SlideShare a Scribd company logo
© 2016 by CYBERBIT │ CYBERBIT Proprietary1
Increase your SOC efficiency with SOC 3D
Amit Modi
Regional Sales Manager – India & SAARC
+91-9920660605
Amit.modi@Cyberbit.com
© 2016 by CYBERBIT │ CYBERBIT Proprietary
Visualizing NextGen CyberSecurity
IT	Infrastructure	Security Application/DB	Security
Consulting	&	IT	GRC
Visualizing	NextGen SoC	4.0
Security	Controls Policy	&	Audit RISK	&	Compliance Business	Continuity
Vulnerability	
Management
Log	
Management
Access	&	
Identity
Visibility	&	
Compliance
Security	
Analytics
Data	Protection	&	
Control
IT	Change	&	End	Point	
Monitoring	&	Management
Incident	Response
Threat	Intell.	
Feeds
Forensic	Data	
Capture
Threat	
Detection
App	Sec CMDB
Software	Asset	
Management
© 2017 by CYBERBIT │ CYBERBIT Proprietary
4
Challenges
• SIEM Generating Huge amount of Alerts
• Incidents Getting Missed
• Lack of Threat Visibility
• Finding Lateral Impact
• Learning from Past
• Finding the RCA
• Skills Shortage
• Incident Based SLA Management
• Incident Closures
• Reporting
• Technical
• Business Context
• Performance Based
Expectations
• Business Context to the Investigation
• Adding Analytics
• Bulletin Boards to the Team
• Case Management
• Automating Runbook
• Threat Visibility & Spread
• Avoid Over Detection & False Positive
• Automate Similar Incidents
• Prioritization Based on Business Impact
• Incident Containment as a First Step
• Surgical Response for Accurate Threat
Eradication
© 2017 by CYBERBIT │ CYBERBIT Proprietary
5
Recommendation & Suggestions by SANS Analysis
© 2017 by CYBERBIT │ CYBERBIT Proprietary
6
Narrow Downing : Challenges & Expectations
• SIEM Generating Huge
amount of Alerts
• Incidents Getting Missed
• Lack of Threat Visibility
• Finding Lateral Impact
• Learning from Past
• Finding the RCA
• Skills Shortage
• Incident Based SLA
Management
• Incident Closures
• Reporting
• Technical
• Business Context
• Performance Based
(MSSP/Internal Team)
• Business Context to the
Investigation
• Adding BigData Analytics
• Bulletin Boards to the Team
• Case Management
• Automating Runbook
• Threat Visibility & Spread
• Avoid Over Detection & False
Positive
• Automate Similar Incidents
• Prioritization Based on
Business Impact
• Incident Containment as a First
Step
• Surgical Response for Accurate
Threat Eradication
• Practicing the Crisis Situation
• Matured Security
Operation Center (SoC)
• Identifying Unknown
Threats
• Incident Management
• Incident Automation
• Containment
• Forensic Data for
Accurate Eradication
• Practicing Crisis
Situation
• Continuous Skills
Improvement
• Runbook Automation for
Accuracy
© 2016 by CYBERBIT │ CYBERBIT Proprietary7
SOC 3D: Your Gateway to the Future
© 2016 │ CYBERBIT Proprietary8
Provides more accurate and actionable high
priority alerts by ingesting and analyzing SOC
