SlideShare a Scribd company logo
Leverage Big Data in
Cybersecurity
Ladies in Cyber Security
Bucharest, 21st March 2019
Leverage Big Data in Cybersecurity
Atos PSOC - Enablers
Connected objects and technology adoption dramatically extend the threat
landscape
60% of
organizations
victim of major
breaches
in 2020 (Gartner)
Impact of breaches
increases dramatically
2016 2017 2018 2019
goes
mainstream
Big data
= big problems
Supercharged connectivity
overwhelms defenses
Crime syndicates
take a quantum leap
Systemic
vulnerabilities
are weaponized
Smart machines
create new risks
IoT risks
explode
Mobile apps become
the main route for
compromise
Opaque algorithms
compromise integrity
More Criminals More Threats More Impact
| 06-10-2018 | © Atos - For internal use5
| 06-10-2018 | © Atos - For internal use
Machine Learning
Supervised Unsupervised
source: https://www.quora.com/What-is-the-difference-between-supervised-and-unsupervised-learning-algorithms
Prescriptive
Security
Predictive
Security
UBA and UEBA as components supporting
transformation of approach from Reactive to Predictive to Prescriptive
BusinessRisk
Security Maturity Model
LowHigh
Fragmented
Security
PrescriptiveReactive
1
Security
Consolidation2
Holistic Business-
Driven Security3
• Better control and
governance over all
end points and IOT
• More proactive and
predictive approaches
to threat remediation
4
• Orchestrates the
automation of security
actions to quickly
resolve current, and
anticipate future,
threats at scale.
5
• Lack of visibility across
global enterprises
results in reactive,
uncoordinated
responses
• Increased efforts to
consolidate security
platforms – from point
solutions to standard
platform
• More cohesive ability
to sense, analyze and
secure the enterprise
• Deeper ability to share
intelligence and react
to threats faster
what
may happen?
what & why
did happen?
prevent
from
happen
Atos PSOC - The Big
Picture
Overview
what needs to be addressed
Initial
compromise
Establish
foothold
Maintain
presence
Lateral
movement
Data
collection
Data
exfiltration
AV
SIEM
EDR
IDS
DLP
Threat Intel
CMDB
User
directory
Ticketing
system
Alerts Insights/context
UBA
Decision Response
Ignore &
Tune
Escalate
Notify
Drill down
Create
Ticket
Lock user
Contain
Host
Proxy block
FW Block
Get evidence
Potential scenario
victim-user
victim-
machine
| 06-10-2018 | © Atos - For internal use11
Decision regarding
triggering an alert
supported by Alert Chart
Analysis &
Remediation
Send Alarm to Security
Team
Behavioral Analytics – Big Data Processing
Decision regarding
triggering an alert
supported by Alert Chart
victim_user Normal
Behaviour in KPI
under analysis
victim_user Anomaly
Detection in KPI
under analysis
victim_user Normal
Behaviour in KPI
under analysis
victim_user Anomaly
Detection in KPI
under analysis
victim_user drill
down in KPI before
anomaly
victim_user drill
down in KPI after
anomaly
victim_user drill
down in KPI before
anomaly
victim_user drill
down in KPI after
anomaly
YES
(risk found)
NO
(risk not
found)
HOST ACCESS ANOMALY UNUSUAL ADMIN
TOOLS USAGE
LOGON TYPES
ANOMALYSUSPICIOUS URL ON FRESHLY REGISTERED DOMAIN
Analysis &
Remediation
victim_user
evolution Chart
victim_user Normal
Behaviour in KPI
under analysis
victim_user Anomaly
Detection in KPI
under analysis
victim_user
evolution Chart
victim_user Normal
Behaviour in KPI
under analysis
victim_user Anomaly
Detection in KPI
under analysis
victim_user drill
down in KPI before
anomaly
victim_user drill
down in KPI after
anomaly
victim_user
evolution Chart
victim_user drill
down in KPI before
anomaly
victim_user drill
down in KPI after
anomaly
victim_user
evolution Chart
victim_user Normal
Behaviour in KPI
under analysis
victim_user Anomaly
Detection in KPI
under analysis
victim_user Normal
Behaviour in KPI
under analysis
victim_user Anomaly
Detection in KPI
under analysis
Send Alerts to Security
Team
Next steps
Customer X
Other Atos Customers
Assets
Threat
Intelligence
External Sources
Threat
Intelligence
Internal Ecosystem
EDR Service
Cyber Security
Dashboard
Domain
Controller
SIEM
Codex for Security
Endpoint
Protection
Threat Intelligence
Platform
AtosStandard
TicketingTool
Security
Automation &
Orchestration
SecurityAutomation&Orchestration
Validation&Remediation
Atos
CSIRT
SOC T1/T2
Advanced Threat
Defense
Playbooks
Conclusion
Logs collection
Logic based correlation
SOC expert analysis on
excess of alerts
Long time later…
Decision
Logic based correlation
Big data processing
Machine Learning
User Behavior Analytics
Automated investigation
SOC expert analysis on
readily available insights
Logs & data collection
Decision support
Automated remediation
SIEM SIEM
Data
Lake
Atos, the Atos logo, Atos Codex, Atos Consulting, Atos Worldgrid, Bull, Canopy, equensWorldline, Unify,
Worldline and Zero Email are registered trademarks of the Atos group. August 2018. © 2018 Atos.
Confidential information owned by Atos, to be used by the recipient only. This document, or any part of
it, may not be reproduced, copied, circulated and/or distributed nor quoted without prior written
approval from Atos.
Thank you !
For more information please contact:
T+40 356 221151
corina-stefania.nebela@atos.net

