SlideShare a Scribd company logo
Solve Your Security Challenges
with Splunk Enterprise Security
Michel Oosterhof | Staff Sales Engineer
16 May 2018
During the course of this presentation, we may make forward-looking statements regarding future events or
the expected performance of the company. We caution you that such statements reflect our current
expectations and estimates based on factors currently known to us and that actual events or results could
differ materially. For important factors that may cause actual results to differ from those contained in our
forward-looking statements, please review our filings with the SEC.
The forward-looking statements made in this presentation are being made as of the time and date of its live
presentation. If reviewed after its live presentation, this presentation may not contain current or accurate
information. We do not assume any obligation to update any forward looking statements we may make. In
addition, any information about our roadmap outlines our general product direction and is subject to change
at any time without notice. It is for informational purposes only and shall not be incorporated into any contract
or other commitment. Splunk undertakes no obligation either to develop the features or functionality
described or to include any such feature or functionality in a future release.
Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in
the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. ©2018 Splunk Inc. All rights reserved.
Forward-Looking Statements
THIS SLIDE IS REQUIRED FOR ALL 3 PARTY PRESENTATIONS.
© 2018 SPLUNK INC.
1. Common Security Challenges
2. Methods to Strengthen Security Posture
3. How Splunk Can Help
What Can You
Expect From
This Session?
Common Security Challenges
Cyber Criminals
Nation States
Insider Threats
100%
Valid credentials were used
40
Average # of systems accessed
146
Median # of days before detection
65%
Of victims were notified by
external entity
Source: Mandiant M-Trends Report 2012/2013/2014/2015/2016/2017
Centralize
Analysis
Investigative
Mindset
Operationalize
Strengthen Your Security Posture
Central Analysis
Endpoint Access/Identity Network Threat
Intelligence
4 Ways to Improve Posture Quickly
What You Discover
▶ Frequency of application executions, unique applications
▶ Non-corporate approved applications
▶ Known malicious executables
Benefit
▶ Visibility into application executions
▶ Understanding of unknown applications – whom and
where and frequency
Understanding Your Endpoints
Processes, File Info/Access, User Activity
Endpoints
End Point System:
Windows Sysmon,
Network, File Info
Endpoint Security:
Virus, Malware, Spyware,
Whitelisting, Behaviors
What You Discover
▶ Credentials used in multiple locations, or shared by users
▶ Admin credential abuse
▶ Login frequencies, users moving around quickly
▶ Users failing authentications trying to discover
internal/external resources
Benefit
▶ Uncover unusual login patterns
▶ Track user behavior
Access and Identity
Who, Why and Credential Abuse
Access/Identity
Windows
Security Events:
Active Directory and
Authentication Logs
What You Discover
▶ Who talked to whom, traffic volumes (in/out)
▶ Malware download/delivery, C2, exfiltration
▶ Horizontal and vertical movement
Benefit
▶ Determine how threats got in
▶ Systems and endpoints communicating internally
▶ Detect intellectual property theft, insiders
Network Activity
Detecting Exfiltration and Unusual Communication
Network
Network Access:
ForeScout
Firewall:
Cisco, Palo Alto
Network:
DNS – Splunk Stream,
DNS Server
What You Discover
▶ High risk behaviors and patterns
▶ Undetected/unblocked malware and command & control activities
▶ Known indicators of compromise
Benefit
▶ Early warning of malicious activity
▶ Detect indication of C2 channels
▶ Confirm whether traffic going to compromised or watch-listed sites
▶ Compromised systems communicating with each other
▶ Compromised endpoints
Threat Intelligence
Known and Early Warning Indicators
Threat Intelligence
Threat Feeds:
Public, Free, Private,
Paid or Custom –
ThreatConnect, Anomali
Firewall: Cisco,
Palo Alto Networks
Search and
Investigate
Start Basic.
Other Security-Relevant Data
On-
Premises
Private
Cloud
Public
Cloud
Storage
