© 2018 SPLUNK INC.
© 2018 SPLUNK INC.
AI Tools Deliver Faster, Better
Decisions for Defense and Offense
Ray Cruciata, GMON – Security Specialist
© 2018 SPLUNK INC.
Security Operations Problems
Escalating volume
of security alerts
Resource shortage of 1
million security professionals
Endless assembly line
of point products
Static independent controls
with no orchestration
Speed of detection, triage, &
response time must improve
Costs continue
to increase
Alerts
Resources Products
Static Speed Costs
© 2018 SPLUNK INC.
Typical Security Team
© 2018 SPLUNK INC.
© 2018 SPLUNK INC.
Tier 1
Tier 2
Tier 3
Tier 1
Tier 2
Tier 3
© 2018 SPLUNK INC.
How an AI tool
can deliver
• Automate detection and response to threats
• Have machine learning capabilities to help detect anomalies
• Orchestrate interaction with point security solutions (SOAR tool)
• But also still have a way to keep human in the loop
© 2018 SPLUNK INC.
AI
© 2018 SPLUNK INC.
Detect and Investigate
© 2018 SPLUNK INC.
Beyond the Known
COMMAND
CENTER
ANALYZE
INVESTIGATE
REMEDIATE
KNOWN
BAD
GOOD
Driven by rules and
correlation
UNKNOWN
???
Driven by machine
learning
Alerts Insights
© 2018 SPLUNK INC.
What is Splunk UBA?
critical and actionable
unknown threats
Splunk UBA provides advanced and
insider threat detection using
unsupervised machine learning
helping organizations find unknown
threats and anomalous user
behavior across devices and
applications.
© 2018 SPLUNK INC.
How Does Splunk UBA Work?
65+ ANOMALY
CLASSIFICATIONS
25+ THREAT
CLASSIFICATIONS
Machine
Learning
Suspicious Data
Movement
Unusual Machine
Access
Flight Risk User
Unusual Network
Activity
Machine Generated
Beacon
Lateral Movement
Suspicious Behavior
Compromised User
Account
Data Exfiltration
Malware Activity
Application logs
Network logs
Endpoint logs
Server logs
Identity logs
Machine
Learning
DATA
SOURCES
7 USE CASES
© 2018 SPLUNK INC.
Stay Ahead of Advanced and Insider Threats
Solve more advanced use cases powered by ML in Splunk UBA
Compromised User Account
Lateral Movement
Account Misuse
Compromised & Infected
Machine (Malware)
Suspicious Behavior &
Unknown Threat
Data Exfiltration
Contextual Intelligence
External Attack
© 2018 SPLUNK INC.
Security Orchestration Automation and
Response (SOAR)
© 2018 SPLUNK INC.
D A T A P L A T F O R M
A N A L Y T I C S
O P E R A T I O N S
Security Vision
How does Phantom help Splunk’s Nerve Center security vision?
• Advance cyber defense and reduce risk using an
analytics-driven approach
• Respond faster by accelerating incident response
• Work smarter and reduce staffing and skills challenges
© 2018 SPLUNK INC.
Decision Making Acting
SIEM
THREAT INTEL PLATFORM
HADOOP
GRC
AUTOMATED MANUAL (TODAY)
FIREWALL
IDS / IPS
ENDPOINT
WAF
ADVANCED MALWARE
FORENSICS
MALWARE DETONATION
FIREWALL
IDS / IPS
ENDPOINT
WAF
ADVANCED MALWARE
FORENSICS
MALWARE DETONATION
TIER 1
TIER 2
TIER 3
Observe
Point Products
Orient
Analytics
SOAR for Security Operations
Faster execution through the loop yields better security
© 2018 SPLUNK INC.
Decision Making Acting
SIEM
THREAT INTEL PLATFORM
HADOOP
GRC
AUTOMATED AUTOMATED WITH PHANTOM
FIREWALL
IDS / IPS
ENDPOINT
WAF
ADVANCED MALWARE
FORENSICS
MALWARE DETONATION
FIREWALL
IDS / IPS
ENDPOINT
WAF
ADVANCED MALWARE
FORENSICS
MALWARE DETONATION
TIER 1
TIER 2
TIER 3
Observe
Point Products
Orient
Analytics
SOAR for Security Operations
Faster execution through the loop yields better security
ACTION RESULTS /
FEEDBACK LOOP
© 2018 SPLUNK INC.
Q & A
© 2018 SPLUNK INC.
© 2018 SPLUNK INC.
Thank You

