SlideShare a Scribd company logo
Copyright	
  ©	
  2014	
  Splunk	
  Inc.	
  
Monzy	
  Merza	
  
Minister	
  of	
  Defense,	
  Splunk,	
  Inc.	
  
OperaAonalizing	
  
Advanced	
  Threat	
  
Defense	
  
Disclaimer	
  
2	
  
During	
  the	
  course	
  of	
  this	
  presentaAon,	
  we	
  may	
  make	
  forward-­‐looking	
  statements	
  regarding	
  future	
  events	
  or	
  the	
  
expected	
  performance	
  of	
  the	
  company.	
  We	
  cauAon	
  you	
  that	
  such	
  statements	
  reflect	
  our	
  current	
  expectaAons	
  and	
  
esAmates	
  based	
  on	
  factors	
  currently	
  known	
  to	
  us	
  and	
  that	
  actual	
  events	
  or	
  results	
  could	
  differ	
  materially.	
  For	
  
important	
  factors	
  that	
  may	
  cause	
  actual	
  results	
  to	
  differ	
  from	
  those	
  contained	
  in	
  our	
  forward-­‐looking	
  statements,	
  
please	
  review	
  our	
  filings	
  with	
  the	
  SEC.	
  The	
  forward-­‐looking	
  statements	
  made	
  in	
  the	
  this	
  presentaAon	
  are	
  being	
  made	
  as	
  
of	
  the	
  Ame	
  and	
  date	
  of	
  its	
  live	
  presentaAon.	
  If	
  reviewed	
  aQer	
  its	
  live	
  presentaAon,	
  this	
  presentaAon	
  may	
  not	
  contain	
  
current	
  or	
  accurate	
  informaAon.	
  We	
  do	
  not	
  assume	
  any	
  obligaAon	
  to	
  update	
  any	
  forward-­‐looking	
  statements	
  we	
  may	
  
make.	
  In	
  addiAon,	
  any	
  informaAon	
  about	
  our	
  roadmap	
  outlines	
  our	
  general	
  product	
  direcAon	
  and	
  is	
  subject	
  to	
  change	
  
at	
  any	
  Ame	
  without	
  noAce.	
  It	
  is	
  for	
  informaAonal	
  purposes	
  only,	
  and	
  shall	
  not	
  be	
  incorporated	
  into	
  any	
  contract	
  or	
  
other	
  commitment.	
  Splunk	
  undertakes	
  no	
  obligaAon	
  either	
  to	
  develop	
  the	
  features	
  or	
  funcAonality	
  described	
  or	
  to	
  
include	
  any	
  such	
  feature	
  or	
  funcAonality	
  in	
  a	
  future	
  release.	
  
Advanced	
  Threat	
  Defense	
  Requires	
  
Visibility	
  
Context	
  
&	
  
Intelligence	
  
Human	
  
Empowerment	
  
3	
  
Agenda	
  
!   The	
  advanced	
  threat	
  actors	
  and	
  their	
  success	
  
!   An	
  approach	
  to	
  combat	
  advanced	
  threat	
  actors	
  
!   ProducAonizing	
  and	
  operaAonalizing	
  advanced	
  threat	
  defense	
  
!   Demo	
  
!   Q&A	
  
4	
  
5	
  
Mature	
  Economy	
  of	
  Cyber	
  Threats	
  
6	
  
Image:	
  eyeswideopen.org	
  
Threat	
  Actors	
  Have	
  Global	
  Reach	
  
Source:	
  Mandiant	
  M-­‐Trends	
  Report	
  2012/2013/2014	
  
7	
  
229	
   40	
   100%	
   67%	
  
The	
  Adversary’s	
  M.O.	
  :	
  Kill	
  Chain	
  
8	
  
•  The	
  adversary	
  works	
  to	
  understand	
  your	
  organizaAon	
  looking	
  for	
  opportuniAes	
  
