SlideShare a Scribd company logo
©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Put  Analytics  And  Automation  At  The  
Core  Of  Security
Joseph  Blankenship,  Senior  Analyst
October  18,  2017
We  work  with  business  and  
technology  leaders  to  develop  
customer-­obsessed  strategies  
that  drive  growth.
3©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
4©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Analyst  Bio
Joseph  (aka  JB)  supports  Security  &  Risk  
professionals,  helping  clients  develop  
security  strategies  and  make  informed  
decisions  to  protect  against  risk.  He  covers  
security  infrastructure  and  operations,  
including  security  information  management  
(SIM),  security  analytics,  security  automation  
and  orchestration  (SAO),  distributed  denial  of  
service  (DDoS),  and  network  security.  His  
research  focuses  on  security  monitoring,  
threat  detection,  insider  threat,  operations,  
and  management.Joseph  Blankenship,  Senior  Analyst
Forrester
5©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
My  Challenge  For  Today
6©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Agenda
› The Evolving World
› Cybersecurity Has To Evolve
› Analytics And Automation
› Starting Your Automation Journey
› Rules of Engagement
› Wrap-Up
7©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
The  Evolving  World
8©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
People  And  Technology  Continue  To  Evolve
www.vexels.com/vectors/preview/71108/evolution-­of-­human-­work-­silhouettes
9©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Delivering  A  5  MB  Hard  Drive  In  1956
1.25in
.94in
.08in  thick
10©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Smartphones  Replaced  A  Host  Of  Devices
11©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Concerts  Have  Evolved
12©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Remember  Telephone  Operators?
Image  Source:  www.flickr.com/photos/jill_carlson/11085936793,  www.flickr.com/photos/70251312,  
13©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Cybersecurity  Has  To  Evolve
14©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
51%  of  firms  
were  breached  in  
the  past  12  
months.
48%  of  Enterprise  Firms  Suffered  2+  Breaches  in  2017
15©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Top  Data  Types  Breached
Base:  614  global  network  security  decision-­makers  whose  firms  have  had  a  security  breach  in  the  past  12  months
Source:  Forrester  Data  Global  Business  Technographics  Security  Survey,  2017
41%
34%
29%
28%
26%
22%
20%
16%
8%
Personally  identifiable  information  (name,  address,  phone,  
Social  Security  number)
Authentication  credentials  (user  IDs  and  passwords,  other  
forms  of  credentials)
Account  numbers
Intellectual  property
Corporate  financial  data
Website  defacement
Payment/credit  card  data
Other  personal  data  (e.g.,  customer  service  data)
Other  sensitive  corporate  data  (e.g.,  marketing/strategy  plans,  
pricing)
“What  types  of  data  were  potentially  compromised  or  breached  in  the  past  12  
months?”
16©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Security  Analysis  Is  A  Manual  Activity
Source:  Forrester’s  Security  Operations  Center  (SOC)  Staffing
17©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Too  Many  Alerts  /  Too  Few  Analysts
Source:  Forrester’s  Security  Operations  Center  (SOC)  Staffing
18©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Attacker  Dwell  Time  Still  Averages  99  Days  
› Dwell  times  have  dropped  from  146
days  in  2015  to  99 days  in  2016
› While  this  is  a  substantial  
improvement,  it’s  still  far  too  long
2017  FireEye  M-­Trends  Report
Obligatory  Picture  Of  Guy  In  Hoodie  With  Ones  And  Zeroes
19©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
The  lack  of  speed  and  agility  when  responding  
to  a  suspected  data  breach  is  the  most  
significant  issue  facing  security  teams  today.
Source:   Forrester’s  “Rules  of  Engagement:   A  Call  to  Action  to  Automate   Breach   Response”   report.
20©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Infrastructures  Are  Increasingly  Complex
21©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Organizations  can't  handle  increased  
complexity  with  manual  processes.
22©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Increasing  
Complexity  
Necessitates  
The  Use  Of  
Automation
Source:  Reduce  Risk  And  Improve  Security  Through  Infrastructure  Automation Forrester  report
23©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Analytics  And  Automation
24©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
25©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Security  Analytics  Enables  Better  Detection
Source:  Forrester’s  Vendor  Landscape:  Security  Analytics  (SA)
