SlideShare a Scribd company logo
Incident response live demo slides final
Agenda
Investigations
• What are they?
• What questions can they answer?
• Is the number 42 always relevant?
Investigation Walk-Throughs
• This won’t be all slides…we promise..
Recap
What is an Investigation?
An Investigation is the act of ascertaining facts
A careful examination
Or simply it answers: “What do I do?”
And there is a result……..sometimes
What Initiates an Investigation?
Someone asks you
• Hey I think PlayStation network is down?
You see something unusual
• Ever get that feeling someone is watching you?
• Certain patterns of logs
• New Assets
Alarms!
• More..
..but what does it all mean?
What is an Alarm?
An alarm is a pattern of activity that should be investigated
• The logic that creates an alarm is customizable
Inside a SIEM an alarm could be
• A single event
• A series of events
• Event quantity
• ..and more
Process of an Investigation
Gather Information
Follow the trail
Look for Clues
Determine severity
Am I Finished?
Do you know what to do?
What does the IRP say?
Hint: no you aren’t
Document it!
If it’s not in a Ticket– it didn’t happen!
Why is Documentation Important?
Avoid Repetition
Avoid Repetition (yes we repeated this)
Share Information
Liability
Find patterns
Find anomalies or outliers
Find misconfigurations or unapproved changes
Demo Time
Show me the packets!
ASSET DISCOVERY
• Active Network Scanning
• Passive Network Scanning
• Asset Inventory
VULNERABILITY ASSESSMENT
• Continuous
Vulnerability Monitoring
• Authenticated / Unauthenticated
Active Scanning
BEHAVIORAL MONITORING
• Log Collection
• Netflow Analysis
• Service Availability Monitoring
SECURITY INTELLIGENCE/SIEM
• SIEM Event Correlation
• Incident Response
THREAT DETECTION
• Network IDS
• Host IDS
• File Integrity Monitoring
USM Platform
Integrated, Essential Security Controls
Unified Security Management Platform
A single platform for simplified, accelerated threat detection, incident response
& policy compliance
AlienVault Labs Threat Intelligence
Correlation rules and directives written by our
AlienVault Labs team and displayed through
the USM interface
Open Threat Exchange
The world’s largest repository of
crowd-sourced threat data providing a
continuous view of real time threats that may
have penetrated the company’s defenses.
Unified Security Management
Demo Time
Show me the packets!
Recap
It’s important to know what the alarm is
Use search filters to help you prioritize investigations
Use policy to filter alarms you don’t need to re-investigate
Even though it’s familiar you still need to investigate
Have a plan for what you could find (IRP)
Write stuff down….
888.613.6023
ALIENVAULT.COM
CONTACT US
HELLO@ALIENVAULT.COM
Now for some Questions..
Questions? Hello@AlienVault.com
Twitter : @alienvault
Test Drive AlienVault USM
Download a Free 30-Day Trial
http://www.alienvault.com/free-trial
Check out our 15-Day Trial of USM for AWS
https://www.alienvault.com/free-trial/usm-for-aws
Try our Interactive Demo Site
http://www.alienvault.com/live-demo-site

More Related Content

PPTX
Improve threat detection with hids and alien vault usm
PPTX
IDS for Security Analysts: How to Get Actionable Insights from your IDS
PPTX
Improve Situational Awareness for Federal Government with AlienVault USM
PPTX
Alienvault threat alerts in spiceworks
PPTX
Malware detection how to spot infections early with alien vault usm
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PPTX
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
PPTX
Simplify PCI DSS Compliance with AlienVault USM
Improve threat detection with hids and alien vault usm
IDS for Security Analysts: How to Get Actionable Insights from your IDS
Improve Situational Awareness for Federal Government with AlienVault USM
Alienvault threat alerts in spiceworks
Malware detection how to spot infections early with alien vault usm
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM

What's hot (20)

