SlideShare a Scribd company logo
01
Automating
cybersecurity
02
Automating
cybersecurity: Facts
Cybersecurity teams are:
1. Stretched
2. Manifesting
alert fatigue
3. Facing escalating
volume of alerts to sort
4. Bogged down
with time-
consuming tasks
1.8 million global shortage of
cybersecurity professionals by 2022
50% of enterprises have six or more
tools that generate security alerts
03
Security operations teams:
• Face increasingly hostile threat landscape
• Are struggling to keep up with high volume
of security alerts
• Rely on manual, document-based
procedures for operations.
• Have longer analyst onboarding times
• Use stale procedures, inconsistent
operational functions.
• Lack people, expertise and budgets to
protect against threats adequately.
• Threat intelligence management capabilities
are starting to merge with SOAR tools to
provide a single operational tool
Automating
cybersecurity: Trends
Automating cybersecurity
With automation, the manual effort and time involved
from detection to alert triage and remediation can be
reduced and it may even be possible to stop an
ongoing attack in its tracks.
A good SOAR (Security Orchestration Automation
and Response) can help you compile automation
playbooks to alleviate some of those important, but
time-consuming, manual tasks and manage complex
use cases.
04
Use case #1:
Phishing attacks
• Huge attack volume and velocity
• SOCs and analysts can’t keep up
• Switching multiple screens to
coordinate responses
• Unable to standardise response
and reporting
05
A SOAR platform can:
• Trigger phishing playbooks to run
repeatable tasks at machine speed
• Identify false positives, and
standardised SOC responses at scale.
• Extract header information, email
addresses, URLs and even attachments.
• Automate submission of data to threat
intelligence services
• Conduct detailed scan of network logs
• Contain/quarantine malicious threats
• Delete phishing instances, block IP or
URLs, ban executables.
• Reduce investigation time from hours
to minutes
06
07
Use case #2:
Malicious
network traffic
• Generates many alerts
deemed malicious by
detection technology
• Creates false positives or
low priority alerts
• Often left in queue
awaiting investigation
• Security teams have
little or no capacity
to conduct triage
A SOAR
platform can:
• Apply automatic data
enrichment tools (threat
intelligence, etc)
• Search additional
threat instances via
automated workflows
• Immediate triage and
response upon threat alert
• Auto trigger of
containment by blocking
IP or isolating host
08
Use case #3:
Vulnerability
management
• Reviews and alerts system
owners to potential weakness
• Time-consuming but critical task
• Often performed externally
• Carries risk of undetected threats
within IT infrastructure
09
10
A SOAR platform can:
• Improve dynamic threat analysis
by automating workflows
• Boost productivity of
security analysts
• Dramatically increase ability to
detect sophisticated threats
11
Use case #4:
Processing
data logs
• Too much data to organise
manually and accurately for
decision-making
• Log entry volumes are too high
for threat detection and response
• Cumbersome to process
log data into right format
for remediation
12
A SOAR
platform can:
• Correlate the data independently
• Pull in all threat data across
the network
• Validate against external
threat intelligence sources
• Help analysts identify threats
and decide on next steps
Use case #5:
Improving lines of
communication
• Security teams frequently fail
to update key stakeholders
about potential threats
• They are too busy to send
out information
• Clunky messaging platforms
are challenging to use and
deter communication
13
14
A SOAR platform can:
• Free up security staff
resources to focus on
more important tasks
• Develop better metrics
for response times from
different departments
• Increase the security
team’s voice with
company executives
15
Use case #6:
Dwell times
• Manual correlation and
analysis of data
• Laborious data collation
across end points, servers
and mobile devices.
• Difficult to scale tasks
and workflow
• Average dwell time to
detect and contain
intruder: 50 to 150 days
16
A SOAR
platform can:
• Accelerate investigation
and detection
• Improve accuracy of analysis
• Increase remediation
success rates
• Reduce dwell times to hours
Use case #7:
Mitigating threats
faster than they spread
• Difficult to protect against
fast-moving threats
• Challenging to deploy
sets of protection using
different technologies
• Time-consuming, manual task.
• Involves multiple security
vendors in the technology stack
17
18
A SOAR platform can:
• Speed up response times
• Enable protections on the fly
• Eliminate additional strain on
SOC resources
• Aggregate and validate data from
a wide range of security products
Partner with an
MSSP to automate
your organisation’s
security posture
For those IT and security executives whose
organisations are beginning or in the midst of a
technology transformation, these are both challenging
and exciting times. Cybersecurity automation offers
an enhanced security response to threats that ensure
optimal resolution and protection against threats.
19
Chat with us to learn how we can partner with you
to automate your organisation’s security infrastructure.
END