26©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Automation  Will  Speed  Response
› Alert  triaging
› Context  gathering
› Containment
› Remediation
27©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Automation  Isn’t  A  Four  Letter  Word
› Historically,  security  pros  have  shied  away  from  automation
• Risk  of  stopping  legitimate  traffic  or  disrupting  business
• Need  for  human  analyst  to  research  and  make  decisions
28©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Base:  1,700  Security  technology  decision-­makers  (1,000+  employees)
Source:  Forrester  Data  Global  Business  Technographics  Security  Survey,  2017
0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
Complexity  of  our  IT  environment
Changing/evolving   nature  of  IT  threats  (internal  and  …
Compliance  with  new  privacy  laws
Day-­to-­day  tactical  activities  taking  up  too  much  time
Building  a  culture  of  data  stewardship
Lack  of  budget
Lack  of  staff  (the  security  team  is  understaffed)
Unavailability  of  security  employees  with  the  right  …
Inability  to  measure  the  effectiveness  of  our  security  …
Other  priorities  in  the  organization  taking  precedence  …
Top  10  Enterprise  Security  Challenges
29©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
State  that  using  automation and  
orchestration  tools  to  improve  security  
operations  is  a  high  or  critical  priority.
Base:  1,169  Security  technology  decision-­makers  (1,000+  employees)
Source:  Forrester  Data  Global  Business  Technographics  Security  Survey,  2017
68%
30©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Security  Is  Evolving  To  Be  More  Automated
31©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
#1  Security  Productivity  Tool
32©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Analysts  Also  Swivel  Chair  Between  Tools
33©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
We  Already  Have  LOTS  Of  Security  Tools
Source:  Momentum  Partners
34©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
More  tools  =  more  security
alerts
35©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
36©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Automation  Will  Help  Break  Down  Silos
37©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Automation  will  help  analysts  become  
more  productive,  but  will  not be  a  
replacement  for  human  analysts.  
38©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Starting  Your  Automation  Journey
39©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Crawl,  Walk,  Run
› What  are  the  tasks/processes  
ready  for  automation  today?
• Repetitive,  manual  tasks
• Low-­risk  processes  like  
investigation,  context  building,  
and  querying
› Build  a  strong  foundation,  then  
work  on  more  advanced  
automation
• Complicated  processes
• Remediation  activities
40©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Targeted  Attack  Hierarchy  of  Needs
Source:  Forrester’s  Targeted-­Attack  Hierarchy  Of  Needs:  Assess  Your  Core  Capabilities  report
41©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
42©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Rules  Of  Engagement
43©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Automating  Response
› Automating  security  is  a  business  requirement
› Security  is  behind  other  parts  of  the  business
Source:  Forrester’s  Rules  Of  Engagement:  A  Call  To  Action  To  Automate  Breach  Response
44©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Automation  Requires  Defined  Rules  Of  Engagement
› To  enable  automation,  security  teams  must:
• Know  the  business
› Understand  key  systems  and  data
• Establish  policies  for  automating
› When  to  automate
› When  to  send  to  a  human  analyst
• Build  consistent  processes
› Bad  process  =  garbage  in  /  garbage  out
› Policies  based  on  business  requirements
• Protect  toxic  data  – IT’S  ALL  ABOUT  THE  DATA
• Build  policies  based  on  data  risk
A  Formula  For  Defining  Toxic  Data
45©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Rules  Of  Engagement
Source:  Forrester’s  Rules  Of  Engagement:  A  Call  To  Action  To  Automate  Breach  Response
46©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Wrap-­Up  And  Next  Steps
› Security  teams  lack  the  speed  and  agility  to  stop  breaches
• Inadequate  tools  and  slow,  manual  processes  impede  progress
• Complex  environments  require  automation
› We  have  to  make  better,  faster  security  decisions
• Security  analytics  tools  help  make  that  happen
• Ability  to  automate  is  dependent  on  more  accurate,  improved  detection
› Automation  can  deliver  faster  response
• Build  a  foundation  before  increasing  complexity
• Define  rules  of  engagement  for  automation
FORRESTER.COM
Thank  you
©  2017   F O RRE S T E R.   RE PRO DUCTI ON  P RO HIB ITE D.
Joseph  Blankenship
www.forrester.com/Joseph-­Blankenship
@infosec_jb