More Related Content

PPTX
Splunk for Enterprise Security Featuring UBA
PDF
Overview
PDF
Security Orchestration and Automation with Hexadite+
PPTX
Gov Day Sacramento 2015 - User Behavior Analytics
PPTX
Splunk at the Bank of England
PDF
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
PPTX
Gov & Education Day 2015 - User Behavior Analytics
PDF
Building a Next-Generation Security Operations Center (SOC)
Splunk for Enterprise Security Featuring UBA
Overview
Security Orchestration and Automation with Hexadite+
Gov Day Sacramento 2015 - User Behavior Analytics
Splunk at the Bank of England
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Gov & Education Day 2015 - User Behavior Analytics
Building a Next-Generation Security Operations Center (SOC)

What's hot (20)

PDF
8 Reasons to Choose Logrhythm
PDF
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
PDF
Preparing for the inevitable: The mobile incident response playbook
PPTX
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
PPTX
User Behavior Analytics And The Benefits To Companies
PPTX
Splunk Discovery Day Dubai 2017 - Security Keynote
PPTX
Splunk Enterprise Security
PPTX
Splunk for Enterprise Security and User Behavior Analytics
PPTX
SplunkLive! Zurich 2018: Monitoring the End User Experience with Splunk
PPTX
7 Steps to Build a SOC with Limited Resources
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PPTX
Building an Analytics - Enabled SOC Breakout Session
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PPTX
PPT-Splunk-LegacySIEM-101_FINAL
PPTX
Practioners Guide to SOC
PDF
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
PDF
SplunkLive! Houston IT Service Intelligence Hands On Version
PDF
5 Mobile App Security MUST-DOs in 2018
PPTX
Building a Security Information and Event Management platform at Travis Per...
PPTX
SplunkLive! Zurich 2018: Event Analytics
8 Reasons to Choose Logrhythm
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Preparing for the inevitable: The mobile incident response playbook
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
User Behavior Analytics And The Benefits To Companies
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Enterprise Security
Splunk for Enterprise Security and User Behavior Analytics
SplunkLive! Zurich 2018: Monitoring the End User Experience with Splunk
7 Steps to Build a SOC with Limited Resources
Splunk for Enterprise Security featuring User Behavior Analytics
Building an Analytics - Enabled SOC Breakout Session
Splunk for Enterprise Security featuring User Behavior Analytics
PPT-Splunk-LegacySIEM-101_FINAL
Practioners Guide to SOC
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
SplunkLive! Houston IT Service Intelligence Hands On Version
5 Mobile App Security MUST-DOs in 2018
Building a Security Information and Event Management platform at Travis Per...
SplunkLive! Zurich 2018: Event Analytics
Ad

Similar to Speaker0 session7874 1 (20)

PPTX
SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Re...
PPTX
Splunk Discovery: Milan 2018 - Intro to Security Analytics Methods
PPTX
Splunk for Enterprise Security featuring UBA Breakout Session
PPTX
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
PPTX
Better Threat Analytics: From Getting Started to Cloud Security Analytics and...
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PDF
Splunk-Presentation
PPTX
Splunk for Enterprise Security Featuring User Behavior Analytics
PPTX
Splunk for Enterprise Security featuring UBA Breakout Session
PPTX
Make Your SOC Work Smarter, Not Harder
PPTX
SplunkLive! Munich 2018: Intro to Security Analytics Methods
PPTX
Accelerate Incident Response with Orchestration & Automation
PDF
Threat Hunting Workshop
PPTX
SplunkLive! Paris 2018: Intro to Security Analytics Methods
PPTX
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
PPTX
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
PPTX
Security Automation & Orchestration
PPT
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...
PPTX
Accelerate incident Response Using Orchestration and Automation
PPTX
Accelerate incident Response Using Orchestration and Automation
SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Re...
Splunk Discovery: Milan 2018 - Intro to Security Analytics Methods
Splunk for Enterprise Security featuring UBA Breakout Session
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Better Threat Analytics: From Getting Started to Cloud Security Analytics and...
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk-Presentation
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security featuring UBA Breakout Session
Make Your SOC Work Smarter, Not Harder
SplunkLive! Munich 2018: Intro to Security Analytics Methods
Accelerate Incident Response with Orchestration & Automation
Threat Hunting Workshop
SplunkLive! Paris 2018: Intro to Security Analytics Methods
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Security Automation & Orchestration
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...
Accelerate incident Response Using Orchestration and Automation
Accelerate incident Response Using Orchestration and Automation
Ad

