SlideShare a Scribd company logo
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
The	
  Splunk	
  App	
  for	
  
Enterprise	
  Security	
  	
  
	
  
Holger	
  Sesterhenn,	
  
Sen.	
  Sales	
  Engineer,	
  CISSP	
  
	
  
MaChias	
  Maier,	
  	
  
Security	
  Product	
  MarkeEng,	
  EMEA	
  
	
  
	
  
	
  
2	
  
Ihr	
  Webcast	
  Team	
  
Ma#hias	
  Maier	
  
Security	
  Product	
  MarkeEng,	
  EMEA	
  
mmaier@splunk.com	
  
Holger	
  Sesterhenn	
  
Sen.	
  Sales	
  Engineer	
  
hsesterhenn@splunk.com	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Safe	
  Harbor	
  Statement	
  
During	
   the	
   course	
   of	
   this	
   presentaEon,	
   we	
   may	
   make	
   forward	
   looking	
   statements	
   regarding	
   future	
  
events	
  or	
  the	
  expected	
  performance	
  of	
  the	
  company.	
  We	
  cauEon	
  you	
  that	
  such	
  statements	
  reflect	
  our	
  
current	
  expectaEons	
  and	
  esEmates	
  based	
  on	
  factors	
  currently	
  known	
  to	
  us	
  and	
  that	
  actual	
  events	
  or	
  
results	
  could	
  differ	
  materially.	
  For	
  important	
  factors	
  that	
  may	
  cause	
  actual	
  results	
  to	
  differ	
  from	
  those	
  
contained	
  in	
  our	
  forward-­‐looking	
  statements,	
  please	
  review	
  our	
  filings	
  with	
  the	
  SEC.	
  	
  The	
  forward-­‐looking	
  
statements	
  made	
  in	
  this	
  presentaEon	
  are	
  being	
  made	
  as	
  of	
  the	
  Eme	
  and	
  date	
  of	
  its	
  live	
  presentaEon.	
  
If	
  reviewed	
  aSer	
  its	
  live	
  presentaEon,	
  this	
  presentaEon	
  may	
  not	
  contain	
  current	
  or	
  accurate	
  informaEon.	
  	
  
We	
  do	
  not	
  assume	
  any	
  obligaEon	
  to	
  update	
  any	
  forward	
  looking	
  statements	
  we	
  may	
  make.	
  In	
  addiEon,	
  
any	
  informaEon	
  about	
  our	
  roadmap	
  outlines	
  our	
  general	
  product	
  direcEon	
  and	
  is	
  subject	
  to	
  change	
  at	
  
any	
  Eme	
  without	
  noEce.	
  It	
  is	
  for	
  informaEonal	
  purposes	
  only	
  and	
  shall	
  not	
  be	
  incorporated	
  into	
  any	
  
contract	
   or	
   other	
   commitment.	
   Splunk	
   undertakes	
   no	
   obligaEon	
   either	
   to	
   develop	
   the	
   features	
   or	
  
funcEonality	
  described	
  or	
  to	
  include	
  any	
  such	
  feature	
  or	
  funcEonality	
  in	
  a	
  future	
  release.	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
How	
  Can	
  Splunk	
  Help?	
  
Roadmap	
  
Security	
  Strategy	
  
Security	
  Posture	
  
Visual	
  Security	
  AnalyEcs	
  
Advanced	
  Threats	
  
Insider	
  Threat	
  
Roadmap	
  
Security	
  Strategy	
  
Source:	
  Mandiant	
  M-­‐Trends	
  Report	
  2012/2013/2014	
  
67%	
  
VicEms	
  noEfied	
  
by	
  an	
  external	
  
enEty	
  
100% 	
  
Valid	
  credenEals	
  
were	
  used	
  
229	
  
Median	
  #	
  of	
  
days	
  before	
  
detecEon	
  
The	
  Ever-­‐Changing	
  Threat	
  Landscape	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Intrusion	
  	