More Related Content

PDF
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
PDF
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
PPTX
DC970 Presents: Defense in Depth
PDF
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
PDF
Part 1: Identifying Insider Threats with Fidelis EDR Technology
PPTX
Securing the Cloud
PPTX
Netpluz DDoS Mitigation - Managed Cyber Security
PDF
Hardware Security on Vehicles
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
DC970 Presents: Defense in Depth
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Securing the Cloud
Netpluz DDoS Mitigation - Managed Cyber Security
Hardware Security on Vehicles

What's hot (19)

PDF
The State of Threat Detection 2019
PPTX
2021 Nonprofit Cybersecurity Incident Report
PDF
Why Zero Trust Yields Maximum Security
PPTX
Challenges2013
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PPT
Top Tactics For Endpoint Security
PDF
Evidence-Based Security: The New Top Five Controls
PDF
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
PPTX
kill-chain-presentation-v3
PPT
The Changing Security Landscape
PPTX
It and-cyber-module-2
PPTX
Webinar cybersecurity presentation-6-2018 (final)
PDF
Cyber Security - IDS/IPS is not enough
PDF
The Cyber Security Landscape: An OurCrowd Briefing for Investors
PPTX
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
PPTX
Network Security of Data Protection
PDF
Cyber Kill Chain Deck for General Audience
PPTX
Cybersecurity Training
PDF
Overview of the Cyber Kill Chain [TM]
The State of Threat Detection 2019
2021 Nonprofit Cybersecurity Incident Report
Why Zero Trust Yields Maximum Security
Challenges2013
VAPT - Vulnerability Assessment & Penetration Testing
Top Tactics For Endpoint Security
Evidence-Based Security: The New Top Five Controls
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
kill-chain-presentation-v3
The Changing Security Landscape
It and-cyber-module-2
Webinar cybersecurity presentation-6-2018 (final)
Cyber Security - IDS/IPS is not enough
The Cyber Security Landscape: An OurCrowd Briefing for Investors
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Network Security of Data Protection
Cyber Kill Chain Deck for General Audience
Cybersecurity Training
Overview of the Cyber Kill Chain [TM]
Ad

Similar to Put Analytics And Automation At The Core Of Security – Joseph Blankenship – Senior Analyst, Forrester Research (20)

PPTX
How to Improve Threat Detection & Simplify Security Operations
PDF
Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...
PDF
Wp evolving-threats-endpoint-security
PPTX
Survival of the Fittest: How to Build a Cyber Resilient Organization
PDF
Identity Live Singapore: Transform Your Cybersecurity Capability
PPTX
Information security trends and concerns
PPT
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PPTX
Automate or Die! How to Scale and Evolve to Fix Our Broken Industry
PDF
Emerging Trends in Information Privacy and Security
PDF
Emerging Trends in Information Privacy and Security
PDF
Building an Intelligence-Driven Security Operations Center
 