feeds and external feeds
Your Single Pane of Glass for managing your
entire security operations
The only SOC management platform combining
automation, orchestration and
big-data security analytics for
real-time investigation
What Is SOC-3D
© 2016 by CYBERBIT │ CYBERBIT Proprietary9
ALERTS
SIEM
Ticketing
Email
CRM
Helpdesk
EDR
UBA
RESPONSE TOOLS
IPS
EDR
WAF
Active Directory
NAC
Memory Dump
Threat Intel CMDB
HR Systems GRC
Compliance
Vulnerability
Assessment
Enrichment
Your SOC Hub
SOC 3D
Big-Data
API’sAPI’s
© 2016 by CYBERBIT │ CYBERBIT Proprietary10
Security Analytics
Visualize Anything. Investigate Freely.
Explore raw data
for forensics
Real-time access via
big-data platform
Real-time visualization
for faster insights
© 2016 by CYBERBIT │ CYBERBIT Proprietary11
SMART AUTOMATION
Accelerate analyst work across the entire IR cycle
AUTOMATE
RESPONSE
Automate SOC operator and analyst
response tasks
AUTOMATE
DATA ENRICHMENT
Get all relevant data for
investigation
AUTOMATE
DECISION MAKING
By automating data collection
prior to response
© 2016 by CYBERBIT │ CYBERBIT Proprietary12
The Response Process: Traditional SOC
Manual Preparation: 15 minutes
New Malware
Alert
Run Memory
Dump Utility
Isolate Host
Using NAC API
Alert IT to
Replace User
Host
Check Asset
Criticality
X
Critical Proccess
Check BISO
Contact
Alert CISO &
BISO
Collect
Additional
Raw Data
X
Send recommendations
and Summary
report Investigate
Escalate to
Tier 2
2 minutes 2 minutes
3 minutes
2 minutes 2 minutes 2 minutes 2 minutes
© 2016 by CYBERBIT │ CYBERBIT Proprietary13
Automated decision
making
Automated data
enrichment
Automated
response
The Response Process: With SOC-3D Automation
New Malware
Alert
Run Memory
Dump Utility
Alert IT to
Replace User
Host
X
Critical Proccess
Check BISO
Contact
Alert Ciso &
BISO
Collect
Additional
Raw Data
(e.g. TI)
X
Send recommendations
and Summary
report Investigate
Escalate to
Tier 2
Isolate Host
Using NAC API
Check Asset
Criticality
Start Here
© 2016 by CYBERBIT │ CYBERBIT Proprietary14
Impact On TTR and TCO
Average number of stages per incident 6
Average time saved by SOC 3D per stage 2 minutes
Total time saved by SOC 3D per incident 12 minutes
Number of daily incidents 100
Time saved by SOC 3D every day 20 hours
TCO saving per day $2000
TCO saving per month $44,000
© 2016 by CYBERBIT │ CYBERBIT Proprietary15
With SOC-3D, Your SOC is
EFFICIENT
Faster to respond
Reduces SOC team workload
Measurable
BUSINESS-DRIVEN
Focuses on what matters the most
Keeps executive level informed
Engages the entire organization
SOC USER-CENTRIC
Reduces the expertise barrier
Engages your team
Increases analyst impact
Simplifies complex investigations
© 2016 by CYBERBIT │ CYBERBIT Proprietary16
Deep Diving - SOC 3D
© 2016 by CYBERBIT │ CYBERBIT Proprietary17
Thank You!

