SlideShare a Scribd company logo
Raffael Marty
How To Drive Value with Security Data
June 2021
ThinkIn 2021
1980
Log Collection
(syslog)
Sharing
“searches”
Forensics
Reporting
Log Management
2006 2009
1999 2004 2012 2015 2017
Security
Data Lake
Apache
Metron
ELK
Open Source
2021
Incident
Management
SIEM
Compliance
Use-Cases
Real-time
Correlation
Artificial Intelligence
Attempt in
Visual Analytics
Anomaly Detection
Heavy filtering
Data on
demand
Threat Hunting
Risk centricity
Federated Analytics?
Analytics
Asset Mgmt
Cloud Analytics
©2021RaffaelMarty
Security Data
Lakehouse?
• Network (FW, flows)
• Vulnerability
• Endpoint
• Threat Intel
• IaaS
logs
• System Event
Logs
• IAM
• PCAP
Data • SaaS
logs
• Metrics
• API • “Data” Activity
Security Data–ThePast
Big Data
(Hadoop,
Spark)
Logging as a Service
(Loggly)
CEF
SOAR
UEBA
The Logging Wild West
XDR
Metrics
Correlation
DevSecOps
Use-Cases
Logging andSecurity AnalyticsToday
FalesPositives
Use-Cases
Data
Inputs
Scalability
Challenges
Trends
Data Centricity Risk
Centric
I/SaaSVisibility
Distributed
Analytics
Beyond
Events/Alerts
Shared
Frameworks
Movetothe
Cloud
Entity
Focus
Tomorrow - How To Drive Value From Your Security Data
Become Risk Centric
Risk Service
Resource
Access
User
Device
App
Data
Anomaly
Belief Net
Security “Knowledge”
Entity Engines
Expert
SIEM– Future Aspects
AI / ML Visibility Automation
Cloud Privacy
Takeaways
Analytics (Logic)
Unified Platform: SIEM | UEBA | SOAR | XDR | TIP | CCM
Visibility Zero Trust / Risk
Outsource
Inventory Activity Use-Case Driven Open Standards
Thank You
http://raffy.ch/blog
@raffaelmarty

More Related Content

PDF
AI & ML in Cyber Security - Why Algorithms are Dangerous
PDF
Cloud - Security - Big Data
PDF
Visualization in the Age of Big Data
PPTX
Delivering Security Insights with Data Analytics and Visualization
PPTX
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
PDF
Security Insights at Scale
PDF
Security Chat 5.0
PDF
Application Logging for Forensics
AI & ML in Cyber Security - Why Algorithms are Dangerous
Cloud - Security - Big Data
Visualization in the Age of Big Data
Delivering Security Insights with Data Analytics and Visualization
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
Security Insights at Scale
Security Chat 5.0
Application Logging for Forensics

What's hot (20)

PDF
Visualization for Security
PDF
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
PDF
The Heatmap
 - Why is Security Visualization so Hard?
PDF
Artificial Intelligence – Time Bomb or The Promised Land?
PPT
RSA 2006 - Visual Security Event Analysis
PDF
Sqrrl Enterprise: Big Data Security Analytics Use Case
PDF
The Heatmap
 - Why is Security Visualization so Hard?
PDF
Jisheng Wang at AI Frontiers: Deep Learning in Security
PDF
Threat Hunting Platforms (Collaboration with SANS Institute)
DOCX
UserEntityandBehaviorAnalyticsFriedman
PDF
Big data Visualization and Dashboards
PDF
Creating Your Own Threat Intel Through Hunting & Visualization
PDF
Enterprise Security featuring UBA
PDF
Understanding the "Intelligence" in AI
PDF
AI & ML in Cyber Security - Why Algorithms Are Dangerous
PDF
A New Security Paradigm for IoT (Internet of Threats)
PPTX
Cyber Threat Hunting with Phirelight
PDF
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
PPTX
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
PDF
The Art and Science of Alert Triage
Visualization for Security
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
The Heatmap
 - Why is Security Visualization so Hard?
Artificial Intelligence – Time Bomb or The Promised Land?
RSA 2006 - Visual Security Event Analysis
Sqrrl Enterprise: Big Data Security Analytics Use Case
The Heatmap
 - Why is Security Visualization so Hard?
Jisheng Wang at AI Frontiers: Deep Learning in Security
Threat Hunting Platforms (Collaboration with SANS Institute)
UserEntityandBehaviorAnalyticsFriedman
Big data Visualization and Dashboards
Creating Your Own Threat Intel Through Hunting & Visualization
Enterprise Security featuring UBA
Understanding the "Intelligence" in AI
AI & ML in Cyber Security - Why Algorithms Are Dangerous
A New Security Paradigm for IoT (Internet of Threats)
Cyber Threat Hunting with Phirelight
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
The Art and Science of Alert Triage
Ad

