SlideShare a Scribd company logo
1 | © 2017 Interset Software
How to Operationalize Big Data Security Analytics
Jay Lillie, Director Field Operations
2 | © 2017 Interset Software
Analytics in the security domain is
misunderstood
(And it’s the fault of security vendors!)
3 | © 2017 Interset Software
Analysis and Analytics are not interchangeable
Analysis Analytics⊃
I can perform analysis
on anything, including
data!
“Analytics is a subset of analysis”
Analytics is a special
type of analysis that can
be performed on data!
4 | © 2017 Interset Software
Analytics in the security domain is misunderstood
Analytics
Analysis ▪ philosophical
▪ interpretive
▪ subjective
▪ exploratory
Analysis MAY be…
5 | © 2017 Interset Software
Analytics in the security domain is misunderstood
▪ mathematics
▪ statistics
▪ data science
▪ machine learning
Analytics MUST have…
▪ queries
▪ rules & thresholds
Security “analytics” is too often…
??
???
6 | © 2017 Interset Software
Analytics focuses on different domain knowledge
Security Analytics
7 | © 2017 Interset Software
So how do we meaningfully bring them together?
8 | © 2017 Interset Software
Accelerate detection activities with
analytics
Do what smart, talented people do… only faster…
and with no pesky sleep required.
9 | © 2017 Interset Software
Identify
Develop
organizational
understanding
Protect
Implement the
appropriate
safeguards
Detect
Identify the
occurrence of
a cybersecurity
event
Respond
Take action
regarding a
detected
cybersecurity
event
Recover
Restore any
capabilities or
services that
were impaired
NIST Cybersecurity Framework
https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf
10 | © 2017 Interset Software
Identify
Develop
organizational
understanding
Protect
Implement the
appropriate
safeguards
Detect
Identify the
occurrence of
a cybersecurity
event
Respond
Take action
regarding a
detected
cybersecurity
event
Recover
Restore any
capabilities or
services that
were impaired
NIST Cybersecurity Framework
https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf
11 | © 2017 Interset Software
Common security operations patterns…
Security Information and
Event Management (SIEM)
Log Management System
(LMS)
Endpoint & Data Loss
Prevention (DLP)
Identity and Access
Management (IAM)
Network
Business Applications Security Operations
Collect
logs
from
various
sources
Write queries
Define rules
Manage
alerts
Attack
reconstruction
Detect Respond
Case Mgmnt / Svc Desk
12 | © 2017 Interset Software
….common problems
Security Information and
Event Management (SIEM)
Log Management System
(LMS)
Endpoint & Data Loss
Prevention (DLP)
Identity and Access
Management (IAM)
Network
Business Applications
Collect
logs
from
various
sources
Endless new queries
Modify rules to have
higher thresholds
Ignore
alerts
Painfully long
reconstruction
We don’t know
where to start
looking for threats.
We don’t have the
staff to analyze
10,000 alerts per day.
60-80% of
alerts are false
positives.
Rules based systems
are brittle, hard to
maintain.
13 | © 2017 Interset Software
Analytics works differently than analysis tools
Endpoint (inc. DLP)
Access, Auth, & Actions
Network (NetFlow)
Enrichment Data
SecurityDataLake
(Integrated)
Security Analytics
Dashboard&
Hand-off
Orchestration / Automation
OpenDXL
Case Mgmnt / Svc Desk
REST API
Detect Respond
Acquire
“Which things matter?”
Bring logs and streaming
sources together
Baseline
“What is normal?”
Incorporate the patterns
of behavior that make
each entity like (and
unlike) others
Score
“Where are the risks?”