  
DetecEon	
  
Firewall	
  
Data	
  Loss	
  
PrevenEon	
  
AnE-­‐Malware	
  
Vulnerability	
  
Scans	
  
AuthenEcaEon	
  
TradiEonal	
  Security	
  Strategy	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Connect	
  the	
  Dots	
  Across	
  All	
  Data	
  
Servers	
  
Storage	
  
Desktops	
  Email	
   Web	
  
TransacEon	
  
Records	
  
Network	
  
Flows	
  
Hypervisor	
   Custom	
  
Apps	
  
Physical	
  
Access	
  
Badges	
  
Threat	
  
Intelligence	
  
Mobile	
  
CMBD	
  DHCP/DNS	
  
Intrusion	
  	
  
DetecEon	
  
Firewall	
  
Data	
  Loss	
  
PrevenEon	
  
AnE-­‐
Malware	
  
Vulnerability	
  
Scans	
  
AuthenEcaEon	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
ConnecEng	
  the	
  “Data	
  Dots”	
  via	
  MulEple/Dynamic	
  RelaEonships	
  
Persist,	
  Repeat	
  
Threat	
  Intelligence	
  
Auth—User	
  Roles	
  
Host	
  	
  
Ac@vity/Security	
  
Network	
  	
  
Ac@vity/Security	
  
ACacker,	
  know	
  relay/C2	
  sites,	
  infected	
  sites,	
  IOC,	
  
aCack/campaign	
  intent	
  and	
  aCribuEon	
  
Where	
  they	
  went	
  to,	
  who	
  talked	
  to	
  whom,	
  aCack	
  
transmiCed,	
  abnormal	
  traffic,	
  malware	
  download	
  
What	
  process	
  is	
  running	
  (malicious,	
  abnormal,	
  etc.)	
  
Process	
  owner,	
  registry	
  mods,	
  aCack/malware	
  
arEfacts,	
  patching	
  level,	
  aCack	
  suscepEbility	
  
Access	
  level,	
  privileged	
  users,	
  likelihood	
  of	
  infecEon,	
  
where	
  they	
  might	
  be	
  in	
  kill	
  chain	
  	
  
Delivery,	
  exploit	
  
installa@on	
  
Gain	
  trusted	
  
access	
  
Exfiltra@on	
  Data	
  gathering	
  Upgrade	
  (escalate)	
  
lateral	
  movement	
  
Persist,	
  repeat	
  
	
  
AnalyEcs-­‐Driven	
  Security	
  
Risk	
  Based	
   Context	
  and	
  Intelligence	
  
ConnecEng	
  Data	
  
and	
  People	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Sample	
  Nasdaq	
  -­‐	
  Heartbleed	
  