PPTX
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
PPTX
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
PDF
Open Source IDS Tools: A Beginner's Guide
PPTX
How Malware Works
PPTX
How to Solve Your Top IT Security Reporting Challenges with AlienVault
PPTX
AWS Security Best Practices for Effective Threat Detection & Response
PPTX
Otx introduction sw
PPTX
Beginner's Guide to SIEM
PPTX
Creating Correlation Rules in AlienVault
PPTX
How to Detect System Compromise & Data Exfiltration with AlienVault USM
PPTX
Improve Threat Detection with OSSEC and AlienVault USM
PPTX
Six Steps to SIEM Success
PPTX
How to Detect SQL Injections & XSS Attacks with AlienVault USM
PPTX
How to Simplify Audit Compliance with Unified Security Management
PDF
Modern vs. Traditional SIEM
PDF
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PPTX
Improve Security Visibility with AlienVault USM Correlation Directives
PPTX
Automating Critical Security Controls for Threat Remediation and Compliance
PDF
20 Security Controls for the Cloud
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Open Source IDS Tools: A Beginner's Guide
How Malware Works
How to Solve Your Top IT Security Reporting Challenges with AlienVault
AWS Security Best Practices for Effective Threat Detection & Response
Otx introduction sw
Beginner's Guide to SIEM
Creating Correlation Rules in AlienVault
How to Detect System Compromise & Data Exfiltration with AlienVault USM
Improve Threat Detection with OSSEC and AlienVault USM
Six Steps to SIEM Success
How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Simplify Audit Compliance with Unified Security Management
Modern vs. Traditional SIEM
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
Improve Security Visibility with AlienVault USM Correlation Directives
Automating Critical Security Controls for Threat Remediation and Compliance
20 Security Controls for the Cloud
Ad

Viewers also liked (7)

PDF
Alien vault sans cyber threat intelligence
PDF
The State of Incident Response - INFOGRAPHIC
PDF
PCI DSS Implementation: A Five Step Guide
PPTX
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
PDF
Security operations center 5 security controls
PDF
Insider Threat Detection Recommendations
PPSX
HP ArcSight
Alien vault sans cyber threat intelligence
The State of Incident Response - INFOGRAPHIC
PCI DSS Implementation: A Five Step Guide
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
Security operations center 5 security controls
Insider Threat Detection Recommendations
HP ArcSight
Ad

Similar to Incident response live demo slides final (20)

PDF
Incident Response Whitepaper - AlienVault
PPTX
Generic siem how_2017
PPT
Security Outsourcing - Couples Counseling - Atif Ghauri
PPTX
Vulnerability Management: What You Need to Know to Prioritize Risk
PPTX
SIEM - Your Complete IT Security Arsenal
PPTX
How to Investigate Threat Alerts in Spiceworks!
PPTX
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
PPTX
SpiceWorks Webinar: Whose logs, what logs, why logs
PPTX
Karunia Wijaya - Proactive Incident Handling
DOCX
Overall Security Process Review CISC 6621Agend.docx
PDF
G05.2013 Security Information and Event Management
PPTX
Tips on SIEM Ops 2015
PDF
You have a SIEM! And now?
PPTX
Securing Systems - Still Crazy After All These Years
PPTX
5 Steps to an Effective Vulnerability Management Program
PPTX
Security Operations Center (SOC) Essentials for the SME
PPTX
From Zero to SOC: Designing Effective Threat Detection & Incident Response
PDF
SIEM evaluator guide for soc analyst
PDF
Cybersecurity Series SEIM Log Analysis
PPTX
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
Incident Response Whitepaper - AlienVault
Generic siem how_2017
Security Outsourcing - Couples Counseling - Atif Ghauri
Vulnerability Management: What You Need to Know to Prioritize Risk
SIEM - Your Complete IT Security Arsenal
How to Investigate Threat Alerts in Spiceworks!
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
SpiceWorks Webinar: Whose logs, what logs, why logs
Karunia Wijaya - Proactive Incident Handling
Overall Security Process Review CISC 6621Agend.docx
G05.2013 Security Information and Event Management
Tips on SIEM Ops 2015
You have a SIEM! And now?
Securing Systems - Still Crazy After All These Years
5 Steps to an Effective Vulnerability Management Program
Security Operations Center (SOC) Essentials for the SME
From Zero to SOC: Designing Effective Threat Detection & Incident Response
SIEM evaluator guide for soc analyst
Cybersecurity Series SEIM Log Analysis
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...

