods
PPTX
How a Leading Saudi Bank Matured Security to Better Partner the Business
PPTX
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
PPTX
SplunkLive! London 2017 - Splunk Overview
PPTX
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
PPTX
Get More From Your Data with Splunk AI + ML
PDF
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
PPTX
Abenteuer bei Monitoring und Troubleshooting
PDF
Splunk Solution overview testing versi 1
PPTX
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03
Splunk Discovery Köln - 17-01-2020 - Accelerate Incident Response
Accelerate incident Response Using Orchestration and Automation
Exploring Frameworks of Splunk Enterprise Security
Splunk Enterprise Security
Splunk Discovery Day Dubai 2017 - Security Keynote
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
Splunk-Presentation
Splunk Discovery Köln - 17-01-2020 - Willkommen!
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
Sec1391
Spliunk Discovery Köln - 17-01-2020 - Intro to Security Analytics Methods
How a Leading Saudi Bank Matured Security to Better Partner the Business
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
SplunkLive! London 2017 - Splunk Overview
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
Get More From Your Data with Splunk AI + ML
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Abenteuer bei Monitoring und Troubleshooting
Splunk Solution overview testing versi 1
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03
Ad

More from Splunk (20)

PDF
Splunk Leadership Forum Wien - 20.05.2025
PDF
Splunk Security Update | Public Sector Summit Germany 2025
PDF
Building Resilience with Energy Management for the Public Sector
PDF
IT-Lagebild: Observability for Resilience (SVA)
PDF
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
PDF
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
PDF
Praktische Erfahrungen mit dem Attack Analyser (gematik)
PDF
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
PDF
Security - Mit Sicherheit zum Erfolg (Telekom)
PDF
One Cisco - Splunk Public Sector Summit Germany April 2025
PDF
.conf Go 2023 - Data analysis as a routine
PDF
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
PDF
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
PDF
.conf Go 2023 - Raiffeisen Bank International
PDF
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
PDF
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
PDF
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
PDF
.conf go 2023 - De NOC a CSIRT (Cellnex)
PDF
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk Leadership Forum Wien - 20.05.2025
Splunk Security Update | Public Sector Summit Germany 2025
Building Resilience with Energy Management for the Public Sector
IT-Lagebild: Observability for Resilience (SVA)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Security - Mit Sicherheit zum Erfolg (Telekom)
One Cisco - Splunk Public Sector Summit Germany April 2025
.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - De NOC a CSIRT (Cellnex)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
KodekX | Application Modernization Development
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Electronic commerce courselecture one. Pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
The AUB Centre for AI in Media Proposal.docx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
KodekX | Application Modernization Development
Review of recent advances in non-invasive hemoglobin estimation
Network Security Unit 5.pdf for BCA BBA.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Mobile App Security Testing_ A Comprehensive Guide.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf
20250228 LYD VKU AI Blended-Learning.pptx
NewMind AI Weekly Chronicles - August'25 Week I

Drive More Value from your SOC Through Connecting Security to the Business

  • 1. © 2019 SPLUNK INC.© 2019 SPLUNK INC. Drive More Value from Your Security Operations: Connecting Security to the Business With Splunk James Hanlon | Director of Security Specialization, EMEA 13 June 2019
  • 2. © 2019 SPLUNK INC. Who am I ▶ Director of Splunk Security Specialization for EMEA ▶ Work with many large & small Splunk security customers ▶ Provide customer security advisory services ▶ 17+ years in Security
  • 3. © 2019 SPLUNK INC. We Listen We Learn We Understand We Bring It Back What is value in security operations?
  • 4. © 2019 SPLUNK INC. What is the value of Security in 2019? Even for some security teams, this can be hard to define
  • 5. © 2019 SPLUNK INC. How much more valuable is a secure company worth than an insecure one? How much security is enough? How should security resources be invested and applied for optimal ROI? What is the impact of the threat?