Recently uploaded (20)

PPTX
Computer Hardware - Technology and Livelihood Education
PPT
System Unit Components and its Functions
PPTX
Unit-1.pptxgeyeuueueu7r7r7r77r7r7r7uriruru
DOCX
Copy-OT LIST 12.8.25.docxjdjfufufufufuuffuf
PDF
Topic-1-Main-Features-of-Data-Processing.pdf
PDF
PakistanCoinageAct-906.pdfdbnsshsjjsbsbb
PDF
SAHIL PROdhdjejss yo yo pdf TOCOL PPT.pdf
PPTX
SAI-CAO-24CSEN2021-PPT-UNIT-------1.pptx
PPTX
AI_ML_Internship_WReport_Template_v2.pptx
PPTX
Group 4 [BSIT-1C] Computer Network (1).pptx
PPTX
AIR BAG SYStYEM mechanical enginweering.pptx
PPTX
ppt to the world finance to the world in growing
PPTX
Presentation (1).pptx gjkbhhjk hjjgtihkk
PPTX
ELETRONIC-PRODUCTS-ASSEMBLY-AND-SERVICING-NC-II-WEEK-1-Copy.pptx
PPTX
Operating_Systems_Presentation_With_Icons (1).pptx
PPTX
vortex flow measurement in instrumentation
PPTX
Growth Capital Investment - Espresso Capital.pptx
PPT
COA______________₹₹_₹₹33₹₹₹33₹₹₹3UNIT1V8.ppt
PPTX
RTS MASTER DECK_Household Convergence Scorecards. Use this file copy.pptx
PDF
Maxon CINEMA 4D 2025 Crack Free Download Latest Version
Computer Hardware - Technology and Livelihood Education
System Unit Components and its Functions
Unit-1.pptxgeyeuueueu7r7r7r77r7r7r7uriruru
Copy-OT LIST 12.8.25.docxjdjfufufufufuuffuf
Topic-1-Main-Features-of-Data-Processing.pdf
PakistanCoinageAct-906.pdfdbnsshsjjsbsbb
SAHIL PROdhdjejss yo yo pdf TOCOL PPT.pdf
SAI-CAO-24CSEN2021-PPT-UNIT-------1.pptx
AI_ML_Internship_WReport_Template_v2.pptx
Group 4 [BSIT-1C] Computer Network (1).pptx
AIR BAG SYStYEM mechanical enginweering.pptx
ppt to the world finance to the world in growing
Presentation (1).pptx gjkbhhjk hjjgtihkk
ELETRONIC-PRODUCTS-ASSEMBLY-AND-SERVICING-NC-II-WEEK-1-Copy.pptx
Operating_Systems_Presentation_With_Icons (1).pptx
vortex flow measurement in instrumentation
Growth Capital Investment - Espresso Capital.pptx
COA______________₹₹_₹₹33₹₹₹33₹₹₹3UNIT1V8.ppt
RTS MASTER DECK_Household Convergence Scorecards. Use this file copy.pptx
Maxon CINEMA 4D 2025 Crack Free Download Latest Version