Principled analytical
methods surface
quantified potential
threats
Act
“Who takes action?”
Predetermined or ad hoc;
automated or manual
14 | © 2017 Interset Software
SIEM
The services a SIEM provides still have a place!
Endpoint (inc. DLP)
SIEM
Access, Auth, & Actions
Network (NetFlow)
Enrichment Data
SecurityDataLake
(Integrated)
Security Analytics
Dashboard&
Hand-off
Orchestration / Automation
OpenDXL
Case Mgmnt / Svc Desk
REST API
SIEM
15 | © 2017 Interset Software
A holistic response requires integrated data
Auth data
Application /
Service
VPN
Shared Resource
Bring the threat to me:
Who are my riskiest users,
servers, websites…?
Find the threat faster:
Where are the riskiest periods of
time, who interacts with what…?
Integrated to
give the
broadest
possible view
Many sources
yield a single,
meaningful
result set
Find a Threat Lead
Conduct a Threat Hunt
16 | © 2017 Interset Software
Strategically operationalize your security
analytics
Use the right tool, at the right time, in the right place…
17 | © 2017 Interset Software
Understand where you want to go first
Detect Respond
▪ Know what you want to find
▪ Decide how you want to respond
▪ Then, use these to determine what you must
detect
18 | © 2017 Interset Software
People
ProcessTechnology
Operationalization is a full-spectrum exercise
▪ Security Operations Center
(SOC)
▪ IT Help Desk
▪ Cyber Incident Response
Team (CIRT)
▪ Non-IT Coordination
▪ Service Desk (e.g., ITIL)
▪ Cyber threat
▪ Forensics / Evidence gathering
▪ Non-IT intersections
▪ Awareness / Escalation
▪ Case Management
▪ Orchestration
▪ Authentication / Access
Control
▪ Enrichment Sources
Security Operations
19 | © 2017 Interset Software
examples
20 | © 2017 Interset Software
Incident Detection: Theft of intellectual property
X
2 Engineers
stole data
1 Year
$1 Million Spent
Large security
vendor failed to
find anything
2 Weeks
Easily
identified the 2
Engineers
Found 3
additional users
stealing data in
North America
Found 8
additional users
stealing data in
China
21 | © 2017 Interset Software
Operations Integration: Process-based roadmap
Generate
alert
SIEM
Investigate
threat
SOC
Close
investigation
SOC
Coordinate
response
Svc Desk
non-
significant
incident
finding
additional
action
required
alert Create
ticket
Svc Desk
escalate
22 | © 2017 Interset Software
Operations Integration: Process-based roadmap
Detect
events
SIEM
Discover
significant
risk
Interset
Create
ticket
Svc Desk
Investigate
threat
SOC
Close
investigation
SOC
Coordinate
response
Svc Desk
non-
significant
incident
finding
additional
action
required
event risk escalation
Other
reported
behavior
varies
notification
1
logs
3 5 6
7
varies
Collect
logs
2
Enrichment
data
varies
4
8
9
23 | © 2017 Interset Software
Linking technology: Analytics to orchestration
Dashboard&
Hand-off
Orchestration / Automation
OpenDXL
Case Mgmnt / Svc Desk
REST API
Respond
Lock account
Isolate node
Run script
▪ Fast: Yes, faster than a human
▪ Certainty: Not a single alert, but a
distinguishable set of behaviors
▪ Predictable: Nothing gets missed
And more…
24 | © 2017 Interset Software
Who is Interset?
25 | © 2017 Interset Software
Interset Summary
Security analytics combined
with AI / machine-learning is
transformative. Interset big-
data processing swiftly
pinpoints threats, while
expanding visibility to get a
contextual picture of
enterprise risk.
We distill billions of events into hundreds of anomalies…
Then into a handful of actionable SOC leads.
Jay Lillie
Director Field Ops
jlillie@interset.com