Reconnaissance	
  
•  Your	
  system	
  is	
  compromised	
  and	
  the	
  adversary	
  goes	
  to	
  work	
  
ExploitaAon	
  
•  The	
  afacker	
  steals	
  data,	
  disrupts	
  your	
  operaAons	
  or	
  causes	
  damage…	
  
AcAng	
  on	
  Intent	
  	
  
OperaAonalizing	
  Advanced	
  Threat	
  Defense	
  
	
  
9	
  
Intrusion	
  	
  
DetecAon	
  
Firewall	
  
Data	
  Loss	
  
PrevenAon	
  
AnA-­‐
Malware	
  
Vulnerability	
  
Scans	
  
Tradi.onal	
  Security	
  Strategy	
  
AuthenAcaAon	
  
10	
  
Connect	
  the	
  Dots	
  Across	
  All	
  Data	
  
Servers	
  
Storage	
  
Desktops	
  Email	
   Web	
  
TransacAon	
  
Records	
  
Network	
  
Flows	
  Hypervisor	
  
Custom	
  
Apps	
  
Physical	
  
Access	
  
Badges	
  
Threat	
  
Intelligence	
  
Mobile	
  
CMBD	
  DHCP/	
  DNS	
  
Intrusion	
  	
  
DetecAon	
  
Firewall	
  
Data	
  Loss	
  
PrevenAon	
  
AnA-­‐
Malware	
  
Vulnerability	
  
Scans	
  
AuthenAcaAon	
  
11	
  
12	
  
Threat	
  Intelligence	
  Network	
   Endpoint	
   AuthenAcaAon	
  
Minimum	
  Set	
  of	
  Sources	
  
13	
  
Online	
  
Services	
  
Web	
  
Services	
  
Security	
  
GPS	
  
LocaAon	
  
Storage	
  
Desktops	
  
Networks	
  
Packaged	
  
ApplicaAons	
  
Custom	
  
ApplicaAons	
  
Messaging	
  
Telecoms	
  
Online	
  
Shopping	
  
Cart	
  
Web	
  
Clickstreams	
  
Databases	
  
Energy	
  
Meters	
  
Call	
  Detail	
  
Records	
  
Smartphones	
  
and	
  Devices	
  
Security	
  Intelligence	
  
Firewall	
  
AuthenAcaAon	
  
Threat	
  
Intelligence	
  
Servers	
  
Endpoint	
  
Security	
  Intelligence	
  
14	
  
Raw	
  Events	
  
Online	
  
Services	
  
Web	
  
Services	
  
Security	
  
GPS	
  
LocaAon	
  
Storage	
  
Desktops	
  
Networks	
  
Packaged	
  
ApplicaAons	
  
Custom	
  
ApplicaAons	
  
Messaging	
  
Telecoms	
  
Online	
  
Shopping	
  
Cart	
  
Web	
  
Clickstreams	
  
Databases	
  
Energy	
  
Meters	
  
Call	
  Detail	
  
Records	
  
Smartphones	
  
and	
  Devices	
  