Complement,	
  replace	
  and	
  go	
  beyond	
  tradi@onal	
  SIEMs	
  
Security	
  Intelligence	
  Use	
  Cases	
  
13	
  
SECURITY	
  &	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
COMPLIANCE	
  
REPORTING	
  
REAL-­‐TIME	
  
MONITORING	
  OF	
  
KNOWN	
  THREATS	
  
MONITORING	
  	
  
OF	
  UNKNOWN	
  
THREATS	
  
INCIDENT	
  
INVESTIGATIONS	
  
&	
  FORENSICS	
  
FRAUD	
  	
  
DETECTION	
  
INSIDER	
  	
  
THREAT	
  
Roadmap	
  
Security	
  Strategy	
  
• ConnecEng	
  Data	
  and	
  People	
  
Security	
  Posture	
  
15	
  
What’s	
  New	
  in	
  Splunk	
  App	
  for	
  Enterprise	
  Security	
  3.3	
  
BeCer	
  
DetecEon	
  of	
  
Advanced	
  
Threats	
  
•  STIX/TAXII	
  &	
  OpenIOC	
  
threat	
  intelligence	
  
•  IOC/arEfacts	
  research	
  
Improved	
  
CollaboraEon	
  
•  Export	
  correlaEon	
  
searches,	
  KSIs,	
  swim	
  lanes	
  
BeCer	
  
DetecEon	
  of	
  
Malicious	
  
Insiders	
  
•  User	
  acEvity	
  monitoring	
  
dashboard	
  and	
  swim	
  lanes	
  
•  Access	
  anomalies	
  	
  
Faster	
  Incident	
  
Response	
  
•  Added	
  funcEonality	
  to	
  
Incident	
  Response	
  page	
  
Benefit	
  Feature	
  
Roadmap	
  
Security	
  Strategy	
  
• ConnecEng	
  Data	
  and	
  People	
  
Security	
  Posture	
  
• SituaEonal	
  Awareness	
  
Visual	
  Security	
  AnalyEcs	
  
Roadmap	
  
Security	
  Strategy	
  
• ConnecEng	
  Data	
  and	
  People	
  
Security	
  Posture	
  
• SituaEonal	
  Awareness	
  
Visual	
  Security	
  AnalyEcs	
  
• Contextual	
  Analysis	
  
Advanced	
  Threats	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
hCp://sExproject.github.io/about/	
  	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
STIX/TAXII	
  and	
  Open	
  IOC	
  101	
  	
  
•  Info	
  sharing	
  across	
  companies	
  and	
  	
  
industries	
  	
  
•  Standardized	
  XML	
  
•  Contains	
  TTPs,	
  IOCs,	
  COA	
  
•  IOCs	
  include	
  IPs,	
  web/e-­‐mail	
  	
  
domains,	
  hashes,	
  processes,	
  	
  
registry	
  key,	
  cerEficates	
  	
  
•  hCp://sExproject.github.io/about/	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Threat	
  Intelligence	
  in	
  Splunk	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
TAXII	
  Services	
  
Source:	
  hCp://hailataxii.com	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Sample	
  TAXII	
  Feeds	
  
User	
  Community	
   Organisa@on	
  
Cyber	
  Threat	
  XChange	
   Health	
  InformaEon	
  Trust	
  Alliance	
  
Defense	
  Security	
  InformaEon	
  Exchange	
   Defense	
  Industrial	
  Base	
  InformaEon	
  and	
  Sharing	
  
and	
  Analysis	
  OrganizaEon	
  
ICS-­‐ISAC	
   Industrial	
  Control	
  System	
  InformaEon	
  Sharing	
  and	
  
Analysis	
  Center	
  
NH-­‐ISAC	
  NaEonal	
  Health	
  Cybersecurity	
  
Intelligence	
  Planorm	
  
NaEonal	
  Health	
  InformaEon	
  and	
  Analysis	
  Center	
  
FS-­‐ISAC	
  /	
  Soltra	
  Edge	
   Financial	
  Services	
  InformaEon	
  Sharing	
  and	
  
Analyses	
  Center	
  (FS-­‐ISAC)	
  
Retail	
  Cyber	
  Intelligence	
  Sharing	
  Center,	
  
Intelligence	
  Sharing	
  Portal	
  
Retail	
  InformaEon	
  Sharing	
  and	
  Analysis	
  Center	
  
(Retail-­‐ISAC)	
  
More:	
  hCp://sExproject.github.io/supporters/	
  
Roadmap	
  
Security	
  Strategy	
  
• ConnecEng	
  Data	
  and	
  People	
  
Security	
  Posture	
  
• SituaEonal	
  Awareness	
  
Visual	
  Security	
  AnalyEcs	
  
• Contextual	
  Analysis	
  
Advanced	
  Threats	
  
• Knowledge	
  Sharing	
  and	
  AdopEon	
  
Insider	
  Threat	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
DetecEng	
  Suspicious	
  User	
  AcEvity	
  
•  Spot	
  suspicious	
  user	
  acEvity	
  	
  
•  Malicious	
  insider	
  or	
  external	
  threat	
  using	
  stolen	
  credenEals	
  	
