SlideShare a Scribd company logo
Neil Desai
Solver of Problems, Causer of Mahem
Data Driven Analytics
Working towards success
https://medium.com/@sqrrldata/the-cyber-hunting-maturity-model-6d506faa8ad5
Working towards success
https://github.com/swannman/ircapabilities
Working towards success
https://github.com/swannman/ircapabilities
SOC Alert
MALWARE-BACKDOOR BackConstruction 2.1 Client FTP Open Request
MALWARE-BACKDOOR BackConstruction 2.1 Server FTP Open Reply
MALWARE-BACKDOOR Matrix 2.0 Client connect
MALWARE-BACKDOOR Matrix 2.0 Server access
MALWARE-BACKDOOR WinCrash 1.0 Server Active
MALWARE-BACKDOOR CDK
MALWARE-BACKDOOR DeepThroat 3.1 Server Response
MALWARE-BACKDOOR PhaseZero Server Active on Network
MALWARE-BACKDOOR w00w00 attempt
MALWARE-BACKDOOR attempt
MALWARE-BACKDOOR MISC r00t attempt
MALWARE-BACKDOOR MISC rewt attempt
MALWARE-BACKDOOR MISC Linux rootkit attempt
MALWARE-BACKDOOR MISC Linux rootkit attempt lrkr0x
MALWARE-BACKDOOR MISC Linux rootkit attempt
MALWARE-BACKDOOR MISC Linux rootkit satori attempt
MALWARE-BACKDOOR MISC sm4ck attempt
MALWARE-BACKDOOR MISC Solaris 2.5 attempt
MALWARE-BACKDOOR HidePak backdoor attempt
MALWARE-BACKDOOR HideSource backdoor attempt
PROTOCOL-ICMP TFN Probe
PROTOCOL-ICMP tfn2k icmp possible communication
MALWARE-OTHER Trin00 Daemon to Master PONG message detected
PROTOCOL-ICMP Stacheldraht server spoof
PROTOCOL-ICMP Stacheldraht gag server response
PROTOCOL-ICMP Stacheldraht server response
SOC Alerts
SOC Alert
SOC Alert
SOC Alert
Incomplete Data
https://www.patheos.com/blogs/driventoabstraction/2018/07/blind-men-elephant-folklore-knowledge/
Alerts vs Raw Data
• Alerts give very specific information, but they don’t tell the whole story. Context is
key, but isn’t in the alert.
• Alert logic may not be visible to the analyst or hard to interpret.
• Alert may not give enough details.
• Raw data is high volume and hard to sift through.
• Either create alerts from the raw data or get both.
Trust, But Verify
• Log settings can change during an upgrade of a product, by mistake, or
maliciously.
• “Turn on Logs” is not really a setting. Check to see exactly what’s enabled and
where.
• Regularly test to ensure logs (volume and variety) are as expected.
• Operationalize log collection.
• Understand what you have today, and determine what you need
MITRE ATT&CK
• Use the framework to determine your visibility gap
(https://cyberwardog.blogspot.com/2017/07/how-hot-is-your-hunt-team.html)
• Use testing frameworks to check detections
(https://github.com/redcanaryco/atomic-red-team)
Winlogbeat + Sysmon +
https://github.com/olafhartong/sysmon-modular
Auditbeat + https://github.com/bfuzzy/auditd-attack

More Related Content

PDF
Web Application Firewall - Friend of your DevOps Pipeline?
PPTX
Automating MySQL Deployments on Kubernetes
PDF
WAF In DevOps DevOpsFusion2019
PDF
Percon XtraDB Cluster in a nutshell
PDF
Etcd- Mission Critical Key-Value Store
ODP
Plmce2k15 15 tips galera cluster
PDF
TW SEAT - DevOps: Security 干我何事?
PPTX
Setting up Cisco WSA Proxy in Transparent and Explicit Mode
Web Application Firewall - Friend of your DevOps Pipeline?
Automating MySQL Deployments on Kubernetes
WAF In DevOps DevOpsFusion2019
Percon XtraDB Cluster in a nutshell
Etcd- Mission Critical Key-Value Store
Plmce2k15 15 tips galera cluster
TW SEAT - DevOps: Security 干我何事?
Setting up Cisco WSA Proxy in Transparent and Explicit Mode