More Related Content

PPTX
Tripwire Adaptive Threat Protection
PPTX
Incident Response: Validation, Containment & Forensics
PPTX
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
PPTX
Malware detection how to spot infections early with alien vault usm
PPTX
Network Situational Awareness using Tripwire IP360
PPT
Port of seattle security presentation david morris
PDF
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
PPTX
Advanced persistent threat (apt)
Tripwire Adaptive Threat Protection
Incident Response: Validation, Containment & Forensics
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Malware detection how to spot infections early with alien vault usm
Network Situational Awareness using Tripwire IP360
Port of seattle security presentation david morris
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
Advanced persistent threat (apt)

What's hot (20)

PDF
Infocyte Mid-market Threat and Incident Response Report Webinar
PPTX
How to Detect SQL Injections & XSS Attacks with AlienVault USM
PPTX
Cyber Incident Response Triage - CPX 360 Presentation
PDF
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
PPTX
Database Threats - Information System Security
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PPTX
Ransomware Resiliency, Recoverability and Availability
PDF
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
PDF
The Critical Security Controls and the StealthWatch System
PDF
Leveraging red for defense
PPTX
Demo how to detect ransomware with alien vault usm_gg
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PPTX
Persistence is Key: Advanced Persistent Threats
PPTX
Cognitive Analysis With SparkSecure
PPTX
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
DOC
Honeypot Essentials
PDF
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
PPTX
Cyber Security # Lec 3
PPTX
How to Detect a Cryptolocker Infection with AlienVault USM
PPTX
5 things i wish i knew about sast (DSO-LG July 2021)
Infocyte Mid-market Threat and Incident Response Report Webinar
How to Detect SQL Injections & XSS Attacks with AlienVault USM
Cyber Incident Response Triage - CPX 360 Presentation
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Database Threats - Information System Security
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
Ransomware Resiliency, Recoverability and Availability
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
The Critical Security Controls and the StealthWatch System
Leveraging red for defense
Demo how to detect ransomware with alien vault usm_gg
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
Persistence is Key: Advanced Persistent Threats
Cognitive Analysis With SparkSecure
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Honeypot Essentials
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Cyber Security # Lec 3
How to Detect a Cryptolocker Infection with AlienVault USM
5 things i wish i knew about sast (DSO-LG July 2021)
Ad

Similar to Automating cybersecurity (20)

PPTX
Soar cybersecurity
PDF
Enhancing Cyber Defense with Security Orchestration and Automation (SOAR).pdf
PDF
How SOAR Improves Threat Detection and Response Times.pdf
PDF
SOAR Security Systems: Revolutionizing Cybersecurity Through Orchestration an...
PDF
Understanding soar security
PDF
Why is Securaa the Best SOAR Tool in the market-converted.pdf
PDF
Soar cybersecurity
PDF
Optimize your cyber security with soar tools
PDF
SOAR Platform
PPTX
Soar Platform 2.pptx
PPTX
SOAR-A Love Story - Ethan Packard.pptx
PPTX
Insight into SOAR
PDF
Top 10 SOAR companies from 2022 December2022.pdf
PPTX
PKI.pptx
PPTX
SOAR and SIEM.pptx
PPTX
Kindly arrange for the table and inform us once it is ready, so we can schedu...
PDF
Bridging the Gap Between Alert and Action with SOAR Services India
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PDF
End-to-End OT SecOps Transforming from Good to Great
PPTX
SOC Analysis
Soar cybersecurity
Enhancing Cyber Defense with Security Orchestration and Automation (SOAR).pdf
How SOAR Improves Threat Detection and Response Times.pdf
SOAR Security Systems: Revolutionizing Cybersecurity Through Orchestration an...
Understanding soar security
Why is Securaa the Best SOAR Tool in the market-converted.pdf
Soar cybersecurity
Optimize your cyber security with soar tools
SOAR Platform
Soar Platform 2.pptx
SOAR-A Love Story - Ethan Packard.pptx
Insight into SOAR
Top 10 SOAR companies from 2022 December2022.pdf
PKI.pptx
SOAR and SIEM.pptx
Kindly arrange for the table and inform us once it is ready, so we can schedu...
Bridging the Gap Between Alert and Action with SOAR Services India
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
End-to-End OT SecOps Transforming from Good to Great
SOC Analysis
Ad

More from Singtel (8)

PPTX
Public support - benefitting from the cloud ecosystem
PDF
7 steps to cloud transformation
PDF
Public support: Benefitting from the cloud ecosystem
PDF
Your nimble network needs more than buzzwords
PPTX
Mature connections: 6 stages to IoT success
PPTX
Building a strong security strategy
PPTX
Managing security risks in today's digital era
PPTX
DC West - Data Centre Services
Public support - benefitting from the cloud ecosystem
7 steps to cloud transformation
Public support: Benefitting from the cloud ecosystem
Your nimble network needs more than buzzwords
Mature connections: 6 stages to IoT success
Building a strong security strategy
Managing security risks in today's digital era
DC West - Data Centre Services