More Related Content

PDF
The Myths + Realities of Machine-Learning Cybersecurity
PPTX
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
PPTX
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
PPTX
IANS Forum Dallas - Technology Spotlight Session
PDF
DataWorks 2018: How Big Data and AI Saved the Day
PPTX
Big data in term of security measure
PPTX
[Webinar] Supercharging Security with Behavioral Analytics
PPTX
Operationalizing Big Data Security Analytics - IANS Forum Dallas
The Myths + Realities of Machine-Learning Cybersecurity
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
IANS Forum Dallas - Technology Spotlight Session
DataWorks 2018: How Big Data and AI Saved the Day
Big data in term of security measure
[Webinar] Supercharging Security with Behavioral Analytics
Operationalizing Big Data Security Analytics - IANS Forum Dallas

What's hot (20)

PPTX
Data Connectors San Antonio Cybersecurity Conference 2018
PDF
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
PPTX
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
PDF
How to make managed services work
PPTX
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
PDF
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
PDF
MT29 Panel: Becoming a data-driven enterprise
PDF
Operationalize with alerting, custom dashboards, and timelines
PPTX
Security Analytics and Big Data: What You Need to Know
PDF
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
PDF
Millions of People Depend on Datang Xianyi Technology and NetIQ
PDF
Elastic Security: Your one-stop OODA loop shop
PDF
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
PDF
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
PPTX
Simplicity in Hybrid IT Environments – A Security Oxymoron?
PDF
"Thinking diffrent" about your information security strategy
DOCX
Data security in cloud compu
PDF
Threat Life Cycle Management
ODP
Active Network Monitoring brings Peace of Mind
Data Connectors San Antonio Cybersecurity Conference 2018
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
How to make managed services work
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
MT29 Panel: Becoming a data-driven enterprise
Operationalize with alerting, custom dashboards, and timelines
Security Analytics and Big Data: What You Need to Know
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Millions of People Depend on Datang Xianyi Technology and NetIQ
Elastic Security: Your one-stop OODA loop shop
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
Simplicity in Hybrid IT Environments – A Security Oxymoron?
"Thinking diffrent" about your information security strategy
Data security in cloud compu
Threat Life Cycle Management
Active Network Monitoring brings Peace of Mind
Ad

Similar to How to Operationalize Big Data Security Analytics (20)

PPTX
A New Approach to Threat Detection: Big Data Security Analytics
PDF
Lead On: When More Data Becomes Less Work
PPTX
How big data and AI saved the day: critical IP almost walked out the door
PDF
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
PDF
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
PPTX
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
PPTX
Generic siem how_2017
PPTX
Operational Security Intelligence
PDF
Machine Learning + AI for Accelerated Threat-Hunting
PDF
2016 09-19 - stephan jou - machine learning meetup v1
PPTX
Is SIEM really Dead ? OR Can it evolve into a Platform ?
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PPTX
RuSIEM overview (english version)
PPTX
Optimizing Security Operations: 5 Keys to Success
PDF
Interset-advanced threat detection wp
PPTX
Tips on SIEM Ops 2015
PDF
Cybersecurity Series SEIM Log Analysis
PDF
SIEM evaluator guide for soc analyst
PPTX
Operational Security Intelligence Breakout Session
PDF
Aujas incident management webinar deck 08162016
A New Approach to Threat Detection: Big Data Security Analytics
Lead On: When More Data Becomes Less Work
How big data and AI saved the day: critical IP almost walked out the door
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
Generic siem how_2017
Operational Security Intelligence
Machine Learning + AI for Accelerated Threat-Hunting
2016 09-19 - stephan jou - machine learning meetup v1
Is SIEM really Dead ? OR Can it evolve into a Platform ?
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
RuSIEM overview (english version)
Optimizing Security Operations: 5 Keys to Success
Interset-advanced threat detection wp
Tips on SIEM Ops 2015
Cybersecurity Series SEIM Log Analysis
SIEM evaluator guide for soc analyst
Operational Security Intelligence Breakout Session
Aujas incident management webinar deck 08162016
Ad

More from Interset (8)

PDF
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
PPTX
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
PPTX
IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
PPTX
Webinar: Will the Real AI Please Stand Up?
PDF
WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
PDF
Infographic: Inside Data Breaches
PDF
User and Entity Behavioral Analytics
PDF
How to Operationalize Big Data Security Analytics
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
Webinar: Will the Real AI Please Stand Up?
WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
Infographic: Inside Data Breaches
User and Entity Behavioral Analytics
How to Operationalize Big Data Security Analytics