Similar to How To Drive Value with Security Data (20)

PDF
Webinar Data Mesh - Part 3
PDF
Дмитрий Лавриненко "Big & Fast Data for Identity & Telemetry services"
PDF
Combining Logs, Metrics, and Traces for Unified Observability
PPTX
IOT, Streaming Analytics and Machine Learning
PDF
Analytical Systems Evolution: From Excel to Big Data Platforms and Data Lakes
PPTX
50 Shades of Data - Dutch Oracle Architects Platform (February 2018)
PPT
Securing_Native_Big_Data_v1
PDF
Combining Logs, Metrics, and Traces for Unified Observability
PDF
Les logs, traces et indicateurs au service d'une observabilité unifiée
PDF
Combining Logs, Metrics, and Traces for Unified Observability
PPTX
McAfee - Enterprise Security Manager (ESM) - SIEM
PDF
Role of cloud and analytics in IoT
PPTX
Big Data Analytics PPT - S1 working .pptx
PPTX
Telco analytics at scale
PDF
Guardium Data Activiy Monitor For C- Level Executives
PDF
Best Practices For Building and Operating A Managed Data Lake - StampedeCon 2016
PPTX
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
PDF
Unifying Analytics
PDF
Introduction Big Data
PPTX
SplunkLive! Milano 2016 - customer presentation - Saipem
Webinar Data Mesh - Part 3
Дмитрий Лавриненко "Big & Fast Data for Identity & Telemetry services"
Combining Logs, Metrics, and Traces for Unified Observability
IOT, Streaming Analytics and Machine Learning
Analytical Systems Evolution: From Excel to Big Data Platforms and Data Lakes
50 Shades of Data - Dutch Oracle Architects Platform (February 2018)
Securing_Native_Big_Data_v1
Combining Logs, Metrics, and Traces for Unified Observability
Les logs, traces et indicateurs au service d'une observabilité unifiée
Combining Logs, Metrics, and Traces for Unified Observability
McAfee - Enterprise Security Manager (ESM) - SIEM
Role of cloud and analytics in IoT
Big Data Analytics PPT - S1 working .pptx
Telco analytics at scale
Guardium Data Activiy Monitor For C- Level Executives
Best Practices For Building and Operating A Managed Data Lake - StampedeCon 2016
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Unifying Analytics
Introduction Big Data
SplunkLive! Milano 2016 - customer presentation - Saipem
Ad

More from Raffael Marty (15)

PDF
Exploring the Defender's Advantage
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
PDF
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
PDF
Creating Your Own Threat Intel Through Hunting & Visualization
PDF
Big Data Visualization
PDF
Workshop: Big Data Visualization for Security
PDF
DAVIX - Data Analysis and Visualization Linux
PDF
Cyber Security – How Visual Analytics Unlock Insight
PDF
AfterGlow
PDF
Supercharging Visualization with Data Mining
PDF
Security Visualization - Let's Take A Step Back
PDF
Visual Analytics and Security Intelligence
PPT
Log Visualization - Bellua BCS 2006
PPT
Event Graphs - EUSecWest 2006
PDF
Insider Threat Visualization - HackInTheBox 2007
Exploring the Defender's Advantage
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Creating Your Own Threat Intel Through Hunting & Visualization
Big Data Visualization
Workshop: Big Data Visualization for Security
DAVIX - Data Analysis and Visualization Linux
Cyber Security – How Visual Analytics Unlock Insight
AfterGlow
Supercharging Visualization with Data Mining
Security Visualization - Let's Take A Step Back
Visual Analytics and Security Intelligence
Log Visualization - Bellua BCS 2006
Event Graphs - EUSecWest 2006
Insider Threat Visualization - HackInTheBox 2007

