SlideShare a Scribd company logo
Operationalizing Security Intelligence
Monzy Merza
@monzymerza
2
Disclaimer
2
During the course of this presentation, we may make forward looking statements regarding future events
or the expected performance of the company. We caution you that such statements reflect our current
expectations and estimates based on factors currently known to us and that actual events or results
could differ materially. For important factors that may cause actual results to differ from those contained
in our forward-looking statements, please review our filings with the SEC. The forward-looking
statements made in the this presentation are being made as of the time and date of its live presentation.
If reviewed after its live presentation, this presentation may not contain current or accurate information.
We do not assume any obligation to update any forward looking statements we may make.
In addition, any information about our roadmap outlines our general product direction and is subject to
change at any time without notice. It is for informational purposes only and shall not, be incorporated
into any contract or other commitment. Splunk undertakes no obligation either to develop the features
or functionality described or to include any such feature or functionality in a future release.
3
Agenda
The super hero and the fish market – a short story
What is Security Intelligence
For the bosses
Demos and Examples
4
https://i.ytimg.com/vi/4GmMNF1b0Lw/maxresdefault.jpg
5
https://epicheroism.files.wordpress.com/2013
/09/kratos_god_of_war-1680x1050.jpg
6
http://www.entrust.com/wp-
content/uploads/2013/02/Entrust-
MobileDemo-RSA20131.jpg
7
8
9
http://www.123rf.com/photo_30266410_seattle-july-5-customers-at-pike-
place-fish-company-wait-to-order-fish-at-the-famous-seafood-market-.html
10
Lone hacker…
11
Organized Criminals
12
Crossing the Chasm
13
Security Intelligence
Information relevant to protecting an
organization from external and inside
threats as well as the processes, policies
and tools designed to gather and analyze
that information.
http://whatis.techtarget.com/definition/security-intelligence-SI
14
Security Intelligence
Information relevant to protecting an
organization from external and inside
threats as well as the processes, policies
and tools designed to gather and analyze
that information.
http://whatis.techtarget.com/definition/security-intelligence-SI
15
Intelligence
Actionable information that provides an
organization with decision support and possibly
a strategic advantage. SI is a comprehensive
approach that integrates multiple processes and
practices designed to protect the organization.
http://whatis.techtarget.com/definition/security-intelligence-SI
16
Intelligence
Actionable information that provides an
organization with decision support and possibly
a strategic advantage. SI is a comprehensive
approach that integrates multiple processes and
practices designed to protect the organization.
http://whatis.techtarget.com/definition/security-intelligence-SI
17
Operationalizing Security Intelligence
18
Connecting People and Data
Through a Nerve Center
Operationalizing Security Intelligence
Risk-Based Context and Intelligence
Connecting
People and Data
19
20
Requirements: Risk Based Analytics
21 2
Network Endpoint Access
Data Sources
Threat Intelligence
22
Data Sources
Persist, Repeat
Known relay/C2 sites, infected sites, IOC,
attack/campaign intent and attribution
Who talked to whom, traffic, malware
download/delivery, C2, exfiltration, lateral movement
Running process, services, process owner, registry
mods, file system changes, patching level, network
connections by process/service
Access level, privileged use/escalation, system
ownership, user/system/service business criticality
2
2
• 3rd party Threat Intel
• Open source blacklist
• Internal threat intelligence
• Firewall, IDS, IPS
• DNS
• Email
• Web Proxy
• NetFlow
• Network
• AV/IPS/FW
• Malware detection
• Config Management
• Performance
• OS logs
• File System
• Directory Services
• Asset Mgmt
• Authentication Logs
• Application Services
• VPN, SSO
Threat intelligence
Access/Identity
Endpoint
Network
23
Risk Based Analytics
Network Endpoint AccessThreat Intelligence
Rules/String/Regex matching
Statistical outliers and anomalies
Scoring and aggregation
Session and Behavior profiling
24
Requirements: Context and Intelligence
25
Context and Intelligence
Integrate across technologies
Automated context matching
Automated context acquisition
Post processing and post analysis
Threat
Intelligence
Asset
& CMDB
API/SDK
Integrations
Data
Stores
Applications
26
http://www.entrust.com/wp-
content/uploads/2013/02/Entrust-
MobileDemo-RSA20131.jpg
27
Requirements: Connecting Data and People
28
Connecting People and Data
Human mediated automation
Sharing and collaboration
Free form investigation – human intuition
Interact with views and workflows
Any data, all data
Automation Collaboration Investigation Workflows All data
Operationalizing Security Intelligence
Risk-Based Context and Intelligence
Connecting
People and Data
29
30
Demo 1
31
SECURITY USE CASES
In
SECURITY &
COMPLIANCE
REPORTING
REAL-TIME
MONITORING OF
KNOWN THREATS
MONITORING
OF UNKNOWN,
ADVANCED
THREATS
INCIDENT
INVESTIGATIONS
& FORENSICS
INSIDER
THREAT
3
Splunk Can Complement OR Replace an Existing SIEM
INSIDER
THREAT
32
SPLUNK FOR SECURITY
3
SECURITY APPS & ADD-ONS
SPLUNK
APP FOR PCI
SIEM Security Analytics
Fraud, Theft
and Abuse
Platform for
Security Services
SPLUNK
USER BEHAVIOR ANALYTICS
Wire data
Windows = SIEM integration
RDBMS (any) data
SPLUNK
ENTERPRISE SECURITY
33
Demo 2
34
35
Adaptive Response- Remediating USB Malware
Detect
Eject Malicious USB
Block Network CommunicationsOrchestrate Automation
36
SPLUNK IS THE NERVE CENTER
36
App Endpoint/
Server
Cloud
Threat
Intelligence
Firewall
Web
Proxy
Internal Network
Security
Identity
Network
37
Connecting People and Data
Through a Nerve Center
38
Getting Started
Splunk
Enterprise Free
Download
Enterprise
Security Cloud
Trial
Splunk UBA
Proof of Value
39
SEPT 26-29, 2016
WALT DISNEY WORLD, ORLANDO
SWAN AND DOLPHIN RESORTS
• 5000+ IT & Business Professionals
• 3 days of technical content
• 165+ sessions
• 80+ Customer Speakers
• 35+ Apps in Splunk Apps Showcase
• 75+ Technology Partners
• 1:1 networking: Ask The Experts and Security
Experts, Birds of a Feather and Chalk Talks
• NEW hands-on labs!
• Expanded show floor, Dashboards Control
Room & Clinic, and MORE!
The 7th Annual Splunk Worldwide Users’ Conference
PLUS Splunk University
• Three days: Sept 24-26, 2016
• Get Splunk Certified for FREE!
• Get CPE credits for CISSP, CAP, SSCP
• Save thousands on Splunk education!
40
Crossing the Chasm
4
Thank You
@monzymerza