PDF
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
PPTX
The New Security Practitioner
PDF
2017 InfraGard Atlanta Conference - Matthew Rosenquist
PPTX
10 IT Security Trends to Watch for in 2016
PPTX
10 Things to Watch for in 2016
PPTX
Tech Trends 2015: The fusion of business and IT | Deloitte Australia | Techno...
PDF
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
PPTX
IT Security Essentials
PPTX
Csa presentation november 2016 sloane ghx
How to Improve Threat Detection & Simplify Security Operations
Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...
Wp evolving-threats-endpoint-security
Survival of the Fittest: How to Build a Cyber Resilient Organization
Identity Live Singapore: Transform Your Cybersecurity Capability
Information security trends and concerns
PCTY 2012, IBM Security and Strategy v. Fabio Panada
Automate or Die! How to Scale and Evolve to Fix Our Broken Industry
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
Building an Intelligence-Driven Security Operations Center
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
The New Security Practitioner
2017 InfraGard Atlanta Conference - Matthew Rosenquist
10 IT Security Trends to Watch for in 2016
10 Things to Watch for in 2016
Tech Trends 2015: The fusion of business and IT | Deloitte Australia | Techno...
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
IT Security Essentials
Csa presentation november 2016 sloane ghx
Ad

More from Core Security (20)

PDF
How to Solve the Top 3 Struggles with Identity Governance and Administration ...
PPTX
Lazy Penetration Tester Tricks
PDF
Thanks for All the Phish: Introducing Core Impact 18.1
PDF
Identity + Security: Welcome to Your New Career
PDF
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
PDF
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
PDF
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
PDF
Understanding Network Insight Integrations to Automate Containment and Kick S...
PDF
Product Vision - Stephen Newman – SecureAuth+Core Security
PDF
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
PDF
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
PDF
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
PDF
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
PDF
The Why - Keith Graham, CTO – SecureAuth+Core Security
PDF
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
PDF
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
PDF
Trending it security threats in the public sector
PDF
What your scanner isn't telling you
PDF
Advanced Pen Testing Techniques-DNS-WMI
PDF
Core Impact Pro R1-Release Overview
How to Solve the Top 3 Struggles with Identity Governance and Administration ...
Lazy Penetration Tester Tricks
Thanks for All the Phish: Introducing Core Impact 18.1
Identity + Security: Welcome to Your New Career
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
Understanding Network Insight Integrations to Automate Containment and Kick S...
Product Vision - Stephen Newman – SecureAuth+Core Security
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
The Why - Keith Graham, CTO – SecureAuth+Core Security
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
Trending it security threats in the public sector
What your scanner isn't telling you
Advanced Pen Testing Techniques-DNS-WMI
Core Impact Pro R1-Release Overview

Recently uploaded (20)

PPT
Introduction Database Management System for Course Database
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
AI in Product Development-omnex systems
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
System and Network Administration Chapter 2
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
Introduction to Artificial Intelligence
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
Introduction Database Management System for Course Database
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Odoo POS Development Services by CandidRoot Solutions
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
AI in Product Development-omnex systems
CHAPTER 2 - PM Management and IT Context
System and Network Administration Chapter 2
Wondershare Filmora 15 Crack With Activation Key [2025
Operating system designcfffgfgggggggvggggggggg
Introduction to Artificial Intelligence
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Understanding Forklifts - TECH EHS Solution
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PTS Company Brochure 2025 (1).pdf.......
Which alternative to Crystal Reports is best for small or large businesses.pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Design an Analysis of Algorithms II-SECS-1021-03
Navsoft: AI-Powered Business Solutions & Custom Software Development

Put Analytics And Automation At The Core Of Security – Joseph Blankenship – Senior Analyst, Forrester Research