Online
Shopping Cart
Telecoms
Desktops
Security
Web
Services
Networks
Containers
Web
Clickstreams
RFID
Smartphones
and Devices
Servers
Messaging
GPS
Location
Packaged
Applications
Custom
Applications
Online
Services
DatabasesCall Detail
Records
Energy
Meters
Firewall
Intrusion
Prevention
Dashboards
and Reports
Analytics and
Virtualization
Threat
Intelligence
Platform for Operational Intelligence
Add More Data for More Insights
Threat
Intelligence
Network
Endpoint
Access/Identity
Splunk
Enterprise Security
Demo
Investigation
Possibilities:
▶ Data Breach
▶ Infection(s)
▶ Account Takeover
▶ Application Fault
▶ Misconfiguration
▶ Missing patch
▶ User Error
▶ Other (Ignore)
Alert
Indicator
Data
Security Technologies Are Designed to Detect
Bad/Suspicious Activity
Endpoint
Network
Threat
Intelligence
Access/Identity
Developing an Investigative Mindset
What
happened?
Who was
involved?
When did it
start?
Where was
it seen?
How did it
get in?
How do I
contain it?
ALERT
What
specific
questions
do I want
answered?
Where do I look?What is the
logic / methodology
to apply?
What’s an
example?
If each alert takes
10 min to investigate...
▶ Helps anyone handling alerts
▶ Gain control of posture
• Old way – “escalate or ignore”
• New way – find out what is
actually going on
Importance of an Investigative Mindset
“Investigate” – gather data, analyze, pinpoint digital evidence
* assumes 14 – 28 cases in a shift
If you reduce to 5 minutes
If you handle 100 alerts a month
(5 alerts a day, 20 days in month)
100x10 = 1,000 min/60 = 16 hours
100x5 = 500 min/60 = 8 hours
You get a day back (8 hours)
Splunk
Enterprise Security
Investigations Demo
Operationalize
How Do You Operationalize it All?
Endpoint
Network
Threat
Intelligence
Access/Identity
Single Source of Truth
Endpoint
Network
Threat
Intelligence
Access/Identity
What
happened?
Who was
involved?
When did
it start?
Where was
it seen?
How did it
get in?
How do I
contain it?
Splunk ES Content Updates
Splunk ES Content Updates
Splunk ES Content Updates
Splunk is the Security Nerve Center
© 2018 SPLUNK INC.
Splunk Adaptive Response Initiative
Cloud
Security
Endpoints
Orchestration
WAF & App
Security
Threat Intelligence
Network
Web Proxy
Firewall
Identity and Access
57
Phantom Security Operations Platform
PLATFORMOVERVIEW
AUTOMATION
ORCHESTRATION
COLLABORATION
EVENT
MANAGEMENT
CASE
MANAGEMENT
REPORTING
& METRICS
Integrate your team, processes,
and tools together.
§ Work smarter by automating repetitive tasks allowing analysts
to focus on more mission-critical tasks.
§ Respond faster and reduce dwell times with automated detection,
investigation, and response.
§ Strengthen defenses by integrating existing security infrastructure
together so that each part is an active participant.
Analytics-Driven Security: Portfolio
Premium Solution
Enterprise Security
3rd Party Apps &
Add-ons (590+)
Premium Solution
User Behavior Analytics
Search and
Investigate
Monitoring &
Alerting
Dashboards
and Reports
Incident &
Breach Response
Splunk Security Apps & Add-ons
Network data
RDBMS (any) data Windows host data
Exchange data
Analytics for Hadoop
PCI ComplianceSecurity Essentials
App for AWS
ML Toolkit
Google Cloud
Microsoft Cloud
Windows Infrastructure
Discover
Anomalous
Behavior
Detect Unknown
Threats
Automation &
Orchestration
Threat
Detection
Security
Operations
Platform for Operational Intelligence
Proactive Operations: Start With Top 5 CIS Controls
Organizations that apply just the first five CIS Controls can reduce their risk of cyberattack by around 85 percent.
Implementing all 20 CIS Controls increases the risk reduction to around 94 percent.
SOURCE: Center for Internet Security
https://www.cisecurity.org/critical-controls.cfm
CIS Critical Security Controls
https://splunkbase.splunk.com/app/3064/#/overview
https://www.splunk.com/goto/Top20CSC
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk Enterprise Security
© 2018 SPLUNK INC.
1. Centralize Analysis of Key Activities
2. Use an Investigative Mindset
3. Operationalize Security Processes
Strengthen
Your Security
Posture
ORLANDO, FLORIDA
Walt Disney World Swan and Dolphin Hotels
.conf18:
Monday, October 1 – Thursday, October 4
Splunk University:
Saturday, September 29 – Monday, October 1