  
•  High	
  aggregate	
  risk	
  score	
  
•  Uploaded	
  data	
  to	
  non-­‐corp	
  sites	
  	
  
•  Emailed	
  data	
  to	
  non-­‐corp	
  domains	
  	
  
•  Visits	
  to	
  blacklisted	
  sites	
  	
  
•  Remote	
  access	
  	
  
•  Anomalous	
  help	
  desk	
  Ecket	
  	
  
Roadmap	
  
Security	
  Strategy	
  
• ConnecEng	
  Data	
  and	
  People	
  
Security	
  Posture	
  
• SituaEonal	
  Awareness	
  
Visual	
  Security	
  AnalyEcs	
  
• Contextual	
  Analysis	
  
Advanced	
  Threats	
  
• Knowledge	
  Sharing	
  and	
  AdopEon	
  
Insider	
  Threat	
  
• Stop	
  Data	
  Breaches	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Case	
  Study:	
  Telenor	
  
"   Challanges:	
  
–  Millions	
  of	
  customers,	
  thousands	
  of	
  servers	
  and	
  routers	
  
and	
  they	
  had	
  missing	
  details	
  in	
  operaEve	
  tasks.	
  
–  CommunicaEon	
  between	
  departments	
  was	
  challanging.	
  
–  Errors	
  and	
  issues	
  sporadically	
  slipped	
  unnoEced.	
  
"   Breakthroughs:	
  
–  Team	
  noEced	
  WebMail	
  accounts	
  being	
  abused	
  to	
  send	
  
hundreds	
  of	
  thousands	
  of	
  SMS	
  messages	
  abroad	
  
–  Baselining	
  normal	
  and	
  track	
  DeviaEon	
  
–  Understand	
  aCackers	
  and	
  their	
  behaviour	
  to	
  take	
  them	
  
down	
  proacEve.	
  	
  
Norway's largest
telecom services
provider

160 Mio mobile
subscribers globally
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Thank	
  You!	
  
	
  
Q&A	
  

More Related Content

PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PDF
SplunkSummit 2015 - Splunk User Behavioral Analytics
PPTX
Gov & Education Day 2015 - User Behavior Analytics
PPTX
Splunk for Security - Hands-On
PPTX
Splunk for Enterprise Security and User Behavior Analytics
PPTX
Gov Day Sacramento 2015 - User Behavior Analytics
PPTX
Build a Security Portfolio That Strengthens Your Security Posture
PDF
SplunkLive! Stockholm 2015 breakout - Analytics based security
Splunk for Enterprise Security featuring User Behavior Analytics
SplunkSummit 2015 - Splunk User Behavioral Analytics
Gov & Education Day 2015 - User Behavior Analytics
Splunk for Security - Hands-On
Splunk for Enterprise Security and User Behavior Analytics
Gov Day Sacramento 2015 - User Behavior Analytics
Build a Security Portfolio That Strengthens Your Security Posture
SplunkLive! Stockholm 2015 breakout - Analytics based security

What's hot (20)

PPTX
Splunk Enterprise Security
PDF
Building an Analytics Enables SOC
PPTX
Splunk Discovery Day Dubai 2017 - Security Keynote
PPTX
Splunk for Enterprise Security Featuring UBA
PPTX
Building an Analytics - Enabled SOC Breakout Session
PPTX
Splunk for Security-Hands On
PPT
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PPTX
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
PDF
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
PPTX
Splunk for Enterprise Security Featuring User Behavior Analytics
PDF
Enterprise Security featuring UBA
PPTX
Splunk for Security: Background & Customer Case Study
PPTX
Security investigation hands-on workshop 2018
PPTX
Operational Security Intelligence
PDF
Splunk for Security
PDF
Splunk workshop-Threat Hunting
PPTX
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
PDF
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
PPTX
Splunk Discovery Dusseldorf: September 2017 - Security Session
PPTX
Enterprise Security and User Behavior Analytics
Splunk Enterprise Security
Building an Analytics Enables SOC
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk for Enterprise Security Featuring UBA
Building an Analytics - Enabled SOC Breakout Session
Splunk for Security-Hands On
PCTY 2012, IBM Security and Strategy v. Fabio Panada
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk for Enterprise Security Featuring User Behavior Analytics
Enterprise Security featuring UBA
Splunk for Security: Background & Customer Case Study
Security investigation hands-on workshop 2018
Operational Security Intelligence
Splunk for Security
Splunk workshop-Threat Hunting
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery Dusseldorf: September 2017 - Security Session
Enterprise Security and User Behavior Analytics
Ad