More Related Content

PPTX
Piracy in the Appstore
PPTX
Hiding In Plain Sight – Protect Against Bad Hashes
PDF
Medical Device Threat Modeling with Templates
PDF
Mobile Security: Apps are our digital lives.
PPTX
The Four(ish) Appsec Metrics You Can’t Ignore
PDF
Healthcare application-security-practices-survey-veracode
PDF
Utility Networks Agile Response Capabilities - New Context at EnergySec 2019
PDF
Tripwire 2019 Skills Gap Survey: Key Findings
Piracy in the Appstore
Hiding In Plain Sight – Protect Against Bad Hashes
Medical Device Threat Modeling with Templates
Mobile Security: Apps are our digital lives.
The Four(ish) Appsec Metrics You Can’t Ignore
Healthcare application-security-practices-survey-veracode
Utility Networks Agile Response Capabilities - New Context at EnergySec 2019
Tripwire 2019 Skills Gap Survey: Key Findings

What's hot (20)

PDF
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
PPTX
Nadog dev secops_survey
PPTX
Open Source Insight: Securing Software Stacks, Election Security, FDA Pacema...
PDF
(SACON) Wayne Tufek - chapter four - industry reports
PDF
Webinar: Neues zur Splunk App for Enterprise Security
PPTX
VirusTotal Threat Intelligence and DNIF Use Cases
PDF
Continuous Monitoring for Web Application Security
PPTX
Gov Day Sacramento 2015 - User Behavior Analytics
PPTX
HPE Protect 2016 - Fearlessly Innovate
PDF
Next Generation Endpoint Prtection Buyers Guide
PDF
Essentials of Web Application Security: what it is, why it matters and how to...
PDF
Web Application Security Statistics Report 2016
PDF
Cybersecurity in Acquisition - Kristen J. Baldwin
PDF
What attackers know about your mobile apps that you don’t: Banking & FinTech
PPTX
2019 04-18 -DevSecOps-software supply chain
PDF
7 cyber security questions for boards
PDF
World best web apps security and Active detection of malicious link
PPTX
20181206 sps geneve we are moving to the cloud what about security
DOCX
Why security is the kidney not the tail of the dog v3
PDF
Solving for Compliance: Mobile app security for banking and financial services
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Nadog dev secops_survey
Open Source Insight: Securing Software Stacks, Election Security, FDA Pacema...
(SACON) Wayne Tufek - chapter four - industry reports
Webinar: Neues zur Splunk App for Enterprise Security
VirusTotal Threat Intelligence and DNIF Use Cases
Continuous Monitoring for Web Application Security
Gov Day Sacramento 2015 - User Behavior Analytics
HPE Protect 2016 - Fearlessly Innovate
Next Generation Endpoint Prtection Buyers Guide
Essentials of Web Application Security: what it is, why it matters and how to...
Web Application Security Statistics Report 2016
Cybersecurity in Acquisition - Kristen J. Baldwin
What attackers know about your mobile apps that you don’t: Banking & FinTech
2019 04-18 -DevSecOps-software supply chain
7 cyber security questions for boards
World best web apps security and Active detection of malicious link
20181206 sps geneve we are moving to the cloud what about security
Why security is the kidney not the tail of the dog v3
Solving for Compliance: Mobile app security for banking and financial services
Ad

Similar to Leverage Big Data in Cybersecurity (20)