Firewall	
  
AuthenAcaAon	
  
Threat	
  
Intelligence	
  
Servers	
  
Endpoint	
  
Security	
  Intelligence	
  
15	
  
Threat	
  
Intelligence	
  
Asset	
  	
  
&	
  CMDB	
  
Employee	
  
Info	
  
Data	
  
Stores	
  Applica.ons	
  
Raw	
  Events	
  
Online	
  
Services	
  
Web	
  
Services	
  
Security	
  
GPS	
  
LocaAon	
  
Storage	
  
Desktops	
  
Networks	
  
Packaged	
  
ApplicaAons	
  
Custom	
  
ApplicaAons	
  
Messaging	
  
Telecoms	
  
Online	
  
Shopping	
  
Cart	
  
Web	
  
Clickstreams	
  
Databases	
  
Energy	
  
Meters	
  
Call	
  Detail	
  
Records	
  
Smartphones	
  
and	
  Devices	
  
Firewall	
  
AuthenAcaAon	
  
Threat	
  
Intelligence	
  
Servers	
  
Endpoint	
  
Security	
  Intelligence	
  
16	
  
Report	
  and	
  	
  
analyze	
  
Custom	
  	
  
dashboards	
  
Monitor	
  	
  
and	
  alert	
  
Ad	
  hoc	
  	
  
search	
  
Threat	
  
Intelligence	
  
Asset	
  	
  
&	
  CMDB	
  
Employee	
  
Info	
  
Data	
  
Stores	
  Applica.ons	
  
Raw	
  Events	
  
Online	
  
Services	
  
Web	
  
Services	
  
Security	
  
GPS	
  
LocaAon	
  
Storage	
  
Desktops	
  
Networks	
  
Packaged	
  
ApplicaAons	
  
Custom	
  
ApplicaAons	
  
Messaging	
  
Telecoms	
  
Online	
  
Shopping	
  
Cart	
  
Web	
  
Clickstreams	
  
Databases	
  
Energy	
  
Meters	
  
Call	
  Detail	
  
Records	
  
Smartphones	
  
and	
  Devices	
  
Firewall	
  
AuthenAcaAon	
  
Threat	
  
Intelligence	
  
Servers	
  
Endpoint	
  
17	
  
Enterprise	
  Security	
  3.x	
  
ConAnuous	
  Monitoring	
  and	
  Advanced	
  Threat	
  DetecAon	
  
18	
  
19	
  
20	
  
21	
  
22	
  
What’s	
  New	
  in	
  ES	
  3.1	
  
RISK-­‐BASED	
  ANALYTICS	
   VISUALIZE	
  AND	
  DISCOVER	
  
RELATIONSHIPS	
  
ENRICH	
  SECURITY	
  ANALYSIS	
  
WITH	
  THREAT	
  INTELLIGENCE	
  
Risk	
  Scoring	
  Framework	
  
KSI/KPI/KRI	
  Edi.ng	
  
Contribu.ng	
  Factors	
  Analysis	
  
GUI	
  Edi.ng	
  of	
  Swimlanes	
  
Guided	
  Search	
  Builder	
  
	
  