Similar to Webinar: Neues zur Splunk App for Enterprise Security (20)

PDF
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
PPTX
Splunk EMEA Webinar: Scoping infections and disrupting breaches
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PPTX
Splunk for Enterprise Security featuring UBA Breakout Session
PPTX
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
PPTX
Operational Security
PDF
Splunk Webinar Best Practices für Incident Investigation
PDF
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
PPTX
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
PDF
SplunkLive! Zürich - Splunk für Security
PDF
SplunkLive! Wien - Splunk für Security
PPTX
Security crawl walk run presentation mckay v1 2017
PPTX
Splunk for Enterprise Security featuring UBA Breakout Session
PPTX
Splunk for Security Breakout Session
PDF
Splunk conf2014 - Operationalizing Advanced Threat Defense
PPTX
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
PPTX
SplunkLive! - Splunk for Security
PPTX
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
PPTX
Operational Security Intelligence Breakout Session
PPTX
Virtual Gov Day - Security Breakout - Deloitte
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Operational Security
Splunk Webinar Best Practices für Incident Investigation
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
SplunkLive! Zürich - Splunk für Security
SplunkLive! Wien - Splunk für Security
Security crawl walk run presentation mckay v1 2017
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Security Breakout Session
Splunk conf2014 - Operationalizing Advanced Threat Defense
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
SplunkLive! - Splunk for Security
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
Operational Security Intelligence Breakout Session
Virtual Gov Day - Security Breakout - Deloitte
Ad

More from Georg Knon (20)

PDF
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
PDF
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
PDF
SplunkLive! Zürich 2016 - Use Case Swisscom
PPTX
SplunkLive! Zürich 2016 - Use Case Helvetia
PDF
SplunkLive! Zürich 2016 - Use Case Adcubum
PDF
Splunk Webinar: Splunk für Application Management
PDF
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
PPTX
Splunk for IT Operations Breakout Session
PPTX
Getting started with Splunk - Break out Session
PDF
Webinar Big Data zur Echtzeit-Betrugserkennung im eBanking nutzen mit Splunk ...
PPTX
Splunk Webinar: Verwandeln Sie Datensilos in Operational Intelligence
PPTX
5 Möglichkeiten zur Verbesserung Ihrer Security
PPTX
Splunk IT Service Intelligence
PPTX
Data models pivot with splunk break out session
PPTX
Splunk IT Service Intelligence
PPTX
Splunk Internet of Things Roundtable 2015
PPTX
Webinar splunk cloud saa s plattform für operational intelligence
PPTX
Splunk Webinar: Maschinendaten anreichern mit Informationen
PDF
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
PPTX
Webinar: Vulnerability Management leicht gemacht – mit Splunk und Qualys
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
SplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case Helvetia
SplunkLive! Zürich 2016 - Use Case Adcubum
Splunk Webinar: Splunk für Application Management
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk for IT Operations Breakout Session
Getting started with Splunk - Break out Session
Webinar Big Data zur Echtzeit-Betrugserkennung im eBanking nutzen mit Splunk ...
Splunk Webinar: Verwandeln Sie Datensilos in Operational Intelligence
5 Möglichkeiten zur Verbesserung Ihrer Security
Splunk IT Service Intelligence
Data models pivot with splunk break out session
Splunk IT Service Intelligence
Splunk Internet of Things Roundtable 2015
Webinar splunk cloud saa s plattform für operational intelligence
Splunk Webinar: Maschinendaten anreichern mit Informationen
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Webinar: Vulnerability Management leicht gemacht – mit Splunk und Qualys