More Related Content

PDF
SACON - API Security (Suhas Desai)
PDF
SACON - Beyond corp (Arnab Chattopadhayay)
PDF
Sacon - Fresh Thinking IoT (Arnab Chattopadhayay)
PDF
Sacon - IoT Hackfest (Sri Chakradhar K)
PDF
SACON - Automating SecOps (Murray Goldschmidt)
PDF
SACON - Mobile App Security (Srinath Venkataramani)
PDF
SACON - Threat hunting (Chandra Prakash)
PDF
SACON - Cloud Security Architecture (Moshe Ferber)
SACON - API Security (Suhas Desai)
SACON - Beyond corp (Arnab Chattopadhayay)
Sacon - Fresh Thinking IoT (Arnab Chattopadhayay)
Sacon - IoT Hackfest (Sri Chakradhar K)
SACON - Automating SecOps (Murray Goldschmidt)
SACON - Mobile App Security (Srinath Venkataramani)
SACON - Threat hunting (Chandra Prakash)
SACON - Cloud Security Architecture (Moshe Ferber)

What's hot (20)

PDF
SecOps Workshop (Gregory Pickett)
PDF
SACON - Security Architecture (Arnab Chattopadhayay)
PDF
(SACON) Wasim Halani - OSINT threat hunting
PDF
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
PPTX
The Future of CASBs - A Cloud Security Force Awakens
PDF
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
PDF
SACON - Connected cars (Aditya Kakrania)
PPTX
CASB Cases: How Your Peers are Securing the Cloud
PDF
(SACON) Wayne Tufek - chapter three - sabsa
PDF
(SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ...
PPTX
Webinar Express: What is a CASB?
PDF
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
DOCX
Cloud Access Security Broker (CASB)
PPTX
CASBs and Office 365: The Security Menace
PDF
63 Requirements for CASB
PDF
(SACON) Apurva Mankad - Implementing a Privacy Program in an SME Organization...
PDF
Cisco Connect 2018 Singapore - Cisco CMX
PPTX
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
PDF
Zenith Live - Security Lab - Phantom
PPTX
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
SecOps Workshop (Gregory Pickett)
SACON - Security Architecture (Arnab Chattopadhayay)
(SACON) Wasim Halani - OSINT threat hunting
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
The Future of CASBs - A Cloud Security Force Awakens
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
SACON - Connected cars (Aditya Kakrania)
CASB Cases: How Your Peers are Securing the Cloud
(SACON) Wayne Tufek - chapter three - sabsa
(SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ...
Webinar Express: What is a CASB?
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
Cloud Access Security Broker (CASB)
CASBs and Office 365: The Security Menace
63 Requirements for CASB
(SACON) Apurva Mankad - Implementing a Privacy Program in an SME Organization...
Cisco Connect 2018 Singapore - Cisco CMX
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
Zenith Live - Security Lab - Phantom
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Ad

Viewers also liked (10)

PDF
SACON - Immutable architecture (Nilanjan De)
PDF
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
PDF
SACON - Devops-container (Richard Bussiere)
PDF
Sacon Threat Modeling Overview (Abhishek Datta)
PDF
SACON - Deception Technology (Sahir Hidayatullah)
PDF
SACON - Cyber Risk Assessment Using Bayesian Network (R Venkat)
PDF
SACON - Enterprise Security Architecture (Bikash Barai)
PDF
SACON - Windows Forensic (Dr. Phil Polstra)
PDF
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
PPT
End User Security Awareness Presentation
SACON - Immutable architecture (Nilanjan De)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
SACON - Devops-container (Richard Bussiere)
Sacon Threat Modeling Overview (Abhishek Datta)
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Cyber Risk Assessment Using Bayesian Network (R Venkat)
SACON - Enterprise Security Architecture (Bikash Barai)
SACON - Windows Forensic (Dr. Phil Polstra)
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
End User Security Awareness Presentation
Ad

Similar to SACON - Incident Response Automation & Orchestration (Amit Modi) (20)

PDF
SOC3D_Brochure_NEW_Digital
PDF
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
PPTX
SOC 3.0: strategic threat intelligence May 2016
PPTX
SOC Architecture Workshop - Part 1
PDF
Rothke secure360 building a security operations center (soc)
PDF
SOC Architecture - Building the NextGen SOC
PDF
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
PPTX
SOC and SIEM.pptx
PDF
Journey to the Center of Security Operations
PPTX
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
PDF
Denver ISSA Chapter Meetings - Changing the Security Paradigm
PPTX
Cybersecurity Operations: Examining the State of the SOC
PPTX
SOC Analysis
PPTX
Security Operations Cloud vs On Prem ISC2 Bangalore SlideShare.pptx
PPTX
Meet the Ghost of SecOps Future by Anton Chuvakin
PDF
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
PPTX
Is the SOC working as a viable business model (or security model)?
PDF
Webinar - Feel Secure with revolutionary OTM Solution
PDF
security operations center by Manage Engigne
PPTX
SOC: Use cases and are we asking the right questions?
SOC3D_Brochure_NEW_Digital
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
SOC 3.0: strategic threat intelligence May 2016
SOC Architecture Workshop - Part 1
Rothke secure360 building a security operations center (soc)
SOC Architecture - Building the NextGen SOC
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
SOC and SIEM.pptx
Journey to the Center of Security Operations
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Cybersecurity Operations: Examining the State of the SOC
SOC Analysis
Security Operations Cloud vs On Prem ISC2 Bangalore SlideShare.pptx
Meet the Ghost of SecOps Future by Anton Chuvakin
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
Is the SOC working as a viable business model (or security model)?
Webinar - Feel Secure with revolutionary OTM Solution
security operations center by Manage Engigne
SOC: Use cases and are we asking the right questions?