  • 1. ©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D.
  • 2. ©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Put  Analytics  And  Automation  At  The   Core  Of  Security Joseph  Blankenship,  Senior  Analyst October  18,  2017
  • 3. We  work  with  business  and   technology  leaders  to  develop   customer-­obsessed  strategies   that  drive  growth. 3©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D.
  • 4. 4©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Analyst  Bio Joseph  (aka  JB)  supports  Security  &  Risk   professionals,  helping  clients  develop   security  strategies  and  make  informed   decisions  to  protect  against  risk.  He  covers   security  infrastructure  and  operations,   including  security  information  management   (SIM),  security  analytics,  security  automation   and  orchestration  (SAO),  distributed  denial  of   service  (DDoS),  and  network  security.  His   research  focuses  on  security  monitoring,   threat  detection,  insider  threat,  operations,   and  management.Joseph  Blankenship,  Senior  Analyst Forrester
  • 5. 5©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. My  Challenge  For  Today
  • 6. 6©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Agenda › The Evolving World › Cybersecurity Has To Evolve › Analytics And Automation › Starting Your Automation Journey › Rules of Engagement › Wrap-Up
  • 7. 7©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. The  Evolving  World
  • 8. 8©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. People  And  Technology  Continue  To  Evolve www.vexels.com/vectors/preview/71108/evolution-­of-­human-­work-­silhouettes
  • 9. 9©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Delivering  A  5  MB  Hard  Drive  In  1956 1.25in .94in .08in  thick
  • 10. 10©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Smartphones  Replaced  A  Host  Of  Devices
  • 11. 11©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Concerts  Have  Evolved
  • 12. 12©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Remember  Telephone  Operators? Image  Source:  www.flickr.com/photos/jill_carlson/11085936793,  www.flickr.com/photos/70251312,  
  • 13. 13©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Cybersecurity  Has  To  Evolve
  • 14. 14©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. 51%  of  firms   were  breached  in   the  past  12   months. 48%  of  Enterprise  Firms  Suffered  2+  Breaches  in  2017
  • 15. 15©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Top  Data  Types  Breached Base:  614  global  network  security  decision-­makers  whose  firms  have  had  a  security  breach  in  the  past  12  months Source:  Forrester  Data  Global  Business  Technographics  Security  Survey,  2017 41% 34% 29% 28% 26% 22% 20% 16% 8% Personally  identifiable  information  (name,  address,  phone,   Social  Security  number) Authentication  credentials  (user  IDs  and  passwords,  other   forms  of  credentials) Account  numbers Intellectual  property Corporate  financial  data Website  defacement Payment/credit  card  data Other  personal  data  (e.g.,  customer  service  data) Other  sensitive  corporate  data  (e.g.,  marketing/strategy  plans,   pricing) “What  types  of  data  were  potentially  compromised  or  breached  in  the  past  12   months?”
  • 16. 16©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Security  Analysis  Is  A  Manual  Activity Source:  Forrester’s  Security  Operations  Center  (SOC)  Staffing
  • 17. 17©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Too  Many  Alerts  /  Too  Few  Analysts Source:  Forrester’s  Security  Operations  Center  (SOC)  Staffing
  • 18. 18©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Attacker  Dwell  Time  Still  Averages  99  Days   › Dwell  times  have  dropped  from  146 days  in  2015  to  99 days  in  2016 › While  this  is  a  substantial   improvement,  it’s  still  far  too  long 2017  FireEye  M-­Trends  Report Obligatory  Picture  Of  Guy  In  Hoodie  With  Ones  And  Zeroes
  • 19. 19©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. The  lack  of  speed  and  agility  when  responding   to  a  suspected  data  breach  is  the  most   significant  issue  facing  security  teams  today. Source:   Forrester’s  “Rules  of  Engagement:   A  Call  to  Action  to  Automate   Breach   Response”   report.
  • 20. 20©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Infrastructures  Are  Increasingly  Complex
  • 21. 21©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Organizations  can't  handle  increased   complexity  with  manual  processes.
  • 22. 22©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Increasing   Complexity   Necessitates   The  Use  Of   Automation Source:  Reduce  Risk  And  Improve  Security  Through  Infrastructure  Automation Forrester  report
  • 23. 23©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Analytics  And  Automation
  • 24. 24©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D.
  • 25. 25©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Security  Analytics  Enables  Better  Detection Source:  Forrester’s  Vendor  Landscape:  Security  Analytics  (SA)