  • 6. © 2019 SPLUNK INC. Adequate Security (Risk Managed) Security ROI (SROI) Sufficient Security (Compliance Driven) Differentiated Security
  • 7. © 2019 SPLUNK INC. © 2019 SPLUNK INC. ▶ Organizational Awareness ▶ Understanding the threat exposure & profile ▶ Demonstrating the value of Security Organizational Situational Awareness & Threat Profile © 2019 SPLUNK INC. ▶ Clarity of mission ▶ Known current and future state ▶ How to transform security The Security Mission © 2019 SPLUNK INC. ▶ Ownership ▶ Volume ▶ Technical know how Getting Data Visibility for the Security © 2019 SPLUNK INC. ▶ Legacy IT complexity ▶ Emergent Technology ▶ Consolidation drives & cost reduction IT Complexity and Emerging Digital Channels © 2019 SPLUNK INC. Security Operations Processes & Resources ▶ Hire ▶ Automate▶ Develop ▶ Optimize▶ Retain © 2019 SPLUNK INC. Prescriptive Security Operations Guidance What to do first, second and last (or not at all)? © 2019 SPLUNK INC. 416 78 ▶ MTTD ▶ MTTR ▶ Dwell Time ▶ TTV Time © 2019 SPLUNK INC. ▶ Security Analytics ▶ Machine Learning (AI) ▶ Automation ▶ Cloud based SecOps The Expansive & Emergent Security Technology Landscape
  • 8. © 2019 SPLUNK INC. So, the value of security can often be characterized by the organizational strategy…and the barriers
  • 9. © 2019 SPLUNK INC. We Listen We Learn We Understand We Bring It Back
  • 10. © 2019 SPLUNK INC. Translating the Value of Splunk Security Security Data Analytics Value: Gain full data visibility of any legacy or emergent technology or platform Driver: Risk mitigation Whether on-prem or cloud, Splunk data and non-Splunk data sources can easily be ingested into and segmented by the tool. Security Automation Value: lower human workloads, security process inefficiency & MTTR Driver: cost avoidance Security Machine Learning (AI) Value: Detect unknows / detect faster Driver: cost avoidance, risk mitigation Integrated Security Platform Value: Increase TTV through integrated, consolidated and contextual toolsets Driver: cost avoidance r on-prem or cloud, Splunk data and non-Splunk data sources can easily be ingested into and segmented by the tool. Flexible Visualisation & Reporting Value: Increase security visibility and organizational business insights Driver: Risk mitigation Prescriptive Security Content Value: be guided by industry led advice Driver: cost avoidance
  • 11. © 2019 SPLUNK INC. NETWORK THREAT INTELLIGENCE MOBILE ENDPOINTS IDENTITY AND ACCESS CLOUD SECURITY WAF AND APP SECURITY WEB PROXY FIREWALL ANALYTICS ORCHESTRATION Observe Decide Orient Act Splunk’s Security Vision 90% TIER 1 ANALYST WORK WILL BE AUTOMATED 50% TIME NOW SPENT TUNING DETECTION AND RESPONSE LOGIC 1PLATFORM TO ORCHESTRATE THEM ALL
  • 12. © 2019 SPLUNK INC. Splunk Security Operations Suite P L A T F O R M D A T A S O U R C E S U S E C A S E S A P P L I C A T I O N S Security ContentUpdates Security Monitoring Logs Business Context Threat Intelligence + Compliance & Data Privacy Advanced Threat Detection Incident Investigation & Forensics Insider Threat Detection Incident Response Fraud Analytics & Detection SOC Automation
  • 13. © 2019 SPLUNK INC. We Listen We Learn We Understand We Bring It Back Helping you unlock the value of Splunk Security
  • 14. © 2019 SPLUNK INC. Introducing the Security Prescriptive Path Helping You Drive More from your Splunk Investment
  • 15. © 2019 SPLUNK INC. > > Security Paths Value Paths Security Operations Compliance >Fraud  faster detection and triage of security alerts and insider threats  better discovery of targeted and advanced threats  faster investigation and remediation of security incidents  reduced risk of breach, disruption, damage and data leakage  reduction in compliance reporting time  reduction in potential compliance penalties  reduction in risk of fraud  reduction in fraud losses Compliance Fraud Monitoring and Investigation Insider Threat SOAR Security Investigation Security Monitoring Advanced Thread Incident Response & Forensics 3 Paths - 8 Security Use Cases - 70 Security Capabilities
  • 16. © 2019 SPLUNK INC. Examples of how Customers have realized value Splunk Security “The How”
  • 17. © 2019 SPLUNK INC. Addressing The Barriers to Value: Data Volume, Data Visibility & IT Complexity How Splunk Security Analytics Drives Value Any Data Analytics Investigative Platform
  • 18. © 2019 SPLUNK INC. Investigation & Analytics with Splunk LEARN MORE
  • 19. © 2019 SPLUNK INC. Addressing The Barriers to Value: Integrating Security Tooling | Industry Led Analytics Guidance How Splunk Security Analytics Drives Value Pre-built Security Workflows Guided Security Analytics
  • 20. © 2019 SPLUNK INC. Triage & Investigation Workflows LEARN MORE