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Machine learning based COVID-19 study performance prediction
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Spectroscopy.pptx food analysis technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Approach and Philosophy of On baking technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation theory and applications.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Unlocking AI with Model Context Protocol (MCP)
Machine learning based COVID-19 study performance prediction
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Advanced methodologies resolving dimensionality complications for autism neur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
sap open course for s4hana steps from ECC to s4
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Spectroscopy.pptx food analysis technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MYSQL Presentation for SQL database connectivity
Approach and Philosophy of On baking technology
Network Security Unit 5.pdf for BCA BBA.
Encapsulation theory and applications.pdf

How To Drive Value with Security Data

Editor's Notes

  • #4: Challenges – these are things you want to be aware of when you invest in any data capability – or assess your own Use-Cases - Focus on the wrong use-cases - Email is still prevalent vector for attacks, not vulnerabilities - Not having a use-case driven approach at all - Sharing use-cases is still non existent – Sigma - SOCs are building use-cases for the data they have instead of for the things they want to detect Scalability Running many rules Collecting all data (expensive) Collecting all data Correct data architecture Trying to do it ourselves, rather than outsourcing – can you get the right people? Why does everyone re-invent their processes? Cloud helps, but it still expensive SOCs are running an average of 30 tools! Data - Visibility gaps (email and humans) – how is it that we buy phishing solutions and do not understand our email communication patterns better? - Understanding data and knowing what to do with it (remediation) – alerts are not indicative of whether a system / user is under duress - Application visibility and understanding – SaaS applications anyone? - Beyond alerts : inventory as well – CSPM, … AND metrics collection as well False Positives - A threat / exploit / vulnerability centric view makes event prioritization challenging - We are still operating on an event level instead of an entity (user, device) level - We are prioritizing all events / alerts that our data sources send us … Beyond events/alerts - CSPM / configuration / asset information Shared Frameworks - ATT&CK -> I think that’s a bad trend – it’s not really covering the right set of detections and is not enough prescriptive for your use-cases! - Sigma -> is an okay start, but very very limited still to date and hasn’t been shown to really produce good thorough detections Move to the Cloud - Not solving all our problems, in fact, introducing new problems – governance, … - Let’s be clear, your SIEM will run in the cloud Insider Focus - Monitoring the users and understanding them – away from the latest vulnerability / … because even an external attack will show a change in the user’s behavior
  • #5: Rethink what we really want from SIEM / security data analytics -> Some call that XDR now Data Inventory Classification Movement App Posture Activity SaaS Cloud posture Device Asset Info Posture (Vuln, Patch, Config) User HR Identity Access Priv’s. Activity / Behavior Personality Anomaly - To self and to peers Interaction with critical data Gets you out of the cat and mouse game – yet another attack type (ransomware today, phishing tomorrow, etc.)
  • #6: AI and ML to the rescue – or not We will get better at anomaly detection from a behavioral standpoint, but not through supervised ML! Expert systems We will keep using ML (supervised) for malware detection, document classification, and basically all kinds of pattern matching Let AI help automate machine-enabling tasks – and visualize more Verifyability and explainability of approaches That’s IT, folks! Cloud We are moving to the cloud. Period. Your SIEM too. How do you monitor on-prem in that case? Visibility - Challenges to see and understand it all? What are all the assets in your environment right now? How do you track them? What are they? What are their risks? - What about all your users? - Across on-prem and cloud / SaaS / … Automation - built into products and not separate as SOAR - beyond the simple ‘augmentation’ use-cases – phishing playbook – remediate across your risk engine … - we need to push toward remediation. Why do we still need security analysts making decisions? Why can’t we learn from past activity? Privacy - Needs to be designed with ‘privacy first’ (only collect what you need, in a secure manner) Securing collected data - Anonymization? Nuances of regional regulations (GDPR, CCPA, etc.) Where are the socio-ethical boundaries?
  • #7: SIEM visibility has been focused on network – it’s time to get endpoint and cloud visibility. AND DATA – including SaaS The risk-based approach will help you not just defend from external attacks, but also monitor your insiders. They are becoming more of a problem! Sharing – from TI to TTPs / analytics sharing
  • #8: http://slideshare.net/zrlram @raffaelmarty