Speaker0 session7874 1

  • 1. © 2018 SPLUNK INC. © 2018 SPLUNK INC. AI Tools Deliver Faster, Better Decisions for Defense and Offense Ray Cruciata, GMON – Security Specialist
  • 2. © 2018 SPLUNK INC. Security Operations Problems Escalating volume of security alerts Resource shortage of 1 million security professionals Endless assembly line of point products Static independent controls with no orchestration Speed of detection, triage, & response time must improve Costs continue to increase Alerts Resources Products Static Speed Costs
  • 3. © 2018 SPLUNK INC. Typical Security Team
  • 4. © 2018 SPLUNK INC. © 2018 SPLUNK INC. Tier 1 Tier 2 Tier 3 Tier 1 Tier 2 Tier 3
  • 5. © 2018 SPLUNK INC. How an AI tool can deliver • Automate detection and response to threats • Have machine learning capabilities to help detect anomalies • Orchestrate interaction with point security solutions (SOAR tool) • But also still have a way to keep human in the loop
  • 6. © 2018 SPLUNK INC. AI
  • 7. © 2018 SPLUNK INC. Detect and Investigate
  • 8. © 2018 SPLUNK INC. Beyond the Known COMMAND CENTER ANALYZE INVESTIGATE REMEDIATE KNOWN BAD GOOD Driven by rules and correlation UNKNOWN ??? Driven by machine learning Alerts Insights
  • 9. © 2018 SPLUNK INC. What is Splunk UBA? critical and actionable unknown threats Splunk UBA provides advanced and insider threat detection using unsupervised machine learning helping organizations find unknown threats and anomalous user behavior across devices and applications.
  • 10. © 2018 SPLUNK INC. How Does Splunk UBA Work? 65+ ANOMALY CLASSIFICATIONS 25+ THREAT CLASSIFICATIONS Machine Learning Suspicious Data Movement Unusual Machine Access Flight Risk User Unusual Network Activity Machine Generated Beacon Lateral Movement Suspicious Behavior Compromised User Account Data Exfiltration Malware Activity Application logs Network logs Endpoint logs Server logs Identity logs Machine Learning DATA SOURCES 7 USE CASES
  • 11. © 2018 SPLUNK INC. Stay Ahead of Advanced and Insider Threats Solve more advanced use cases powered by ML in Splunk UBA Compromised User Account Lateral Movement Account Misuse Compromised & Infected Machine (Malware) Suspicious Behavior & Unknown Threat Data Exfiltration Contextual Intelligence External Attack
  • 12. © 2018 SPLUNK INC. Security Orchestration Automation and Response (SOAR)
  • 13. © 2018 SPLUNK INC. D A T A P L A T F O R M A N A L Y T I C S O P E R A T I O N S Security Vision How does Phantom help Splunk’s Nerve Center security vision? • Advance cyber defense and reduce risk using an analytics-driven approach • Respond faster by accelerating incident response • Work smarter and reduce staffing and skills challenges
  • 14. © 2018 SPLUNK INC. Decision Making Acting SIEM THREAT INTEL PLATFORM HADOOP GRC AUTOMATED MANUAL (TODAY) FIREWALL IDS / IPS ENDPOINT WAF ADVANCED MALWARE FORENSICS MALWARE DETONATION FIREWALL IDS / IPS ENDPOINT WAF ADVANCED MALWARE FORENSICS MALWARE DETONATION TIER 1 TIER 2 TIER 3 Observe Point Products Orient Analytics SOAR for Security Operations Faster execution through the loop yields better security
  • 15. © 2018 SPLUNK INC. Decision Making Acting SIEM THREAT INTEL PLATFORM HADOOP GRC AUTOMATED AUTOMATED WITH PHANTOM FIREWALL IDS / IPS ENDPOINT WAF ADVANCED MALWARE FORENSICS MALWARE DETONATION FIREWALL IDS / IPS ENDPOINT WAF ADVANCED MALWARE FORENSICS MALWARE DETONATION TIER 1 TIER 2 TIER 3 Observe Point Products Orient Analytics SOAR for Security Operations Faster execution through the loop yields better security ACTION RESULTS / FEEDBACK LOOP
  • 16. © 2018 SPLUNK INC. Q & A
  • 17. © 2018 SPLUNK INC. © 2018 SPLUNK INC. Thank You