More Related Content

PPTX
Intelligence and counter terrorism
PPTX
Operational Security Intelligence
PPTX
Intelligence Collection and Analysis
PPT
Information Gathering in Intelligence Agencies
PPT
Espionage (m)
PPTX
Incident response process
PPT
Cyber Security and Cyber Awareness
PPTX
Splunk for Security-Hands On
Intelligence and counter terrorism
Operational Security Intelligence
Intelligence Collection and Analysis
Information Gathering in Intelligence Agencies
Espionage (m)
Incident response process
Cyber Security and Cyber Awareness
Splunk for Security-Hands On

What's hot (20)

PPTX
Cyber warfare Threat to Cyber Security by Prashant Mali
PDF
Network Forensic
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PPT
Crime Scene Processing
PPTX
Basic intelligence
PDF
Cyber threat intelligence ppt
PPT
Fundamentals Of Pistol Marksmanship
PPTX
Threat Hunting - Moving from the ad hoc to the formal
PPT
SECURITY AWARENESS
PPTX
PPTX
Covert action
PPTX
Cartridge
PPTX
Analysis of digital evidence
PDF
IMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCE
PDF
Threat Hunting
PPT
Preserving and recovering digital evidence
PDF
Cyber Threat Intelligence
PPTX
Understanding cyber resilience
PPTX
Module 1- Introduction to Cybercrime.pptx
Cyber warfare Threat to Cyber Security by Prashant Mali
Network Forensic
Effective Threat Hunting with Tactical Threat Intelligence
Crime Scene Processing
Basic intelligence
Cyber threat intelligence ppt
Fundamentals Of Pistol Marksmanship
Threat Hunting - Moving from the ad hoc to the formal
SECURITY AWARENESS
Covert action
Cartridge
Analysis of digital evidence
IMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCE
Threat Hunting
Preserving and recovering digital evidence
Cyber Threat Intelligence
Understanding cyber resilience
Module 1- Introduction to Cybercrime.pptx
Ad