What's hot (20)

PDF
Webinar slides: Top 9 Tips for building a stable MySQL Replication environment
PDF
DevOpsDays - DevOps: Security 干我何事?
PDF
Dynamic Database Credentials: Security Contingency Planning
PPT
Monitoring and Tuning GlassFish
PDF
Webinar slides: ClusterControl 1.4: The MySQL Replication & MongoDB Edition -...
PDF
Using Vault to decouple MySQL Secrets
PPTX
Workshop desarrollo Cassandra con el driver Java
PDF
Issuing temporary credentials for my sql using hashicorp vault
PDF
Securing your Cloud Environment
PDF
Advanced nginx in mercari - How to handle over 1,200,000 HTTPS Reqs/Min
PDF
Security model for a remote company
PDF
Null bhopal Sep 2016: What it Takes to Secure a Web Application
PDF
HashiCorp's Vault - The Examples
PDF
Chickens & Eggs: Managing secrets in AWS with Hashicorp Vault
PDF
Managing secrets at scale
PDF
Securing Your Containerized Applications with NGINX
PDF
HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)
PPTX
Vault - Secret and Key Management
PDF
ruxc0n 2012
PDF
NGINX Can Do That? Test Drive Your Config File!
Webinar slides: Top 9 Tips for building a stable MySQL Replication environment
DevOpsDays - DevOps: Security 干我何事?
Dynamic Database Credentials: Security Contingency Planning
Monitoring and Tuning GlassFish
Webinar slides: ClusterControl 1.4: The MySQL Replication & MongoDB Edition -...
Using Vault to decouple MySQL Secrets
Workshop desarrollo Cassandra con el driver Java
Issuing temporary credentials for my sql using hashicorp vault
Securing your Cloud Environment
Advanced nginx in mercari - How to handle over 1,200,000 HTTPS Reqs/Min
Security model for a remote company
Null bhopal Sep 2016: What it Takes to Secure a Web Application
HashiCorp's Vault - The Examples
Chickens & Eggs: Managing secrets in AWS with Hashicorp Vault
Managing secrets at scale
Securing Your Containerized Applications with NGINX
HTTPS: Achievements, Challenges, and Epiphany (Web Engines Hackfest 2015)
Vault - Secret and Key Management
ruxc0n 2012
NGINX Can Do That? Test Drive Your Config File!
Ad

Similar to Neil Desai - Data Driven Analytics (20)

PPTX
Hands-On Security - Disrupting the Kill Chain
PDF
PHDays 2018 Threat Hunting Hands-On Lab
PPTX
Ensuring Security and Compliance in a Data Deluge
PPTX
Threat hunting and achieving security maturity
PPTX
The Indicators of Compromise
PPTX
Threat hunting for Beginners
PPTX
Security Operation Center Presentat.pptx
PDF
Loggin alerting and hunting technology hub 2016
PPTX
Connecting the Dots - Mastering Alert Correlation for Proactive Defense in th...
PPTX
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
PDF
InfoSec Deep Learning in Action
PPTX
Threat Hunting with Splunk
PPTX
Intrusion detection system
PPTX
Operational Security Intelligence
PPTX
Hands on Security - Disrupting the Kill Chain Breakout Session
PPTX
Splunk for Security - Hands-On
PDF
6 Scope & 7 Live Data Collection
PPTX
How i'm going to own your organization v2
PPTX
BSIDES-PR Keynote Hunting for Bad Guys
PDF
OFFENSIVE IDS
Hands-On Security - Disrupting the Kill Chain
PHDays 2018 Threat Hunting Hands-On Lab
Ensuring Security and Compliance in a Data Deluge
Threat hunting and achieving security maturity
The Indicators of Compromise
Threat hunting for Beginners
Security Operation Center Presentat.pptx
Loggin alerting and hunting technology hub 2016
Connecting the Dots - Mastering Alert Correlation for Proactive Defense in th...
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
InfoSec Deep Learning in Action
Threat Hunting with Splunk
Intrusion detection system
Operational Security Intelligence
Hands on Security - Disrupting the Kill Chain Breakout Session
Splunk for Security - Hands-On
6 Scope & 7 Live Data Collection
How i'm going to own your organization v2
BSIDES-PR Keynote Hunting for Bad Guys
OFFENSIVE IDS
Ad