Domain	
  and	
  URL	
  threat	
  Intel	
  
Aggrega.on	
  and	
  Deduplica.on	
  
Threat	
  Intel	
  Source	
  Weights	
  
23	
  
24	
  
Demo	
  
25	
  
Threat	
  Intelligence	
  Network	
   Endpoint	
   AuthenAcaAon	
  
Advanced	
  Threat	
  Defense	
  Starts	
  Here	
  
Security	
  Intelligence	
  
26	
  
Developer	
  
PlaUorm	
  
Report	
  and	
  	
  
analyze	
  
Custom	
  	
  
dashboards	
  
Monitor	
  	
  
and	
  alert	
  
Ad	
  hoc	
  	
  
search	
  
Threat	
  
Intelligence	
  
Asset	
  	
  
&	
  CMDB	
  
Employee	
  
Info	
  
Data	
  
Stores	
  Applica.ons	
  
Online	
  
Services	
  
Web	
  
Services	
  
Security	
  
GPS	
  
LocaAon	
  
Storage	
  
Desktops	
  
Networks	
  
Packaged	
  
ApplicaAons	
  
Custom	
  
ApplicaAons	
  
Messaging	
  
Telecoms	
  
Online	
  
Shopping	
  
Cart	
  
Web	
  
Clickstreams	
  
Databases	
  
Energy	
  
Meters	
  
Call	
  Detail	
  
Records	
  
Smartphones	
  
and	
  Devices	
  
Firewall	
  
AuthenAcaAon	
  
Threat	
  
Intelligence	
  
Servers	
  
Endpoint	
  
Thousands	
  of	
  Global	
  Security	
  Customers	
  
27	
  
Industry	
  RecogniAon	
  
28	
  
2012	
  
2013	
  
Product/Service Rating
AccelOps
AlienVault
BlackStratus
EventTracker
HP(ArcSight)
IBMSecurity(QRadar)
LogRhythm
McAfee(ESM)
Real-Time Monitoring 3.50 3.00 3.00 2.9 4.1 4.0 3.75 3.75
Threat Intelligence 3.00 3.50 2.50 1.5 4.0 4.0 3.25 4.00
Behavior Profiling 2.50 3.50 2.50 2.8 4.0 4.5 3.38 3.50
Data and User Monitoring 2.97 2.43 2.16 3.2 4.2 3.8 3.41 4.44
Application Monitoring 2.90 3.65 2.90 3.2 4.5 4.3 4.10 4.20
Analytics 2.44 3.19 2.94 2.9 3.8 3.7 3.30 3.59
Log Management and Reporting 2.75 3.00 2.50 3.4 4.0 3.8 3.75 3.25
Deployment/Support Simplicity 3.50 4.00 3.00 4.3 3.7 4.3 4.25 4.00
Source: Gartner (June 2014)
29	
  
Enterprise	
  Security	
  
Office	
  Hours	
  	
  
@Room	
  103	
  
Best	
  Kept	
  Secrets	
  of	
  
Enterprise	
  Security	
  
	
  Dimitri	
  McKay	
  
Automated	
  MiAgaAon	
  With	
  
Enterprise	
  Security	
  
Jose	
  Hernandez	
  
Enterprise	
  Security	
  
@Apps	
  Showcase	
  
CPE,	
  CISSP	
  Credits	
  
For	
  Security	
  Talks	
  	
  
30	
  
Security	
  office	
  hours:	
  11:00	
  AM	
  –	
  2:00	
  PM	
  @Room	
  103	
  Everyday	
  
	
  Geek	
  out,	
  share	
  ideas	
  with	
  Enterprise	
  Security	
  developers	
  
Red	
  Team	
  /	
  Blue	
  Team	
  -­‐	
  Challenge	
  your	
  skills	
  and	
  learn	
  new	
  tricks	
  
Mon-­‐Wed:	
  3:00	
  PM	
  –	
  6:00	
  PM	
  @Splunk	
  Community	
  Lounge	
  
Thurs:	
  11:00	
  AM	
  –	
  2:00	
  PM	
  
Learn,	
  share	
  and	
  hack	
  
Birds	
  of	
  a	
  feather-­‐	
  Collaborate	
  and	
  brainstorm	
  with	
  security	
  ninjas	
  	
  	
  
Thurs:	
  12:00	
  PM	
  –	
  1:00	
  PM	
  @Meal	
  Room	
  	
  
THANK	
  YOU!!!	
  
monzy@splunk.com	
  

More Related Content

PDF
Conf2014_SplunkSecurityNinjutsu
DOCX
Security Hands-On - Splunklive! Houston
PPTX
Security investigation hands-on workshop 2018
PPTX
Threat Hunting with Splunk
PDF
SplunkSummit 2015 - ES Hands On Workshop
PDF
Analytics Driven SIEM Workshop
PDF
Building an Analytics Enables SOC
PPTX
Using Splunk for Information Security
Conf2014_SplunkSecurityNinjutsu
Security Hands-On - Splunklive! Houston
Security investigation hands-on workshop 2018
Threat Hunting with Splunk
SplunkSummit 2015 - ES Hands On Workshop
Analytics Driven SIEM Workshop
Building an Analytics Enables SOC
Using Splunk for Information Security

What's hot (20)