Recently uploaded (20)

PDF
Understanding Forklifts - TECH EHS Solution
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
System and Network Administration Chapter 2
PPTX
Odoo POS Development Services by CandidRoot Solutions
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
Online Work Permit System for Fast Permit Processing
PPTX
Introduction to Artificial Intelligence
PDF
Digital Strategies for Manufacturing Companies
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
Transform Your Business with a Software ERP System
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
PTS Company Brochure 2025 (1).pdf.......
Understanding Forklifts - TECH EHS Solution
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Which alternative to Crystal Reports is best for small or large businesses.pdf
2025 Textile ERP Trends: SAP, Odoo & Oracle
Upgrade and Innovation Strategies for SAP ERP Customers
Design an Analysis of Algorithms II-SECS-1021-03
System and Network Administration Chapter 2
Odoo POS Development Services by CandidRoot Solutions
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Odoo Companies in India – Driving Business Transformation.pdf
L1 - Introduction to python Backend.pptx
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
How to Migrate SBCGlobal Email to Yahoo Easily
Online Work Permit System for Fast Permit Processing
Introduction to Artificial Intelligence
Digital Strategies for Manufacturing Companies
Navsoft: AI-Powered Business Solutions & Custom Software Development
Transform Your Business with a Software ERP System
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PTS Company Brochure 2025 (1).pdf.......