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PPTX
Machine Learning_overview_presentation.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Spectroscopy.pptx food analysis technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Big Data Technologies - Introduction.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Cloud computing and distributed systems.
PDF
Empathic Computing: Creating Shared Understanding
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
Electronic commerce courselecture one. Pdf
Machine Learning_overview_presentation.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Programs and apps: productivity, graphics, security and other tools
Spectroscopy.pptx food analysis technology
Per capita expenditure prediction using model stacking based on satellite ima...
A comparative analysis of optical character recognition models for extracting...
Advanced methodologies resolving dimensionality complications for autism neur...
Reach Out and Touch Someone: Haptics and Empathic Computing
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Big Data Technologies - Introduction.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation_ Review paper, used for researhc scholars

How to Operationalize Big Data Security Analytics

  • 1. 1 | © 2017 Interset Software How to Operationalize Big Data Security Analytics Jay Lillie, Director Field Operations
  • 2. 2 | © 2017 Interset Software Analytics in the security domain is misunderstood (And it’s the fault of security vendors!)
  • 3. 3 | © 2017 Interset Software Analysis and Analytics are not interchangeable Analysis Analytics⊃ I can perform analysis on anything, including data! “Analytics is a subset of analysis” Analytics is a special type of analysis that can be performed on data!
  • 4. 4 | © 2017 Interset Software Analytics in the security domain is misunderstood Analytics Analysis ▪ philosophical ▪ interpretive ▪ subjective ▪ exploratory Analysis MAY be…
  • 5. 5 | © 2017 Interset Software Analytics in the security domain is misunderstood ▪ mathematics ▪ statistics ▪ data science ▪ machine learning Analytics MUST have… ▪ queries ▪ rules & thresholds Security “analytics” is too often… ?? ???
  • 6. 6 | © 2017 Interset Software Analytics focuses on different domain knowledge Security Analytics
  • 7. 7 | © 2017 Interset Software So how do we meaningfully bring them together?
  • 8. 8 | © 2017 Interset Software Accelerate detection activities with analytics Do what smart, talented people do… only faster… and with no pesky sleep required.
  • 9. 9 | © 2017 Interset Software Identify Develop organizational understanding Protect Implement the appropriate safeguards Detect Identify the occurrence of a cybersecurity event Respond Take action regarding a detected cybersecurity event Recover Restore any capabilities or services that were impaired NIST Cybersecurity Framework https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf
  • 10. 10 | © 2017 Interset Software Identify Develop organizational understanding Protect Implement the appropriate safeguards Detect Identify the occurrence of a cybersecurity event Respond Take action regarding a detected cybersecurity event Recover Restore any capabilities or services that were impaired NIST Cybersecurity Framework https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf
  • 11. 11 | © 2017 Interset Software Common security operations patterns… Security Information and Event Management (SIEM) Log Management System (LMS) Endpoint & Data Loss Prevention (DLP) Identity and Access Management (IAM) Network Business Applications Security Operations Collect logs from various sources Write queries Define rules Manage alerts Attack reconstruction Detect Respond Case Mgmnt / Svc Desk
  • 12. 12 | © 2017 Interset Software ….common problems Security Information and Event Management (SIEM) Log Management System (LMS) Endpoint & Data Loss Prevention (DLP) Identity and Access Management (IAM) Network Business Applications Collect logs from various sources Endless new queries Modify rules to have higher thresholds Ignore alerts Painfully long reconstruction We don’t know where to start looking for threats. We don’t have the staff to analyze 10,000 alerts per day. 60-80% of alerts are false positives. Rules based systems are brittle, hard to maintain.