PDF
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PDF
SplunkLive! Stockholm 2015 breakout - Analytics based security
PPTX
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
PPTX
Splunk for Enterprise Security and User Behavior Analytics
PDF
Splunk for Security
PPTX
SplunkLive! Frankfurt 2018 - Getting Hands On with Splunk Enterprise
PPTX
SplunkLive! Paris 2018: Intro to Security Analytics Methods
PPTX
SplunkLive! Zurich 2018: Monitoring the End User Experience with Splunk
PPTX
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
PPTX
Building an Analytics - Enabled SOC Breakout Session
PPTX
Gov Day Sacramento 2015 - User Behavior Analytics
PPTX
SplunkLive! Utrecht - Splunk for Security - Monzy Merza
PDF
Webinar: Neues zur Splunk App for Enterprise Security
PPTX
Threat Hunting with Splunk Hands-on
PPTX
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
PDF
Threat Hunting with Splunk
PPTX
SplunkLive! Paris 2018: Plenary Session
PPTX
SplunkLive! Frankfurt 2018 - Use Splunk for Incident Response, Orchestration ...
PPTX
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk for Enterprise Security featuring User Behavior Analytics
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
Splunk for Enterprise Security and User Behavior Analytics
Splunk for Security
SplunkLive! Frankfurt 2018 - Getting Hands On with Splunk Enterprise
SplunkLive! Paris 2018: Intro to Security Analytics Methods
SplunkLive! Zurich 2018: Monitoring the End User Experience with Splunk
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
Building an Analytics - Enabled SOC Breakout Session
Gov Day Sacramento 2015 - User Behavior Analytics
SplunkLive! Utrecht - Splunk for Security - Monzy Merza
Webinar: Neues zur Splunk App for Enterprise Security
Threat Hunting with Splunk Hands-on
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Threat Hunting with Splunk
SplunkLive! Paris 2018: Plenary Session
SplunkLive! Frankfurt 2018 - Use Splunk for Incident Response, Orchestration ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
Ad

Viewers also liked (7)

PDF
SplunkSummit 2015 - Security Ninjitsu
PPTX
Real-Time Status Commands
PDF
Splunk conf2014 - Lesser Known Commands in Splunk Search Processing Language ...
PPTX
Using Splunk for Information Security
PDF
Conf2014_SplunkSearchOptimization
PDF
CHIME Lead Forum - Seattle 2015
PDF
Finding attacks with these 6 events
SplunkSummit 2015 - Security Ninjitsu
Real-Time Status Commands
Splunk conf2014 - Lesser Known Commands in Splunk Search Processing Language ...
Using Splunk for Information Security
Conf2014_SplunkSearchOptimization
CHIME Lead Forum - Seattle 2015
Finding attacks with these 6 events
Ad

Similar to Splunk conf2014 - Operationalizing Advanced Threat Defense (20)

PDF
Splunk Webinar Best Practices für Incident Investigation
PPTX
Splunk for Enterprise Security Featuring User Behavior Analytics
PPT
Core.co.enterprise.deck.06.16.10
PDF
SplunkLive! Zürich - Splunk für Security
PDF
SplunkLive! Wien - Splunk für Security
PPTX
Operational Security
PPTX
Best Practices for Scoping Infections and Disrupting Breaches
PPTX
Sourcefire Webinar - NEW GENERATION IPS
PDF
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
PDF
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
PPTX
Securing Your Public Cloud Infrastructure
PPTX
Splunk for Security Breakout Session
PDF
Estratégia de segurança da Cisco (um diferencial para seus negócios)
PPTX
Splunk EMEA Webinar: Scoping infections and disrupting breaches
PDF
inSOC Sales Deck Dec 2020.pdf
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PPTX
NetWatcher Customer Overview
PDF
SplunkSummit 2015 - Splunking the Endpoint
PPTX
Overview of Haystax Technology
PDF
Advanced threat security - Cyber Security For The Real World
Splunk Webinar Best Practices für Incident Investigation
Splunk for Enterprise Security Featuring User Behavior Analytics
Core.co.enterprise.deck.06.16.10
SplunkLive! Zürich - Splunk für Security
SplunkLive! Wien - Splunk für Security
Operational Security
Best Practices for Scoping Infections and Disrupting Breaches
Sourcefire Webinar - NEW GENERATION IPS
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Securing Your Public Cloud Infrastructure
Splunk for Security Breakout Session
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Splunk EMEA Webinar: Scoping infections and disrupting breaches
inSOC Sales Deck Dec 2020.pdf
Splunk for Enterprise Security featuring User Behavior Analytics
NetWatcher Customer Overview
SplunkSummit 2015 - Splunking the Endpoint
Overview of Haystax Technology
Advanced threat security - Cyber Security For The Real World