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Empathic Computing: Creating Shared Understanding
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Understanding_Digital_Forensics_Presentation.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Big Data Technologies - Introduction.pptx
Network Security Unit 5.pdf for BCA BBA.
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Empathic Computing: Creating Shared Understanding
Dropbox Q2 2025 Financial Results & Investor Presentation
The Rise and Fall of 3GPP – Time for a Sabbatical?
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Chapter 3 Spatial Domain Image Processing.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
NewMind AI Monthly Chronicles - July 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MYSQL Presentation for SQL database connectivity
Understanding_Digital_Forensics_Presentation.pptx
The AUB Centre for AI in Media Proposal.docx

SACON - Incident Response Automation & Orchestration (Amit Modi)

  • 1. © 2016 by CYBERBIT │ CYBERBIT Proprietary1 Increase your SOC efficiency with SOC 3D Amit Modi Regional Sales Manager – India & SAARC +91-9920660605 Amit.modi@Cyberbit.com
  • 2. © 2016 by CYBERBIT │ CYBERBIT Proprietary Visualizing NextGen CyberSecurity
  • 3. IT Infrastructure Security Application/DB Security Consulting & IT GRC Visualizing NextGen SoC 4.0 Security Controls Policy & Audit RISK & Compliance Business Continuity Vulnerability Management Log Management Access & Identity Visibility & Compliance Security Analytics Data Protection & Control IT Change & End Point Monitoring & Management Incident Response Threat Intell. Feeds Forensic Data Capture Threat Detection App Sec CMDB Software Asset Management
  • 4. © 2017 by CYBERBIT │ CYBERBIT Proprietary 4 Challenges • SIEM Generating Huge amount of Alerts • Incidents Getting Missed • Lack of Threat Visibility • Finding Lateral Impact • Learning from Past • Finding the RCA • Skills Shortage • Incident Based SLA Management • Incident Closures • Reporting • Technical • Business Context • Performance Based Expectations • Business Context to the Investigation • Adding Analytics • Bulletin Boards to the Team • Case Management • Automating Runbook • Threat Visibility & Spread • Avoid Over Detection & False Positive • Automate Similar Incidents • Prioritization Based on Business Impact • Incident Containment as a First Step • Surgical Response for Accurate Threat Eradication
  • 5. © 2017 by CYBERBIT │ CYBERBIT Proprietary 5 Recommendation & Suggestions by SANS Analysis
  • 6. © 2017 by CYBERBIT │ CYBERBIT Proprietary 6 Narrow Downing : Challenges & Expectations • SIEM Generating Huge amount of Alerts • Incidents Getting Missed • Lack of Threat Visibility • Finding Lateral Impact • Learning from Past • Finding the RCA • Skills Shortage • Incident Based SLA Management • Incident Closures • Reporting • Technical • Business Context • Performance Based (MSSP/Internal Team) • Business Context to the Investigation • Adding BigData Analytics • Bulletin Boards to the Team • Case Management • Automating Runbook • Threat Visibility & Spread • Avoid Over Detection & False Positive • Automate Similar Incidents • Prioritization Based on Business Impact • Incident Containment as a First Step • Surgical Response for Accurate Threat Eradication • Practicing the Crisis Situation • Matured Security Operation Center (SoC) • Identifying Unknown Threats • Incident Management • Incident Automation • Containment • Forensic Data for Accurate Eradication • Practicing Crisis Situation • Continuous Skills Improvement • Runbook Automation for Accuracy