Viewers also liked (17)

PPTX
Splunk Ninjas: New Features, Pivot, and Search Dojo
PPTX
Getting Started with Splunk Enterprise Hands-On
PPTX
Splunk Enterpise for Information Security Hands-On
PPTX
Leverage Machine Data
PDF
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
PPTX
Josh Diakun - Cust Pres - Splunk Partner Event
PDF
Getting Started With Splunk It Service Intelligence
PPTX
Splunk: How to Design, Build and Map IT Services
PPTX
Infosec 2015 - Using threat intelligence to improve security response
PPSX
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
PDF
Splunk 101
PPTX
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
PDF
Art of the Possible with Splunk Analytics
PDF
Machine Data 101
DOCX
Intelligence
PPTX
Startup Next - Market Sizing & Competitive Analysis
PPTX
The Cyber Threat Intelligence Matrix
Splunk Ninjas: New Features, Pivot, and Search Dojo
Getting Started with Splunk Enterprise Hands-On
Splunk Enterpise for Information Security Hands-On
Leverage Machine Data
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
Josh Diakun - Cust Pres - Splunk Partner Event
Getting Started With Splunk It Service Intelligence
Splunk: How to Design, Build and Map IT Services
Infosec 2015 - Using threat intelligence to improve security response
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
Splunk 101
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Art of the Possible with Splunk Analytics
Machine Data 101
Intelligence
Startup Next - Market Sizing & Competitive Analysis
The Cyber Threat Intelligence Matrix
Ad

Similar to Operational Security Intelligence (20)

PPTX
Operational Security
PPTX
Operational Security Intelligence Breakout Session
PPTX
Operationalizing Security Intelligence
PPTX
Splunk for Security Breakout Session
PPTX
SplunkLive! - Splunk for Security
PPTX
Splunk EMEA Webinar: Scoping infections and disrupting breaches
PPTX
Enterprise Security and User Behavior Analytics
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PPTX
Virtual Gov Day - Security Breakout - Deloitte
PDF
SplunkLive Wellington 2015 - Splunk for Security
PDF
SplunkLive Auckland 2015 - Splunk for Security
PDF
Splunk for Security
PDF
Splunk conf2014 - Operationalizing Advanced Threat Defense
PPTX
Make Your SOC Work Smarter, Not Harder
PDF
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
PPTX
Splunk Discovery Day Dubai 2017 - Security Keynote
PPTX
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
PPTX
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
PDF
Enterprise Security featuring UBA
PDF
Webinar: Neues zur Splunk App for Enterprise Security
Operational Security
Operational Security Intelligence Breakout Session
Operationalizing Security Intelligence
Splunk for Security Breakout Session
SplunkLive! - Splunk for Security
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Virtual Gov Day - Security Breakout - Deloitte
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
Splunk for Security
Splunk conf2014 - Operationalizing Advanced Threat Defense
Make Your SOC Work Smarter, Not Harder
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
Enterprise Security featuring UBA
Webinar: Neues zur Splunk App for Enterprise Security

More from Splunk (20)