PDF
Role of Generative AI in Strengthening Cybersecurity Measures | USCSI®
PPTX
Tony Hodgson (Brainwaive LLC): Enterprise AR Cyber Security – Breaking Down B...
PPTX
Aristiun Whitepaper- Automated Threat Modelling with Aribot
PDF
ML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
PDF
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
PDF
FireTail at API Days Australia 2024 - The Double-edge sword of AI for API Sec...
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PDF
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
PDF
Complicate, detect, respond: stopping cyber attacks with identity analytics
PDF
Emerging Trends in Application Security
PDF
eb-The-State-of-API-Security.pdf
PDF
edgescan vulnerability stats report (2019)
PDF
Edgescan vulnerability stats report 2020
PDF
2022 APIsecure_A day in the life of an API; Fighting the odds
PDF
The 2018 Threat Landscape
PPTX
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
PPTX
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
PDF
cybersecurity-for-ai-and-genai-updated.pdf
PDF
ANIn Bengaluru July 2024 | Digital Transformation – Protect IT! by Pankaj Sayal
PDF
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
Role of Generative AI in Strengthening Cybersecurity Measures | USCSI®
Tony Hodgson (Brainwaive LLC): Enterprise AR Cyber Security – Breaking Down B...
Aristiun Whitepaper- Automated Threat Modelling with Aribot
ML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
FireTail at API Days Australia 2024 - The Double-edge sword of AI for API Sec...
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
Complicate, detect, respond: stopping cyber attacks with identity analytics
Emerging Trends in Application Security
eb-The-State-of-API-Security.pdf
edgescan vulnerability stats report (2019)
Edgescan vulnerability stats report 2020
2022 APIsecure_A day in the life of an API; Fighting the odds
The 2018 Threat Landscape
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
cybersecurity-for-ai-and-genai-updated.pdf
ANIn Bengaluru July 2024 | Digital Transformation – Protect IT! by Pankaj Sayal
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
Ad

More from DefCamp (20)

PDF
Remote Yacht Hacking
PDF
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
PPTX
The Charter of Trust
PPTX
Internet Balkanization: Why Are We Raising Borders Online?
PPTX
Bridging the gap between CyberSecurity R&D and UX
PPTX
Secure and privacy-preserving data transmission and processing using homomorp...
PPTX
Drupalgeddon 2 – Yet Another Weapon for the Attacker
PPTX
Economical Denial of Sustainability in the Cloud (EDOS)
PPTX
Trust, but verify – Bypassing MFA
PPTX
Threat Hunting: From Platitudes to Practical Application
PPTX
Building application security with 0 money down
PPTX
Implementation of information security techniques on modern android based Kio...
PPTX
Lattice based Merkle for post-quantum epoch
PPTX
The challenge of building a secure and safe digital environment in healthcare
PPTX
Timing attacks against web applications: Are they still practical?
PPTX
Tor .onions: The Good, The Rotten and The Misconfigured
PPTX
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
PPTX
We will charge you. How to [b]reach vendor’s network using EV charging station.
PPTX
Connect & Inspire Cyber Security
PPTX
The lions and the watering hole
Remote Yacht Hacking
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
The Charter of Trust
Internet Balkanization: Why Are We Raising Borders Online?
Bridging the gap between CyberSecurity R&D and UX
Secure and privacy-preserving data transmission and processing using homomorp...
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Economical Denial of Sustainability in the Cloud (EDOS)
Trust, but verify – Bypassing MFA
Threat Hunting: From Platitudes to Practical Application
Building application security with 0 money down
Implementation of information security techniques on modern android based Kio...
Lattice based Merkle for post-quantum epoch
The challenge of building a secure and safe digital environment in healthcare
Timing attacks against web applications: Are they still practical?
Tor .onions: The Good, The Rotten and The Misconfigured
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
We will charge you. How to [b]reach vendor’s network using EV charging station.
Connect & Inspire Cyber Security
The lions and the watering hole

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
cuic standard and advanced reporting.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
KodekX | Application Modernization Development
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
cuic standard and advanced reporting.pdf
Electronic commerce courselecture one. Pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
NewMind AI Weekly Chronicles - August'25 Week I
“AI and Expert System Decision Support & Business Intelligence Systems”
Digital-Transformation-Roadmap-for-Companies.pptx
MYSQL Presentation for SQL database connectivity
Dropbox Q2 2025 Financial Results & Investor Presentation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MIND Revenue Release Quarter 2 2025 Press Release
sap open course for s4hana steps from ECC to s4
Spectral efficient network and resource selection model in 5G networks
Per capita expenditure prediction using model stacking based on satellite ima...
Network Security Unit 5.pdf for BCA BBA.
Reach Out and Touch Someone: Haptics and Empathic Computing
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Advanced methodologies resolving dimensionality complications for autism neur...