  • 7. © 2016 by CYBERBIT │ CYBERBIT Proprietary7 SOC 3D: Your Gateway to the Future
  • 8. © 2016 │ CYBERBIT Proprietary8 Provides more accurate and actionable high priority alerts by ingesting and analyzing SOC feeds and external feeds Your Single Pane of Glass for managing your entire security operations The only SOC management platform combining automation, orchestration and big-data security analytics for real-time investigation What Is SOC-3D
  • 9. © 2016 by CYBERBIT │ CYBERBIT Proprietary9 ALERTS SIEM Ticketing Email CRM Helpdesk EDR UBA RESPONSE TOOLS IPS EDR WAF Active Directory NAC Memory Dump Threat Intel CMDB HR Systems GRC Compliance Vulnerability Assessment Enrichment Your SOC Hub SOC 3D Big-Data API’sAPI’s
  • 10. © 2016 by CYBERBIT │ CYBERBIT Proprietary10 Security Analytics Visualize Anything. Investigate Freely. Explore raw data for forensics Real-time access via big-data platform Real-time visualization for faster insights
  • 11. © 2016 by CYBERBIT │ CYBERBIT Proprietary11 SMART AUTOMATION Accelerate analyst work across the entire IR cycle AUTOMATE RESPONSE Automate SOC operator and analyst response tasks AUTOMATE DATA ENRICHMENT Get all relevant data for investigation AUTOMATE DECISION MAKING By automating data collection prior to response
  • 12. © 2016 by CYBERBIT │ CYBERBIT Proprietary12 The Response Process: Traditional SOC Manual Preparation: 15 minutes New Malware Alert Run Memory Dump Utility Isolate Host Using NAC API Alert IT to Replace User Host Check Asset Criticality X Critical Proccess Check BISO Contact Alert CISO & BISO Collect Additional Raw Data X Send recommendations and Summary report Investigate Escalate to Tier 2 2 minutes 2 minutes 3 minutes 2 minutes 2 minutes 2 minutes 2 minutes
  • 13. © 2016 by CYBERBIT │ CYBERBIT Proprietary13 Automated decision making Automated data enrichment Automated response The Response Process: With SOC-3D Automation New Malware Alert Run Memory Dump Utility Alert IT to Replace User Host X Critical Proccess Check BISO Contact Alert Ciso & BISO Collect Additional Raw Data (e.g. TI) X Send recommendations and Summary report Investigate Escalate to Tier 2 Isolate Host Using NAC API Check Asset Criticality Start Here
  • 14. © 2016 by CYBERBIT │ CYBERBIT Proprietary14 Impact On TTR and TCO Average number of stages per incident 6 Average time saved by SOC 3D per stage 2 minutes Total time saved by SOC 3D per incident 12 minutes Number of daily incidents 100 Time saved by SOC 3D every day 20 hours TCO saving per day $2000 TCO saving per month $44,000
  • 15. © 2016 by CYBERBIT │ CYBERBIT Proprietary15 With SOC-3D, Your SOC is EFFICIENT Faster to respond Reduces SOC team workload Measurable BUSINESS-DRIVEN Focuses on what matters the most Keeps executive level informed Engages the entire organization SOC USER-CENTRIC Reduces the expertise barrier Engages your team Increases analyst impact Simplifies complex investigations
  • 16. © 2016 by CYBERBIT │ CYBERBIT Proprietary16 Deep Diving - SOC 3D
  • 17. © 2016 by CYBERBIT │ CYBERBIT Proprietary17 Thank You!