SlideShare a Scribd company logo
Intelligent Security Orchestration and Automation hexadite.com
Let’s Automate - Workflow
The workflow tool receives a phishing
alert from a detection system.
Intelligent Security Orchestration and Automation hexadite.com
Let’s Automate - Workflow
Workflow tool retrieves data to give
more context to alerts. Data on entities
such as:
• URLs
• Attachments
• HTML email
• Keywords
Intelligent Security Orchestration and Automation hexadite.com
Let’s Automate - Workflow
Workflow tool opens and assigns a ticket
to an analyst based on pre-set rules
Intelligent Security Orchestration and Automation hexadite.com
Let’s Automate - Workflow
Ticket includes enriched alert data to
assist in the manual investigation.
Intelligent Security Orchestration and Automation hexadite.com
Let’s Automate - Workflow
The analyst manually investigates and
remediates the threat.
• Review email
• Analyze attachments, URLs, keywords
• Determine who received the email, where it might have been
opened (Pivoting)
• Manually remediate (ex. re-imaging a laptop , Deleting the
email from the mailbox, blocking the sender?)
Intelligent Security Orchestration and Automation hexadite.com
Workflow
What Time
Review email 10 minutes
Analyze attachments, URLs, and keywords 30 minutes
Access the endpoint 1 hour
Remediate 30 minutes
TOTAL 2 hours and 10
minutes

More Related Content

PPTX
Sql injection
PDF
Aikakausmediat somessa / kesäkuu 2016
PPT
Харчування у профілактиці серцево-судинних захворювань
PDF
Afaceri interactive de robert kiyosaki
PPS
Hechos de los Apóstoles
PPT
Family members game
PPTX
11th grade english unit 11 1 memoir x2
PDF
Statistical computing 01
Sql injection
Aikakausmediat somessa / kesäkuu 2016
Харчування у профілактиці серцево-судинних захворювань
Afaceri interactive de robert kiyosaki
Hechos de los Apóstoles
Family members game
11th grade english unit 11 1 memoir x2
Statistical computing 01

Viewers also liked (13)

PPTX
ジョブウェブ創業者佐藤孝治の「内定の原則講座〜就職活動で成功する人だけが持つたった一つの原則〜」
PPTX
La conciencia fonológica taller para padres y madres
DOCX
Lesson Plan Senior High School 3
PDF
Partition and conquer large data in PostgreSQL 10
PPT
Office Automation Final
PPTX
Office automation2
PPTX
Industrial Automation
DOCX
Office Automation System
PPTX
Introduction to automation ppt
PPTX
automation slides,plc,scada,HMI
PPT
Ppt on automation
PPT
Chapter 1 introduction to automation
PPTX
INDUSTRIAL AUTOMATION USING PLC
ジョブウェブ創業者佐藤孝治の「内定の原則講座〜就職活動で成功する人だけが持つたった一つの原則〜」
La conciencia fonológica taller para padres y madres
Lesson Plan Senior High School 3
Partition and conquer large data in PostgreSQL 10
Office Automation Final
Office automation2
Industrial Automation
Office Automation System
Introduction to automation ppt
automation slides,plc,scada,HMI
Ppt on automation
Chapter 1 introduction to automation
INDUSTRIAL AUTOMATION USING PLC
Ad

Similar to Security Automation Approach #1: Workflow (20)

PPT
Log Management For e-Discovery, Database Monitoring and Other Unusual Uses
PDF
MongoDB World 2019: Securing Application Data from Day One
PDF
Microsoft Avanced Threat Analytics
PPTX
If We Only Had the Time: How Security Teams Can Focus On What’s Important
PPTX
What your IT Doesn't Know about Publishing DITA Content
PPTX
Blackhat 2018 - The New Pentest? Rise of the Compromise Assessment
PDF
The New Pentest? Rise of the Compromise Assessment
PPT
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
PPTX
Artificial Intelligence - Overview
PDF
AI-Driven News & Article Data Scraping: A Deep Dive into Content Extraction
PDF
Sophisticated Attacks - Can We Really Detect Them _v1.2.pdf
PPT
Beyond Automated Testing - RVAsec 2016
PDF
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
PDF
Getting started with Web Scraping in Python
PPTX
Synopsis-Data_Leaks_Detection-046(2).pptx
PDF
The Golden Rules - Detecting more with RSA Security Analytics
PPTX
The Incremental Path to Observability
PDF
Microsoft Advanced Threat Analytics - How it Works - Presented by Atidan
PDF
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
PDF
Can_We_Really_Detect_These_So_Called_Sophisticated_Attacks?
Log Management For e-Discovery, Database Monitoring and Other Unusual Uses
MongoDB World 2019: Securing Application Data from Day One
Microsoft Avanced Threat Analytics
If We Only Had the Time: How Security Teams Can Focus On What’s Important
What your IT Doesn't Know about Publishing DITA Content
Blackhat 2018 - The New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise Assessment
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
Artificial Intelligence - Overview
AI-Driven News & Article Data Scraping: A Deep Dive into Content Extraction
Sophisticated Attacks - Can We Really Detect Them _v1.2.pdf
Beyond Automated Testing - RVAsec 2016
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
Getting started with Web Scraping in Python
Synopsis-Data_Leaks_Detection-046(2).pptx
The Golden Rules - Detecting more with RSA Security Analytics
The Incremental Path to Observability
Microsoft Advanced Threat Analytics - How it Works - Presented by Atidan
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
Can_We_Really_Detect_These_So_Called_Sophisticated_Attacks?
Ad

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Encapsulation theory and applications.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Cloud computing and distributed systems.
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Electronic commerce courselecture one. Pdf
PPTX
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
20250228 LYD VKU AI Blended-Learning.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
MIND Revenue Release Quarter 2 2025 Press Release
Encapsulation theory and applications.pdf
Spectroscopy.pptx food analysis technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Understanding_Digital_Forensics_Presentation.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Cloud computing and distributed systems.
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Machine learning based COVID-19 study performance prediction
The Rise and Fall of 3GPP – Time for a Sabbatical?
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Electronic commerce courselecture one. Pdf
Big Data Technologies - Introduction.pptx

Security Automation Approach #1: Workflow

  • 1. Intelligent Security Orchestration and Automation hexadite.com Let’s Automate - Workflow The workflow tool receives a phishing alert from a detection system.
  • 2. Intelligent Security Orchestration and Automation hexadite.com Let’s Automate - Workflow Workflow tool retrieves data to give more context to alerts. Data on entities such as: • URLs • Attachments • HTML email • Keywords
  • 3. Intelligent Security Orchestration and Automation hexadite.com Let’s Automate - Workflow Workflow tool opens and assigns a ticket to an analyst based on pre-set rules
  • 4. Intelligent Security Orchestration and Automation hexadite.com Let’s Automate - Workflow Ticket includes enriched alert data to assist in the manual investigation.
  • 5. Intelligent Security Orchestration and Automation hexadite.com Let’s Automate - Workflow The analyst manually investigates and remediates the threat. • Review email • Analyze attachments, URLs, keywords • Determine who received the email, where it might have been opened (Pivoting) • Manually remediate (ex. re-imaging a laptop , Deleting the email from the mailbox, blocking the sender?)
  • 6. Intelligent Security Orchestration and Automation hexadite.com Workflow What Time Review email 10 minutes Analyze attachments, URLs, and keywords 30 minutes Access the endpoint 1 hour Remediate 30 minutes TOTAL 2 hours and 10 minutes