  • 13. 13 | © 2017 Interset Software Analytics works differently than analysis tools Endpoint (inc. DLP) Access, Auth, & Actions Network (NetFlow) Enrichment Data SecurityDataLake (Integrated) Security Analytics Dashboard& Hand-off Orchestration / Automation OpenDXL Case Mgmnt / Svc Desk REST API Detect Respond Acquire “Which things matter?” Bring logs and streaming sources together Baseline “What is normal?” Incorporate the patterns of behavior that make each entity like (and unlike) others Score “Where are the risks?” Principled analytical methods surface quantified potential threats Act “Who takes action?” Predetermined or ad hoc; automated or manual
  • 14. 14 | © 2017 Interset Software SIEM The services a SIEM provides still have a place! Endpoint (inc. DLP) SIEM Access, Auth, & Actions Network (NetFlow) Enrichment Data SecurityDataLake (Integrated) Security Analytics Dashboard& Hand-off Orchestration / Automation OpenDXL Case Mgmnt / Svc Desk REST API SIEM
  • 15. 15 | © 2017 Interset Software A holistic response requires integrated data Auth data Application / Service VPN Shared Resource Bring the threat to me: Who are my riskiest users, servers, websites…? Find the threat faster: Where are the riskiest periods of time, who interacts with what…? Integrated to give the broadest possible view Many sources yield a single, meaningful result set Find a Threat Lead Conduct a Threat Hunt
  • 16. 16 | © 2017 Interset Software Strategically operationalize your security analytics Use the right tool, at the right time, in the right place…
  • 17. 17 | © 2017 Interset Software Understand where you want to go first Detect Respond ▪ Know what you want to find ▪ Decide how you want to respond ▪ Then, use these to determine what you must detect
  • 18. 18 | © 2017 Interset Software People ProcessTechnology Operationalization is a full-spectrum exercise ▪ Security Operations Center (SOC) ▪ IT Help Desk ▪ Cyber Incident Response Team (CIRT) ▪ Non-IT Coordination ▪ Service Desk (e.g., ITIL) ▪ Cyber threat ▪ Forensics / Evidence gathering ▪ Non-IT intersections ▪ Awareness / Escalation ▪ Case Management ▪ Orchestration ▪ Authentication / Access Control ▪ Enrichment Sources Security Operations
  • 19. 19 | © 2017 Interset Software examples
  • 20. 20 | © 2017 Interset Software Incident Detection: Theft of intellectual property X 2 Engineers stole data 1 Year $1 Million Spent Large security vendor failed to find anything 2 Weeks Easily identified the 2 Engineers Found 3 additional users stealing data in North America Found 8 additional users stealing data in China
  • 21. 21 | © 2017 Interset Software Operations Integration: Process-based roadmap Generate alert SIEM Investigate threat SOC Close investigation SOC Coordinate response Svc Desk non- significant incident finding additional action required alert Create ticket Svc Desk escalate
  • 22. 22 | © 2017 Interset Software Operations Integration: Process-based roadmap Detect events SIEM Discover significant risk Interset Create ticket Svc Desk Investigate threat SOC Close investigation SOC Coordinate response Svc Desk non- significant incident finding additional action required event risk escalation Other reported behavior varies notification 1 logs 3 5 6 7 varies Collect logs 2 Enrichment data varies 4 8 9
  • 23. 23 | © 2017 Interset Software Linking technology: Analytics to orchestration Dashboard& Hand-off Orchestration / Automation OpenDXL Case Mgmnt / Svc Desk REST API Respond Lock account Isolate node Run script ▪ Fast: Yes, faster than a human ▪ Certainty: Not a single alert, but a distinguishable set of behaviors ▪ Predictable: Nothing gets missed And more…
  • 24. 24 | © 2017 Interset Software Who is Interset?
  • 25. 25 | © 2017 Interset Software Interset Summary Security analytics combined with AI / machine-learning is transformative. Interset big- data processing swiftly pinpoints threats, while expanding visibility to get a contextual picture of enterprise risk. We distill billions of events into hundreds of anomalies… Then into a handful of actionable SOC leads. Jay Lillie Director Field Ops jlillie@interset.com