Leverage Big Data in Cybersecurity

  • 1. Leverage Big Data in Cybersecurity Ladies in Cyber Security Bucharest, 21st March 2019
  • 3. Atos PSOC - Enablers
  • 4. Connected objects and technology adoption dramatically extend the threat landscape 60% of organizations victim of major breaches in 2020 (Gartner) Impact of breaches increases dramatically 2016 2017 2018 2019 goes mainstream Big data = big problems Supercharged connectivity overwhelms defenses Crime syndicates take a quantum leap Systemic vulnerabilities are weaponized Smart machines create new risks IoT risks explode Mobile apps become the main route for compromise Opaque algorithms compromise integrity More Criminals More Threats More Impact
  • 5. | 06-10-2018 | © Atos - For internal use5
  • 6. | 06-10-2018 | © Atos - For internal use Machine Learning Supervised Unsupervised source: https://www.quora.com/What-is-the-difference-between-supervised-and-unsupervised-learning-algorithms
  • 7. Prescriptive Security Predictive Security UBA and UEBA as components supporting transformation of approach from Reactive to Predictive to Prescriptive BusinessRisk Security Maturity Model LowHigh Fragmented Security PrescriptiveReactive 1 Security Consolidation2 Holistic Business- Driven Security3 • Better control and governance over all end points and IOT • More proactive and predictive approaches to threat remediation 4 • Orchestrates the automation of security actions to quickly resolve current, and anticipate future, threats at scale. 5 • Lack of visibility across global enterprises results in reactive, uncoordinated responses • Increased efforts to consolidate security platforms – from point solutions to standard platform • More cohesive ability to sense, analyze and secure the enterprise • Deeper ability to share intelligence and react to threats faster what may happen? what & why did happen? prevent from happen
  • 8. Atos PSOC - The Big Picture
  • 9. Overview what needs to be addressed Initial compromise Establish foothold Maintain presence Lateral movement Data collection Data exfiltration AV SIEM EDR IDS DLP Threat Intel CMDB User directory Ticketing system Alerts Insights/context UBA Decision Response Ignore & Tune Escalate Notify Drill down Create Ticket Lock user Contain Host Proxy block FW Block Get evidence
  • 11. | 06-10-2018 | © Atos - For internal use11
  • 12. Decision regarding triggering an alert supported by Alert Chart Analysis & Remediation Send Alarm to Security Team Behavioral Analytics – Big Data Processing Decision regarding triggering an alert supported by Alert Chart victim_user Normal Behaviour in KPI under analysis victim_user Anomaly Detection in KPI under analysis victim_user Normal Behaviour in KPI under analysis victim_user Anomaly Detection in KPI under analysis victim_user drill down in KPI before anomaly victim_user drill down in KPI after anomaly victim_user drill down in KPI before anomaly victim_user drill down in KPI after anomaly YES (risk found) NO (risk not found) HOST ACCESS ANOMALY UNUSUAL ADMIN TOOLS USAGE LOGON TYPES ANOMALYSUSPICIOUS URL ON FRESHLY REGISTERED DOMAIN Analysis & Remediation victim_user evolution Chart victim_user Normal Behaviour in KPI under analysis victim_user Anomaly Detection in KPI under analysis victim_user evolution Chart victim_user Normal Behaviour in KPI under analysis victim_user Anomaly Detection in KPI under analysis victim_user drill down in KPI before anomaly victim_user drill down in KPI after anomaly victim_user evolution Chart victim_user drill down in KPI before anomaly victim_user drill down in KPI after anomaly victim_user evolution Chart victim_user Normal Behaviour in KPI under analysis victim_user Anomaly Detection in KPI under analysis victim_user Normal Behaviour in KPI under analysis victim_user Anomaly Detection in KPI under analysis Send Alerts to Security Team
  • 13. Next steps Customer X Other Atos Customers Assets Threat Intelligence External Sources Threat Intelligence Internal Ecosystem EDR Service Cyber Security Dashboard Domain Controller SIEM Codex for Security Endpoint Protection Threat Intelligence Platform AtosStandard TicketingTool Security Automation & Orchestration SecurityAutomation&Orchestration Validation&Remediation Atos CSIRT SOC T1/T2 Advanced Threat Defense Playbooks
  • 14. Conclusion Logs collection Logic based correlation SOC expert analysis on excess of alerts Long time later… Decision Logic based correlation Big data processing Machine Learning User Behavior Analytics Automated investigation SOC expert analysis on readily available insights Logs & data collection Decision support Automated remediation SIEM SIEM Data Lake
  • 15. Atos, the Atos logo, Atos Codex, Atos Consulting, Atos Worldgrid, Bull, Canopy, equensWorldline, Unify, Worldline and Zero Email are registered trademarks of the Atos group. August 2018. © 2018 Atos. Confidential information owned by Atos, to be used by the recipient only. This document, or any part of it, may not be reproduced, copied, circulated and/or distributed nor quoted without prior written approval from Atos. Thank you ! For more information please contact: T+40 356 221151 corina-stefania.nebela@atos.net