Webinar: Neues zur Splunk App for Enterprise Security

  • 1. Copyright  ©  2015  Splunk  Inc.   The  Splunk  App  for   Enterprise  Security       Holger  Sesterhenn,   Sen.  Sales  Engineer,  CISSP     MaChias  Maier,     Security  Product  MarkeEng,  EMEA        
  • 2. 2   Ihr  Webcast  Team   Ma#hias  Maier   Security  Product  MarkeEng,  EMEA   mmaier@splunk.com   Holger  Sesterhenn   Sen.  Sales  Engineer   hsesterhenn@splunk.com  
  • 3. Copyright  ©  2015  Splunk  Inc.   Safe  Harbor  Statement   During   the   course   of   this   presentaEon,   we   may   make   forward   looking   statements   regarding   future   events  or  the  expected  performance  of  the  company.  We  cauEon  you  that  such  statements  reflect  our   current  expectaEons  and  esEmates  based  on  factors  currently  known  to  us  and  that  actual  events  or   results  could  differ  materially.  For  important  factors  that  may  cause  actual  results  to  differ  from  those   contained  in  our  forward-­‐looking  statements,  please  review  our  filings  with  the  SEC.    The  forward-­‐looking   statements  made  in  this  presentaEon  are  being  made  as  of  the  Eme  and  date  of  its  live  presentaEon.   If  reviewed  aSer  its  live  presentaEon,  this  presentaEon  may  not  contain  current  or  accurate  informaEon.     We  do  not  assume  any  obligaEon  to  update  any  forward  looking  statements  we  may  make.  In  addiEon,   any  informaEon  about  our  roadmap  outlines  our  general  product  direcEon  and  is  subject  to  change  at   any  Eme  without  noEce.  It  is  for  informaEonal  purposes  only  and  shall  not  be  incorporated  into  any   contract   or   other   commitment.   Splunk   undertakes   no   obligaEon   either   to   develop   the   features   or   funcEonality  described  or  to  include  any  such  feature  or  funcEonality  in  a  future  release.  
  • 4. Copyright  ©  2015  Splunk  Inc.   How  Can  Splunk  Help?  
  • 5. Roadmap   Security  Strategy   Security  Posture   Visual  Security  AnalyEcs   Advanced  Threats   Insider  Threat  
  • 7. Source:  Mandiant  M-­‐Trends  Report  2012/2013/2014   67%   VicEms  noEfied   by  an  external   enEty   100%   Valid  credenEals   were  used   229   Median  #  of   days  before   detecEon   The  Ever-­‐Changing  Threat  Landscape  
  • 8. Copyright  ©  2015  Splunk  Inc.   Intrusion     DetecEon   Firewall   Data  Loss   PrevenEon   AnE-­‐Malware   Vulnerability   Scans   AuthenEcaEon   TradiEonal  Security  Strategy  
  • 9. Copyright  ©  2015  Splunk  Inc.   Connect  the  Dots  Across  All  Data   Servers   Storage   Desktops  Email   Web   TransacEon   Records   Network   Flows   Hypervisor   Custom   Apps   Physical   Access   Badges   Threat   Intelligence   Mobile   CMBD  DHCP/DNS   Intrusion     DetecEon   Firewall   Data  Loss   PrevenEon   AnE-­‐ Malware   Vulnerability   Scans   AuthenEcaEon  
  • 10. Copyright  ©  2015  Splunk  Inc.   ConnecEng  the  “Data  Dots”  via  MulEple/Dynamic  RelaEonships   Persist,  Repeat   Threat  Intelligence   Auth—User  Roles   Host     Ac@vity/Security   Network     Ac@vity/Security   ACacker,  know  relay/C2  sites,  infected  sites,  IOC,   aCack/campaign  intent  and  aCribuEon   Where  they  went  to,  who  talked  to  whom,  aCack   transmiCed,  abnormal  traffic,  malware  download   What  process  is  running  (malicious,  abnormal,  etc.)   Process  owner,  registry  mods,  aCack/malware   arEfacts,  patching  level,  aCack  suscepEbility   Access  level,  privileged  users,  likelihood  of  infecEon,   where  they  might  be  in  kill  chain     Delivery,  exploit   installa@on   Gain  trusted   access   Exfiltra@on  Data  gathering  Upgrade  (escalate)   lateral  movement   Persist,  repeat    
  • 11. AnalyEcs-­‐Driven  Security   Risk  Based   Context  and  Intelligence   ConnecEng  Data   and  People  
  • 12. Copyright  ©  2015  Splunk  Inc.   Sample  Nasdaq  -­‐  Heartbleed  
  • 13. Complement,  replace  and  go  beyond  tradi@onal  SIEMs   Security  Intelligence  Use  Cases   13   SECURITY  &                     COMPLIANCE   REPORTING   REAL-­‐TIME   MONITORING  OF   KNOWN  THREATS   MONITORING     OF  UNKNOWN   THREATS   INCIDENT   INVESTIGATIONS   &  FORENSICS   FRAUD     DETECTION   INSIDER     THREAT  