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation theory and applications.pdf
PPTX
Cloud computing and distributed systems.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Electronic commerce courselecture one. Pdf
PDF
cuic standard and advanced reporting.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction
The Rise and Fall of 3GPP – Time for a Sabbatical?
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
Encapsulation theory and applications.pdf
Cloud computing and distributed systems.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Empathic Computing: Creating Shared Understanding
Network Security Unit 5.pdf for BCA BBA.
sap open course for s4hana steps from ECC to s4
Reach Out and Touch Someone: Haptics and Empathic Computing
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Electronic commerce courselecture one. Pdf
cuic standard and advanced reporting.pdf

Automating cybersecurity

  • 2. 02 Automating cybersecurity: Facts Cybersecurity teams are: 1. Stretched 2. Manifesting alert fatigue 3. Facing escalating volume of alerts to sort 4. Bogged down with time- consuming tasks 1.8 million global shortage of cybersecurity professionals by 2022 50% of enterprises have six or more tools that generate security alerts
  • 3. 03 Security operations teams: • Face increasingly hostile threat landscape • Are struggling to keep up with high volume of security alerts • Rely on manual, document-based procedures for operations. • Have longer analyst onboarding times • Use stale procedures, inconsistent operational functions. • Lack people, expertise and budgets to protect against threats adequately. • Threat intelligence management capabilities are starting to merge with SOAR tools to provide a single operational tool Automating cybersecurity: Trends
  • 4. Automating cybersecurity With automation, the manual effort and time involved from detection to alert triage and remediation can be reduced and it may even be possible to stop an ongoing attack in its tracks. A good SOAR (Security Orchestration Automation and Response) can help you compile automation playbooks to alleviate some of those important, but time-consuming, manual tasks and manage complex use cases. 04
  • 5. Use case #1: Phishing attacks • Huge attack volume and velocity • SOCs and analysts can’t keep up • Switching multiple screens to coordinate responses • Unable to standardise response and reporting 05
  • 6. A SOAR platform can: • Trigger phishing playbooks to run repeatable tasks at machine speed • Identify false positives, and standardised SOC responses at scale. • Extract header information, email addresses, URLs and even attachments. • Automate submission of data to threat intelligence services • Conduct detailed scan of network logs • Contain/quarantine malicious threats • Delete phishing instances, block IP or URLs, ban executables. • Reduce investigation time from hours to minutes 06
  • 7. 07 Use case #2: Malicious network traffic • Generates many alerts deemed malicious by detection technology • Creates false positives or low priority alerts • Often left in queue awaiting investigation • Security teams have little or no capacity to conduct triage
  • 8. A SOAR platform can: • Apply automatic data enrichment tools (threat intelligence, etc) • Search additional threat instances via automated workflows • Immediate triage and response upon threat alert • Auto trigger of containment by blocking IP or isolating host 08
  • 9. Use case #3: Vulnerability management • Reviews and alerts system owners to potential weakness • Time-consuming but critical task • Often performed externally • Carries risk of undetected threats within IT infrastructure 09
  • 10. 10 A SOAR platform can: • Improve dynamic threat analysis by automating workflows • Boost productivity of security analysts • Dramatically increase ability to detect sophisticated threats
  • 11. 11 Use case #4: Processing data logs • Too much data to organise manually and accurately for decision-making • Log entry volumes are too high for threat detection and response • Cumbersome to process log data into right format for remediation
  • 12. 12 A SOAR platform can: • Correlate the data independently • Pull in all threat data across the network • Validate against external threat intelligence sources • Help analysts identify threats and decide on next steps
  • 13. Use case #5: Improving lines of communication • Security teams frequently fail to update key stakeholders about potential threats • They are too busy to send out information • Clunky messaging platforms are challenging to use and deter communication 13
  • 14. 14 A SOAR platform can: • Free up security staff resources to focus on more important tasks • Develop better metrics for response times from different departments • Increase the security team’s voice with company executives
  • 15. 15 Use case #6: Dwell times • Manual correlation and analysis of data • Laborious data collation across end points, servers and mobile devices. • Difficult to scale tasks and workflow • Average dwell time to detect and contain intruder: 50 to 150 days
  • 16. 16 A SOAR platform can: • Accelerate investigation and detection • Improve accuracy of analysis • Increase remediation success rates • Reduce dwell times to hours
  • 17. Use case #7: Mitigating threats faster than they spread • Difficult to protect against fast-moving threats • Challenging to deploy sets of protection using different technologies • Time-consuming, manual task. • Involves multiple security vendors in the technology stack 17
  • 18. 18 A SOAR platform can: • Speed up response times • Enable protections on the fly • Eliminate additional strain on SOC resources • Aggregate and validate data from a wide range of security products
  • 19. Partner with an MSSP to automate your organisation’s security posture For those IT and security executives whose organisations are beginning or in the midst of a technology transformation, these are both challenging and exciting times. Cybersecurity automation offers an enhanced security response to threats that ensure optimal resolution and protection against threats. 19
  • 20. Chat with us to learn how we can partner with you to automate your organisation’s security infrastructure. END