More from CSNP (12)

PDF
Brian Sanders - Business Electronic Compromise (BEC)
PDF
David Klein - Defending Against Nation Sate Attackers & Ransomware
PPTX
Nicholas Dorans - The Evolution of Passwords
PDF
Emily Stamm - Post-Quantum Cryptography
PDF
Tarik Moataz - Encrypted Search: from Research to Real-World Systems
PDF
Elliptic Curves in Cryptography
PDF
DefendEdge - Negotiating Ransomware
PDF
Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and...
PDF
Complyify Car Hacking & Cyber Risk
PDF
Aon Ransomware Response and Mitigation Strategies
PDF
Aon - Cyber Insurance in the World of Cyber Criminals
PDF
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
Brian Sanders - Business Electronic Compromise (BEC)
David Klein - Defending Against Nation Sate Attackers & Ransomware
Nicholas Dorans - The Evolution of Passwords
Emily Stamm - Post-Quantum Cryptography
Tarik Moataz - Encrypted Search: from Research to Real-World Systems
Elliptic Curves in Cryptography
DefendEdge - Negotiating Ransomware
Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and...
Complyify Car Hacking & Cyber Risk
Aon Ransomware Response and Mitigation Strategies
Aon - Cyber Insurance in the World of Cyber Criminals
Guardicore - Shrink Your Attack Surface with Micro-Segmentation

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
A Presentation on Artificial Intelligence
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
20250228 LYD VKU AI Blended-Learning.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
A Presentation on Artificial Intelligence
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
NewMind AI Weekly Chronicles - August'25-Week II
The Rise and Fall of 3GPP – Time for a Sabbatical?
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Network Security Unit 5.pdf for BCA BBA.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
The AUB Centre for AI in Media Proposal.docx
Digital-Transformation-Roadmap-for-Companies.pptx
Spectroscopy.pptx food analysis technology
Spectral efficient network and resource selection model in 5G networks
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
“AI and Expert System Decision Support & Business Intelligence Systems”
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Neil Desai - Data Driven Analytics

Editor's Notes

  • #2: Hi, everyone. Over the past few years, we’ve been making it easier for our users to deploy Elastic for Security Analytics. We define Security Analytics as the highly scalable collection, indexing, and real-time advanced analysis of all kinds of security-related data… We’re now introducing Elastic SIEM to provide a curated experience for security analysts and investigators to perform: Security information and event management Threat detection Threat hunting
  • #3: This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  • #4: This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  • #5: This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  • #6: This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  • #7: This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  • #8: This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  • #9: This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  • #10: This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  • #11: This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  • #12: This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  • #13: This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  • #14: This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  • #15: This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.
  • #16: This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. Threat hunting was the most common early use case and Elastic is still the runaway leader for this work. Speed, Scale, and Relevance are the biggest reasons why. This widespread community adoption brought us to explore how we can make it easier to use the Elastic Stack for security use cases. So what have we been building? Let me share some recent highlights: We built the Elastic Common Schema in order to enable our users to normalize all their diverse security-related data. We’ve introduced a number of “modules” for security-relevant use cases, including Suricata, Zeek, NetFlow, Linux Audit Framework, and more. In June, we introduced a new SIEM app in Kibana that gives SOC analysts a curated way to interact with their security events and alerts for investigations and threat hunting. We’ll talk about this in some detail in just a minute. We joined forces with security consultancy “Perched” soon afterward, expanding our bench of battle-tested security practitioners, helping customers be successful in the field. Saving the best for last, Endgame has joined Elastic.