  • 14. Roadmap   Security  Strategy   • ConnecEng  Data  and  People   Security  Posture  
  • 15. 15   What’s  New  in  Splunk  App  for  Enterprise  Security  3.3   BeCer   DetecEon  of   Advanced   Threats   •  STIX/TAXII  &  OpenIOC   threat  intelligence   •  IOC/arEfacts  research   Improved   CollaboraEon   •  Export  correlaEon   searches,  KSIs,  swim  lanes   BeCer   DetecEon  of   Malicious   Insiders   •  User  acEvity  monitoring   dashboard  and  swim  lanes   •  Access  anomalies     Faster  Incident   Response   •  Added  funcEonality  to   Incident  Response  page   Benefit  Feature  
  • 16. Roadmap   Security  Strategy   • ConnecEng  Data  and  People   Security  Posture   • SituaEonal  Awareness   Visual  Security  AnalyEcs  
  • 17. Roadmap   Security  Strategy   • ConnecEng  Data  and  People   Security  Posture   • SituaEonal  Awareness   Visual  Security  AnalyEcs   • Contextual  Analysis   Advanced  Threats  
  • 18. Copyright  ©  2015  Splunk  Inc.   hCp://sExproject.github.io/about/    
  • 19. Copyright  ©  2015  Splunk  Inc.   STIX/TAXII  and  Open  IOC  101     •  Info  sharing  across  companies  and     industries     •  Standardized  XML   •  Contains  TTPs,  IOCs,  COA   •  IOCs  include  IPs,  web/e-­‐mail     domains,  hashes,  processes,     registry  key,  cerEficates     •  hCp://sExproject.github.io/about/  
  • 20. Copyright  ©  2015  Splunk  Inc.   Threat  Intelligence  in  Splunk  
  • 21. Copyright  ©  2015  Splunk  Inc.   TAXII  Services   Source:  hCp://hailataxii.com  
  • 22. Copyright  ©  2015  Splunk  Inc.   Sample  TAXII  Feeds   User  Community   Organisa@on   Cyber  Threat  XChange   Health  InformaEon  Trust  Alliance   Defense  Security  InformaEon  Exchange   Defense  Industrial  Base  InformaEon  and  Sharing   and  Analysis  OrganizaEon   ICS-­‐ISAC   Industrial  Control  System  InformaEon  Sharing  and   Analysis  Center   NH-­‐ISAC  NaEonal  Health  Cybersecurity   Intelligence  Planorm   NaEonal  Health  InformaEon  and  Analysis  Center   FS-­‐ISAC  /  Soltra  Edge   Financial  Services  InformaEon  Sharing  and   Analyses  Center  (FS-­‐ISAC)   Retail  Cyber  Intelligence  Sharing  Center,   Intelligence  Sharing  Portal   Retail  InformaEon  Sharing  and  Analysis  Center   (Retail-­‐ISAC)   More:  hCp://sExproject.github.io/supporters/  
  • 23. Roadmap   Security  Strategy   • ConnecEng  Data  and  People   Security  Posture   • SituaEonal  Awareness   Visual  Security  AnalyEcs   • Contextual  Analysis   Advanced  Threats   • Knowledge  Sharing  and  AdopEon   Insider  Threat  
  • 24. Copyright  ©  2015  Splunk  Inc.   DetecEng  Suspicious  User  AcEvity   •  Spot  suspicious  user  acEvity     •  Malicious  insider  or  external  threat  using  stolen  credenEals     •  High  aggregate  risk  score   •  Uploaded  data  to  non-­‐corp  sites     •  Emailed  data  to  non-­‐corp  domains     •  Visits  to  blacklisted  sites     •  Remote  access     •  Anomalous  help  desk  Ecket    
  • 25. Roadmap   Security  Strategy   • ConnecEng  Data  and  People   Security  Posture   • SituaEonal  Awareness   Visual  Security  AnalyEcs   • Contextual  Analysis   Advanced  Threats   • Knowledge  Sharing  and  AdopEon   Insider  Threat   • Stop  Data  Breaches  
  • 26. Copyright  ©  2015  Splunk  Inc.   Case  Study:  Telenor   "   Challanges:   –  Millions  of  customers,  thousands  of  servers  and  routers   and  they  had  missing  details  in  operaEve  tasks.   –  CommunicaEon  between  departments  was  challanging.   –  Errors  and  issues  sporadically  slipped  unnoEced.   "   Breakthroughs:   –  Team  noEced  WebMail  accounts  being  abused  to  send   hundreds  of  thousands  of  SMS  messages  abroad   –  Baselining  normal  and  track  DeviaEon   –  Understand  aCackers  and  their  behaviour  to  take  them   down  proacEve.     Norway's largest telecom services provider 160 Mio mobile subscribers globally
  • 27. Copyright  ©  2015  Splunk  Inc.   Thank  You!     Q&A