PDF
Splunk Leadership Forum Wien - 20.05.2025
PDF
Splunk Security Update | Public Sector Summit Germany 2025
PDF
Building Resilience with Energy Management for the Public Sector
PDF
IT-Lagebild: Observability for Resilience (SVA)
PDF
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
PDF
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
PDF
Praktische Erfahrungen mit dem Attack Analyser (gematik)
PDF
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
PDF
Security - Mit Sicherheit zum Erfolg (Telekom)
PDF
One Cisco - Splunk Public Sector Summit Germany April 2025
PDF
.conf Go 2023 - Data analysis as a routine
PDF
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
PDF
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
PDF
.conf Go 2023 - Raiffeisen Bank International
PDF
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
PDF
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
PDF
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
PDF
.conf go 2023 - De NOC a CSIRT (Cellnex)
PDF
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk Leadership Forum Wien - 20.05.2025
Splunk Security Update | Public Sector Summit Germany 2025
Building Resilience with Energy Management for the Public Sector
IT-Lagebild: Observability for Resilience (SVA)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Security - Mit Sicherheit zum Erfolg (Telekom)
One Cisco - Splunk Public Sector Summit Germany April 2025
.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - De NOC a CSIRT (Cellnex)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPT
Teaching material agriculture food technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
cuic standard and advanced reporting.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Cloud computing and distributed systems.
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Modernizing your data center with Dell and AMD
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
Unlocking AI with Model Context Protocol (MCP)
Teaching material agriculture food technology
MYSQL Presentation for SQL database connectivity
cuic standard and advanced reporting.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Weekly Chronicles - August'25 Week I
Advanced methodologies resolving dimensionality complications for autism neur...
A Presentation on Artificial Intelligence
Encapsulation_ Review paper, used for researhc scholars
Spectral efficient network and resource selection model in 5G networks
Mobile App Security Testing_ A Comprehensive Guide.pdf
Cloud computing and distributed systems.
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Approach and Philosophy of On baking technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Modernizing your data center with Dell and AMD

Operational Security Intelligence

Editor's Notes

  • #3: Stela starts
  • #19: Let’s watch this short video and see how big the problem is … Did you feel their pain? Do you see the chaos? So now imagine Splunk in the middle of all that, being positioned in FY’17 as a leader to help our customers fight the bad guys. Help them do threat detection and threat analysis, be proactive and reactive, and resolve security events faster and before they create damages. This is a big mission and a very important one. We are helping protect not only our customers, but also our economy and our countries. So… what is in it for us? Besides purpose and fulfillment, there is also a big financial opportunity for Splunk (click)
  • #20: The process of discovering relationships across all security-relevant data, including data from IT infrastructures, point security products and all machine-generated data to rapidly adapt to a changing threat landscape. 
  • #30: The process of discovering relationships across all security-relevant data, including data from IT infrastructures, point security products and all machine-generated data to rapidly adapt to a changing threat landscape. 
  • #38: Let’s watch this short video and see how big the problem is … Did you feel their pain? Do you see the chaos? So now imagine Splunk in the middle of all that, being positioned in FY’17 as a leader to help our customers fight the bad guys. Help them do threat detection and threat analysis, be proactive and reactive, and resolve security events faster and before they create damages. This is a big mission and a very important one. We are helping protect not only our customers, but also our economy and our countries. So… what is in it for us? Besides purpose and fulfillment, there is also a big financial opportunity for Splunk (click)
  • #40: We’re headed to the East Coast! 2 inspired Keynotes – General Session and Security Keynote + Super Sessions with Splunk Leadership in Cloud, IT Ops, Security and Business Analytics! 165+ Breakout sessions addressing all areas and levels of Operational Intelligence – IT, Business Analytics, Mobile, Cloud, IoT, Security…and MORE! 30+ hours of invaluable networking time with industry thought leaders, technologists, and other Splunk Ninjas and Champions waiting to share their business wins with you! Join the 50%+ of Fortune 100 companies who attended .conf2015 to get hands on with Splunk. You’ll be surrounded by thousands of other like-minded individuals who are ready to share exciting and cutting edge use cases and best practices. You can also deep dive on all things Splunk products together with your favorite Splunkers. Head back to your company with both practical and inspired new uses for Splunk, ready to unlock the unimaginable power of your data! Arrive in Orlando a Splunk user, leave Orlando a Splunk Ninja! REGISTRATION OPENS IN MARCH 2016 – STAY TUNED FOR NEWS ON OUR BEST REGISTRATION RATES – COMING SOON!