More from Splunk (20)

PDF
Splunk Leadership Forum Wien - 20.05.2025
PDF
Splunk Security Update | Public Sector Summit Germany 2025
PDF
Building Resilience with Energy Management for the Public Sector
PDF
IT-Lagebild: Observability for Resilience (SVA)
PDF
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
PDF
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
PDF
Praktische Erfahrungen mit dem Attack Analyser (gematik)
PDF
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
PDF
Security - Mit Sicherheit zum Erfolg (Telekom)
PDF
One Cisco - Splunk Public Sector Summit Germany April 2025
PDF
.conf Go 2023 - Data analysis as a routine
PDF
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
PDF
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
PDF
.conf Go 2023 - Raiffeisen Bank International
PDF
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
PDF
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
PDF
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
PDF
.conf go 2023 - De NOC a CSIRT (Cellnex)
PDF
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk Leadership Forum Wien - 20.05.2025
Splunk Security Update | Public Sector Summit Germany 2025
Building Resilience with Energy Management for the Public Sector
IT-Lagebild: Observability for Resilience (SVA)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Security - Mit Sicherheit zum Erfolg (Telekom)
One Cisco - Splunk Public Sector Summit Germany April 2025
.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - De NOC a CSIRT (Cellnex)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Cloud computing and distributed systems.
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Machine learning based COVID-19 study performance prediction
PDF
KodekX | Application Modernization Development
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
20250228 LYD VKU AI Blended-Learning.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Building Integrated photovoltaic BIPV_UPV.pdf
Electronic commerce courselecture one. Pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Cloud computing and distributed systems.
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Machine learning based COVID-19 study performance prediction
KodekX | Application Modernization Development
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Modernizing your data center with Dell and AMD
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Splunk conf2014 - Operationalizing Advanced Threat Defense