More Related Content

PPTX
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
PPTX
SplunkLive! Paris 2018: Plenary Session
PDF
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
PPTX
SplunkLive! Paris 2018: Integrating Metrics and Logs
PPTX
SplunkLive! Paris 2018: Splunk And AI 101
PPTX
SplunkLive! Zurich 2018: Monitoring the End User Experience with Splunk
PPTX
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
PPTX
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
SplunkLive! Paris 2018: Plenary Session
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
SplunkLive! Paris 2018: Integrating Metrics and Logs
SplunkLive! Paris 2018: Splunk And AI 101
SplunkLive! Zurich 2018: Monitoring the End User Experience with Splunk
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...

What's hot (20)

PPTX
Splunk Discovery: Milan 2018 - Intro to Security Analytics Methods
PPTX
SplunkLive! Paris 2018: Intro to Security Analytics Methods
PPTX
Splunk for Enterprise Security Featuring UBA
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PPTX
SplunkLive! Zurich 2018: Intro to Security Analytics Methods
PPTX
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
PPTX
SplunkLive! Paris 2018: Event Management Is Dead
PPTX
SplunkLive! Utrecht - Keynote - Rick Fitz
PPTX
SplunkLive! Paris 2018: Delivering New Visibility And Analytics For IT Operat...
PPTX
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
PPTX
SplunkLive! Munich 2018: Predictive, Proactive, and Collaborative ML with IT ...
PPTX
SplunkLive! Paris 2018: Legacy SIEM to Splunk
PPTX
SplunkLive! Utrecht - Splunk for Security - Monzy Merza
PPTX
Splunk for Enterprise Security and User Behavior Analytics
PPTX
SplunkLive! Munich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
PPTX
SplunkLive! Zurich 2018: Get More From Your Machine Data with Splunk & AI
PPTX
SplunkLive! Frankfurt 2018 - Use Splunk for Incident Response, Orchestration ...
PPTX
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
PPTX
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
Splunk Discovery: Milan 2018 - Intro to Security Analytics Methods
SplunkLive! Paris 2018: Intro to Security Analytics Methods
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
SplunkLive! Zurich 2018: Intro to Security Analytics Methods
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Paris 2018: Event Management Is Dead
SplunkLive! Utrecht - Keynote - Rick Fitz
SplunkLive! Paris 2018: Delivering New Visibility And Analytics For IT Operat...
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
SplunkLive! Munich 2018: Predictive, Proactive, and Collaborative ML with IT ...
SplunkLive! Paris 2018: Legacy SIEM to Splunk
SplunkLive! Utrecht - Splunk for Security - Monzy Merza
Splunk for Enterprise Security and User Behavior Analytics
SplunkLive! Munich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
SplunkLive! Zurich 2018: Get More From Your Machine Data with Splunk & AI
SplunkLive! Frankfurt 2018 - Use Splunk for Incident Response, Orchestration ...
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
Ad

Similar to Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk Enterprise Security (20)

PPTX
Build a Security Portfolio That Strengthens Your Security Posture
PPTX
Splunk EMEA Webinar: Scoping infections and disrupting breaches
PPTX
Splunk for Security Breakout Session
PPTX
SplunkLive! - Splunk for Security
PPTX
Learn how to use an Analytics-Driven SIEM for your Security Operations
PPTX
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
PDF
Splunk for security
PPTX
Security crawl walk run presentation mckay v1 2017
PDF
Splunk Webinar Best Practices für Incident Investigation
PPTX
Security investigation hands-on workshop 2018
PPTX
Security investigation hands on workshop 2018-05
PDF
Webinar: Neues zur Splunk App for Enterprise Security
PPTX
Operationalizing Security Intelligence
PPTX
5 Möglichkeiten zur Verbesserung Ihrer Security
PPTX
Splunk Enterprise Security
PPTX
Exploring Frameworks of Splunk Enterprise Security
PPTX
Exploring Frameworks of Splunk Enterprise Security
PDF
SplunkLive Wellington 2015 - Splunk for Security
PDF
SplunkLive Auckland 2015 - Splunk for Security
PDF
Splunk for Security
Build a Security Portfolio That Strengthens Your Security Posture
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk for Security Breakout Session
SplunkLive! - Splunk for Security
Learn how to use an Analytics-Driven SIEM for your Security Operations
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
Splunk for security
Security crawl walk run presentation mckay v1 2017
Splunk Webinar Best Practices für Incident Investigation
Security investigation hands-on workshop 2018
Security investigation hands on workshop 2018-05
Webinar: Neues zur Splunk App for Enterprise Security
Operationalizing Security Intelligence
5 Möglichkeiten zur Verbesserung Ihrer Security
Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise Security
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
Splunk for Security
Ad

More from Splunk (20)