  • 21. © 2019 SPLUNK INC. LEARN MORE Operationalizing Security Analytics Content Development
  • 22. © 2019 SPLUNK INC. Addressing The Barriers to Value: Human Workload | Process Repeatability Automate Security Tasks Process Efficiency & Repeatability How Splunk Security Analytics Drives Value
  • 23. © 2019 SPLUNK INC. Security Automation with Splunk LEARN MORE
  • 24. © 2019 SPLUNK INC. Addressing The Barriers to Value: Reduce MTTD, MTTR I Connecting with the Business Machine Learning for Security How Splunk Security Analytics Drives Value Business & IT Risk Reporting
  • 25. © 2019 SPLUNK INC. LEARN MORE Security Risk Reporting with Splunk
  • 27. © 2019 SPLUNK INC. Designed to help optimize value in your security operations  Increase security visibility, tackle IT complexity  Provide prescriptive guidance  Increase process efficiency, lower MTTD, MTTR  Enable business focused security risk reporting Security Mission
  • 28. © 2019 SPLUNK INC. We Listen We Learn We Understand We Bring It Back Using Analytics to Connect Security to the Business
  • 30. © 2019 SPLUNK INC. Gartner 2017 Analytics is Now A Foundational Security Operations Capability
  • 31. © 2019 SPLUNK INC. Logs Wired DB Mobile IoT APIMetrics Any volume Any location Any type Machine Data Storage Silo 1 Storage Silo 2 Networ k Silo Proxy Silo App Silo VMs Silo SCADA Silo AWS Silo Azure Silo APM Silo more Silos Servers Silo Data sources IT OPERATIONS SECURITY Business AnalyticsDevOps/App analytics Use Cases IoT Different people asking different questions on the same data, in real time Splunkbase; 1900+ Free Apps/add-ons Splunk> MINT Splunk> Industrial Asset Management MQTT Modular Input Kepware IDF to Metrics Splunk> App for Infrastructure Splunk> Stream JMX JAVA Splunk> DB Connect Fast Time to Value Premium Apps AI / Machine Learning accelerators 30%↓ Risk* 4%↑ supply chain throughput ** 70%+↓ QA troubleshooting* 25%+↓ power/facility*** • 3rd Party (ServiceNow, CMDB, SIEM…) • Structured data > Automate > Collaborative incident response SAME DATA, MULTIPLE USE CASES Splunk Platform (Cloud / On-prem) DATA SOURCES CORRELATION Data to Answers Splunk> Machine Learning Toolkit 70% to 90%↓ MTTR* But an Analytics capability can do much more across across many IT domains
  • 32. © 2019 SPLUNK INC. Converged Analytics for Business Value We call this..
  • 33. © 2019 SPLUNK INC. Extracting Value Through Converged Data Analytics Security, IoT & Industrial Data Analytics
  • 34. © 2019 SPLUNK INC. UCAS GDPR Compliance, IT Operations & Security
  • 35. © 2019 SPLUNK INC. SecOps / SOC Strategy & Metrics (Operational Security) Adversary,Threat,Controls,Vulnerability orITRiskDrivenSOCstrategies Corporate/IT Initiative 1 Corporate Mission & Goals Corporate/IT Initiative 2 Corporate/IT Initiative 3 Corporate/IT Initiative N Reducing this gap provides business enabling alignment for Security & SOC teams Business Enabling Data & Security Insights (Data Analytics Enabled) Analytics Driven Approach to Connect Security to the Business
  • 36. © 2019 SPLUNK INC. DEMO Splunk Security Prescriptive Value Path (PVP)
  • 37. © 2019 SPLUNK INC. Realities that Worry Executives? Only 28 percent of companies use project performance techniques (PMI, 2017) Most organizations have a 70% project failure rate (4PM) Only 64% of projects meet their goals (Wrike) Executives need prescriptive plans to mitigate these risks
  • 38. © 2019 SPLUNK INC. Introducing the Security Prescriptive Path Helping You Drive More from your Splunk Investment
  • 39. © 2019 SPLUNK INC. > > Security Paths Value Paths Security Operations Compliance >Fraud  faster detection and triage of security alerts and insider threats  better discovery of targeted and advanced threats  faster investigation and remediation of security incidents  reduced risk of breach, disruption, damage and data leakage  reduction in compliance reporting time  reduction in potential compliance penalties  reduction in risk of fraud  reduction in fraud losses Compliance Fraud Monitoring and Investigation Insider Threat SOAR Security Investigation Security Monitoring Advanced Thread Incident Response & Forensics 3 Paths - 8 Security Use Cases - 70 Security Capabilities
  • 40. © 2019 SPLUNK INC. Final Thoughts Takeaways
  • 41. © 2019 SPLUNK INC. Splunk are committed to helping customer drive more value from their investments in Security Read how other customers have found value from their investments with Splunk Speak to your account team about conducting a prescriptive value path (PVP) assessment with Splunk Key Takeaways
  • 42. © 2019 SPLUNK INC. Learn how others have found value with Splunk https://conf.splunk.com/
  • 43. © 2019 SPLUNK INC.© 2019 SPLUNK INC. Thank You. Don’t forget to rate this session in the SplunkLive! mobile app