  • 1. Copyright  ©  2014  Splunk  Inc.   Monzy  Merza   Minister  of  Defense,  Splunk,  Inc.   OperaAonalizing   Advanced  Threat   Defense  
  • 2. Disclaimer   2   During  the  course  of  this  presentaAon,  we  may  make  forward-­‐looking  statements  regarding  future  events  or  the   expected  performance  of  the  company.  We  cauAon  you  that  such  statements  reflect  our  current  expectaAons  and   esAmates  based  on  factors  currently  known  to  us  and  that  actual  events  or  results  could  differ  materially.  For   important  factors  that  may  cause  actual  results  to  differ  from  those  contained  in  our  forward-­‐looking  statements,   please  review  our  filings  with  the  SEC.  The  forward-­‐looking  statements  made  in  the  this  presentaAon  are  being  made  as   of  the  Ame  and  date  of  its  live  presentaAon.  If  reviewed  aQer  its  live  presentaAon,  this  presentaAon  may  not  contain   current  or  accurate  informaAon.  We  do  not  assume  any  obligaAon  to  update  any  forward-­‐looking  statements  we  may   make.  In  addiAon,  any  informaAon  about  our  roadmap  outlines  our  general  product  direcAon  and  is  subject  to  change   at  any  Ame  without  noAce.  It  is  for  informaAonal  purposes  only,  and  shall  not  be  incorporated  into  any  contract  or   other  commitment.  Splunk  undertakes  no  obligaAon  either  to  develop  the  features  or  funcAonality  described  or  to   include  any  such  feature  or  funcAonality  in  a  future  release.  
  • 3. Advanced  Threat  Defense  Requires   Visibility   Context   &   Intelligence   Human   Empowerment   3  
  • 4. Agenda   !   The  advanced  threat  actors  and  their  success   !   An  approach  to  combat  advanced  threat  actors   !   ProducAonizing  and  operaAonalizing  advanced  threat  defense   !   Demo   !   Q&A   4  
  • 5. 5   Mature  Economy  of  Cyber  Threats  
  • 6. 6   Image:  eyeswideopen.org   Threat  Actors  Have  Global  Reach  
  • 7. Source:  Mandiant  M-­‐Trends  Report  2012/2013/2014   7   229   40   100%   67%  
  • 8. The  Adversary’s  M.O.  :  Kill  Chain   8   •  The  adversary  works  to  understand  your  organizaAon  looking  for  opportuniAes   Reconnaissance   •  Your  system  is  compromised  and  the  adversary  goes  to  work   ExploitaAon   •  The  afacker  steals  data,  disrupts  your  operaAons  or  causes  damage…   AcAng  on  Intent    
  • 9. OperaAonalizing  Advanced  Threat  Defense     9  
  • 10. Intrusion     DetecAon   Firewall   Data  Loss   PrevenAon   AnA-­‐ Malware   Vulnerability   Scans   Tradi.onal  Security  Strategy   AuthenAcaAon   10  
  • 11. Connect  the  Dots  Across  All  Data   Servers   Storage   Desktops  Email   Web   TransacAon   Records   Network   Flows  Hypervisor   Custom   Apps   Physical   Access   Badges   Threat   Intelligence   Mobile   CMBD  DHCP/  DNS   Intrusion     DetecAon   Firewall   Data  Loss   PrevenAon   AnA-­‐ Malware   Vulnerability   Scans   AuthenAcaAon   11  
  • 12. 12   Threat  Intelligence  Network   Endpoint   AuthenAcaAon   Minimum  Set  of  Sources  
  • 13. 13   Online   Services   Web   Services   Security   GPS   LocaAon   Storage   Desktops   Networks   Packaged   ApplicaAons   Custom   ApplicaAons   Messaging   Telecoms   Online   Shopping   Cart   Web   Clickstreams   Databases   Energy   Meters   Call  Detail   Records   Smartphones   and  Devices   Security  Intelligence   Firewall   AuthenAcaAon   Threat   Intelligence   Servers   Endpoint  
  • 14. Security  Intelligence   14   Raw  Events   Online   Services   Web   Services   Security   GPS   LocaAon   Storage   Desktops   Networks   Packaged   ApplicaAons   Custom   ApplicaAons   Messaging   Telecoms   Online   Shopping   Cart   Web   Clickstreams   Databases   Energy   Meters   Call  Detail   Records   Smartphones   and  Devices   Firewall   AuthenAcaAon   Threat   Intelligence   Servers   Endpoint  