  • 26. 26©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Automation  Will  Speed  Response › Alert  triaging › Context  gathering › Containment › Remediation
  • 27. 27©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Automation  Isn’t  A  Four  Letter  Word › Historically,  security  pros  have  shied  away  from  automation • Risk  of  stopping  legitimate  traffic  or  disrupting  business • Need  for  human  analyst  to  research  and  make  decisions
  • 28. 28©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Base:  1,700  Security  technology  decision-­makers  (1,000+  employees) Source:  Forrester  Data  Global  Business  Technographics  Security  Survey,  2017 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Complexity  of  our  IT  environment Changing/evolving   nature  of  IT  threats  (internal  and  … Compliance  with  new  privacy  laws Day-­to-­day  tactical  activities  taking  up  too  much  time Building  a  culture  of  data  stewardship Lack  of  budget Lack  of  staff  (the  security  team  is  understaffed) Unavailability  of  security  employees  with  the  right  … Inability  to  measure  the  effectiveness  of  our  security  … Other  priorities  in  the  organization  taking  precedence  … Top  10  Enterprise  Security  Challenges
  • 29. 29©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. State  that  using  automation and   orchestration  tools  to  improve  security   operations  is  a  high  or  critical  priority. Base:  1,169  Security  technology  decision-­makers  (1,000+  employees) Source:  Forrester  Data  Global  Business  Technographics  Security  Survey,  2017 68%
  • 30. 30©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Security  Is  Evolving  To  Be  More  Automated
  • 31. 31©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. #1  Security  Productivity  Tool
  • 32. 32©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Analysts  Also  Swivel  Chair  Between  Tools
  • 33. 33©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. We  Already  Have  LOTS  Of  Security  Tools Source:  Momentum  Partners
  • 34. 34©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. More  tools  =  more  security alerts
  • 35. 35©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D.
  • 36. 36©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Automation  Will  Help  Break  Down  Silos
  • 37. 37©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Automation  will  help  analysts  become   more  productive,  but  will  not be  a   replacement  for  human  analysts.  
  • 38. 38©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Starting  Your  Automation  Journey
  • 39. 39©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Crawl,  Walk,  Run › What  are  the  tasks/processes   ready  for  automation  today? • Repetitive,  manual  tasks • Low-­risk  processes  like   investigation,  context  building,   and  querying › Build  a  strong  foundation,  then   work  on  more  advanced   automation • Complicated  processes • Remediation  activities
  • 40. 40©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Targeted  Attack  Hierarchy  of  Needs Source:  Forrester’s  Targeted-­Attack  Hierarchy  Of  Needs:  Assess  Your  Core  Capabilities  report
  • 41. 41©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D.
  • 42. 42©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Rules  Of  Engagement
  • 43. 43©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Automating  Response › Automating  security  is  a  business  requirement › Security  is  behind  other  parts  of  the  business Source:  Forrester’s  Rules  Of  Engagement:  A  Call  To  Action  To  Automate  Breach  Response
  • 44. 44©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Automation  Requires  Defined  Rules  Of  Engagement › To  enable  automation,  security  teams  must: • Know  the  business › Understand  key  systems  and  data • Establish  policies  for  automating › When  to  automate › When  to  send  to  a  human  analyst • Build  consistent  processes › Bad  process  =  garbage  in  /  garbage  out › Policies  based  on  business  requirements • Protect  toxic  data  – IT’S  ALL  ABOUT  THE  DATA • Build  policies  based  on  data  risk A  Formula  For  Defining  Toxic  Data
  • 45. 45©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Rules  Of  Engagement Source:  Forrester’s  Rules  Of  Engagement:  A  Call  To  Action  To  Automate  Breach  Response
  • 46. 46©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Wrap-­Up  And  Next  Steps › Security  teams  lack  the  speed  and  agility  to  stop  breaches • Inadequate  tools  and  slow,  manual  processes  impede  progress • Complex  environments  require  automation › We  have  to  make  better,  faster  security  decisions • Security  analytics  tools  help  make  that  happen • Ability  to  automate  is  dependent  on  more  accurate,  improved  detection › Automation  can  deliver  faster  response • Build  a  foundation  before  increasing  complexity • Define  rules  of  engagement  for  automation
  • 47. FORRESTER.COM Thank  you ©  2017   F O RRE S T E R.  RE PRO DUCTI ON  P RO HIB ITE D. Joseph  Blankenship www.forrester.com/Joseph-­Blankenship @infosec_jb