More from AlienVault (6)

PDF
Malware Invaders - Is Your OS at Risk?
PPTX
Best Practices for Configuring Your OSSIM Installation
PPTX
Security by Collaboration: Rethinking Red Teams versus Blue Teams
PPTX
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
PPTX
Spice world 2014 hacker smackdown
PPTX
Demo how to detect ransomware with alien vault usm_gg
Malware Invaders - Is Your OS at Risk?
Best Practices for Configuring Your OSSIM Installation
Security by Collaboration: Rethinking Red Teams versus Blue Teams
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
Spice world 2014 hacker smackdown
Demo how to detect ransomware with alien vault usm_gg

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Big Data Technologies - Introduction.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Monthly Chronicles - July 2025
Encapsulation_ Review paper, used for researhc scholars
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Reach Out and Touch Someone: Haptics and Empathic Computing
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Advanced methodologies resolving dimensionality complications for autism neur...
Empathic Computing: Creating Shared Understanding
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Weekly Chronicles - August'25 Week I
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Big Data Technologies - Introduction.pptx

Incident response live demo slides final

  • 2. Agenda Investigations • What are they? • What questions can they answer? • Is the number 42 always relevant? Investigation Walk-Throughs • This won’t be all slides…we promise.. Recap
  • 3. What is an Investigation? An Investigation is the act of ascertaining facts A careful examination Or simply it answers: “What do I do?” And there is a result……..sometimes
  • 4. What Initiates an Investigation? Someone asks you • Hey I think PlayStation network is down? You see something unusual • Ever get that feeling someone is watching you? • Certain patterns of logs • New Assets Alarms! • More..
  • 5. ..but what does it all mean?
  • 6. What is an Alarm? An alarm is a pattern of activity that should be investigated • The logic that creates an alarm is customizable Inside a SIEM an alarm could be • A single event • A series of events • Event quantity • ..and more
  • 7. Process of an Investigation Gather Information Follow the trail Look for Clues Determine severity
  • 8. Am I Finished? Do you know what to do? What does the IRP say? Hint: no you aren’t
  • 9. Document it! If it’s not in a Ticket– it didn’t happen!
  • 10. Why is Documentation Important? Avoid Repetition Avoid Repetition (yes we repeated this) Share Information Liability Find patterns Find anomalies or outliers Find misconfigurations or unapproved changes
  • 11. Demo Time Show me the packets!
  • 12. ASSET DISCOVERY • Active Network Scanning • Passive Network Scanning • Asset Inventory VULNERABILITY ASSESSMENT • Continuous Vulnerability Monitoring • Authenticated / Unauthenticated Active Scanning BEHAVIORAL MONITORING • Log Collection • Netflow Analysis • Service Availability Monitoring SECURITY INTELLIGENCE/SIEM • SIEM Event Correlation • Incident Response THREAT DETECTION • Network IDS • Host IDS • File Integrity Monitoring USM Platform Integrated, Essential Security Controls
  • 13. Unified Security Management Platform A single platform for simplified, accelerated threat detection, incident response & policy compliance AlienVault Labs Threat Intelligence Correlation rules and directives written by our AlienVault Labs team and displayed through the USM interface Open Threat Exchange The world’s largest repository of crowd-sourced threat data providing a continuous view of real time threats that may have penetrated the company’s defenses. Unified Security Management
  • 14. Demo Time Show me the packets!
  • 15. Recap It’s important to know what the alarm is Use search filters to help you prioritize investigations Use policy to filter alarms you don’t need to re-investigate Even though it’s familiar you still need to investigate Have a plan for what you could find (IRP) Write stuff down….
  • 16. 888.613.6023 ALIENVAULT.COM CONTACT US HELLO@ALIENVAULT.COM Now for some Questions.. Questions? Hello@AlienVault.com Twitter : @alienvault Test Drive AlienVault USM Download a Free 30-Day Trial http://www.alienvault.com/free-trial Check out our 15-Day Trial of USM for AWS https://www.alienvault.com/free-trial/usm-for-aws Try our Interactive Demo Site http://www.alienvault.com/live-demo-site