  • 15. Security  Intelligence   15   Threat   Intelligence   Asset     &  CMDB   Employee   Info   Data   Stores  Applica.ons   Raw  Events   Online   Services   Web   Services   Security   GPS   LocaAon   Storage   Desktops   Networks   Packaged   ApplicaAons   Custom   ApplicaAons   Messaging   Telecoms   Online   Shopping   Cart   Web   Clickstreams   Databases   Energy   Meters   Call  Detail   Records   Smartphones   and  Devices   Firewall   AuthenAcaAon   Threat   Intelligence   Servers   Endpoint  
  • 16. Security  Intelligence   16   Report  and     analyze   Custom     dashboards   Monitor     and  alert   Ad  hoc     search   Threat   Intelligence   Asset     &  CMDB   Employee   Info   Data   Stores  Applica.ons   Raw  Events   Online   Services   Web   Services   Security   GPS   LocaAon   Storage   Desktops   Networks   Packaged   ApplicaAons   Custom   ApplicaAons   Messaging   Telecoms   Online   Shopping   Cart   Web   Clickstreams   Databases   Energy   Meters   Call  Detail   Records   Smartphones   and  Devices   Firewall   AuthenAcaAon   Threat   Intelligence   Servers   Endpoint  
  • 17. 17   Enterprise  Security  3.x   ConAnuous  Monitoring  and  Advanced  Threat  DetecAon  
  • 18. 18  
  • 19. 19  
  • 20. 20  
  • 21. 21  
  • 22. 22  
  • 23. What’s  New  in  ES  3.1   RISK-­‐BASED  ANALYTICS   VISUALIZE  AND  DISCOVER   RELATIONSHIPS   ENRICH  SECURITY  ANALYSIS   WITH  THREAT  INTELLIGENCE   Risk  Scoring  Framework   KSI/KPI/KRI  Edi.ng   Contribu.ng  Factors  Analysis   GUI  Edi.ng  of  Swimlanes   Guided  Search  Builder     Domain  and  URL  threat  Intel   Aggrega.on  and  Deduplica.on   Threat  Intel  Source  Weights   23  
  • 25. 25   Threat  Intelligence  Network   Endpoint   AuthenAcaAon   Advanced  Threat  Defense  Starts  Here  
  • 26. Security  Intelligence   26   Developer   PlaUorm   Report  and     analyze   Custom     dashboards   Monitor     and  alert   Ad  hoc     search   Threat   Intelligence   Asset     &  CMDB   Employee   Info   Data   Stores  Applica.ons   Online   Services   Web   Services   Security   GPS   LocaAon   Storage   Desktops   Networks   Packaged   ApplicaAons   Custom   ApplicaAons   Messaging   Telecoms   Online   Shopping   Cart   Web   Clickstreams   Databases   Energy   Meters   Call  Detail   Records   Smartphones   and  Devices   Firewall   AuthenAcaAon   Threat   Intelligence   Servers   Endpoint  
  • 27. Thousands  of  Global  Security  Customers   27  
  • 28. Industry  RecogniAon   28   2012   2013   Product/Service Rating AccelOps AlienVault BlackStratus EventTracker HP(ArcSight) IBMSecurity(QRadar) LogRhythm McAfee(ESM) Real-Time Monitoring 3.50 3.00 3.00 2.9 4.1 4.0 3.75 3.75 Threat Intelligence 3.00 3.50 2.50 1.5 4.0 4.0 3.25 4.00 Behavior Profiling 2.50 3.50 2.50 2.8 4.0 4.5 3.38 3.50 Data and User Monitoring 2.97 2.43 2.16 3.2 4.2 3.8 3.41 4.44 Application Monitoring 2.90 3.65 2.90 3.2 4.5 4.3 4.10 4.20 Analytics 2.44 3.19 2.94 2.9 3.8 3.7 3.30 3.59 Log Management and Reporting 2.75 3.00 2.50 3.4 4.0 3.8 3.75 3.25 Deployment/Support Simplicity 3.50 4.00 3.00 4.3 3.7 4.3 4.25 4.00 Source: Gartner (June 2014)
  • 29. 29   Enterprise  Security   Office  Hours     @Room  103   Best  Kept  Secrets  of   Enterprise  Security    Dimitri  McKay   Automated  MiAgaAon  With   Enterprise  Security   Jose  Hernandez   Enterprise  Security   @Apps  Showcase   CPE,  CISSP  Credits   For  Security  Talks    
  • 30. 30   Security  office  hours:  11:00  AM  –  2:00  PM  @Room  103  Everyday    Geek  out,  share  ideas  with  Enterprise  Security  developers   Red  Team  /  Blue  Team  -­‐  Challenge  your  skills  and  learn  new  tricks   Mon-­‐Wed:  3:00  PM  –  6:00  PM  @Splunk  Community  Lounge   Thurs:  11:00  AM  –  2:00  PM   Learn,  share  and  hack   Birds  of  a  feather-­‐  Collaborate  and  brainstorm  with  security  ninjas       Thurs:  12:00  PM  –  1:00  PM  @Meal  Room