PDF
Splunk Leadership Forum Wien - 20.05.2025
PDF
Splunk Security Update | Public Sector Summit Germany 2025
PDF
Building Resilience with Energy Management for the Public Sector
PDF
IT-Lagebild: Observability for Resilience (SVA)
PDF
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
PDF
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
PDF
Praktische Erfahrungen mit dem Attack Analyser (gematik)
PDF
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
PDF
Security - Mit Sicherheit zum Erfolg (Telekom)
PDF
One Cisco - Splunk Public Sector Summit Germany April 2025
PDF
.conf Go 2023 - Data analysis as a routine
PDF
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
PDF
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
PDF
.conf Go 2023 - Raiffeisen Bank International
PDF
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
PDF
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
PDF
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
PDF
.conf go 2023 - De NOC a CSIRT (Cellnex)
PDF
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk Leadership Forum Wien - 20.05.2025
Splunk Security Update | Public Sector Summit Germany 2025
Building Resilience with Energy Management for the Public Sector
IT-Lagebild: Observability for Resilience (SVA)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Security - Mit Sicherheit zum Erfolg (Telekom)
One Cisco - Splunk Public Sector Summit Germany April 2025
.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - De NOC a CSIRT (Cellnex)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Machine learning based COVID-19 study performance prediction
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
Teaching material agriculture food technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
The AUB Centre for AI in Media Proposal.docx
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Digital-Transformation-Roadmap-for-Companies.pptx
Machine learning based COVID-19 study performance prediction
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
cuic standard and advanced reporting.pdf
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
Diabetes mellitus diagnosis method based random forest with bat algorithm
Understanding_Digital_Forensics_Presentation.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Teaching material agriculture food technology

Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk Enterprise Security

  • 1. Solve Your Security Challenges with Splunk Enterprise Security Michel Oosterhof | Staff Sales Engineer 16 May 2018
  • 2. During the course of this presentation, we may make forward-looking statements regarding future events or the expected performance of the company. We caution you that such statements reflect our current expectations and estimates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward-looking statements, please review our filings with the SEC. The forward-looking statements made in this presentation are being made as of the time and date of its live presentation. If reviewed after its live presentation, this presentation may not contain current or accurate information. We do not assume any obligation to update any forward looking statements we may make. In addition, any information about our roadmap outlines our general product direction and is subject to change at any time without notice. It is for informational purposes only and shall not be incorporated into any contract or other commitment. Splunk undertakes no obligation either to develop the features or functionality described or to include any such feature or functionality in a future release. Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. ©2018 Splunk Inc. All rights reserved. Forward-Looking Statements THIS SLIDE IS REQUIRED FOR ALL 3 PARTY PRESENTATIONS.
  • 3. © 2018 SPLUNK INC. 1. Common Security Challenges 2. Methods to Strengthen Security Posture 3. How Splunk Can Help What Can You Expect From This Session?
  • 4. Common Security Challenges Cyber Criminals Nation States Insider Threats 100% Valid credentials were used 40 Average # of systems accessed 146 Median # of days before detection 65% Of victims were notified by external entity Source: Mandiant M-Trends Report 2012/2013/2014/2015/2016/2017
  • 7. Endpoint Access/Identity Network Threat Intelligence 4 Ways to Improve Posture Quickly
  • 8. What You Discover ▶ Frequency of application executions, unique applications ▶ Non-corporate approved applications ▶ Known malicious executables Benefit ▶ Visibility into application executions ▶ Understanding of unknown applications – whom and where and frequency Understanding Your Endpoints Processes, File Info/Access, User Activity Endpoints End Point System: Windows Sysmon, Network, File Info Endpoint Security: Virus, Malware, Spyware, Whitelisting, Behaviors
  • 9. What You Discover ▶ Credentials used in multiple locations, or shared by users ▶ Admin credential abuse ▶ Login frequencies, users moving around quickly ▶ Users failing authentications trying to discover internal/external resources Benefit ▶ Uncover unusual login patterns ▶ Track user behavior Access and Identity Who, Why and Credential Abuse Access/Identity Windows Security Events: Active Directory and Authentication Logs
  • 10. What You Discover ▶ Who talked to whom, traffic volumes (in/out) ▶ Malware download/delivery, C2, exfiltration ▶ Horizontal and vertical movement Benefit ▶ Determine how threats got in ▶ Systems and endpoints communicating internally ▶ Detect intellectual property theft, insiders Network Activity Detecting Exfiltration and Unusual Communication Network Network Access: ForeScout Firewall: Cisco, Palo Alto Network: DNS – Splunk Stream, DNS Server
  • 11. What You Discover ▶ High risk behaviors and patterns ▶ Undetected/unblocked malware and command & control activities ▶ Known indicators of compromise Benefit ▶ Early warning of malicious activity ▶ Detect indication of C2 channels ▶ Confirm whether traffic going to compromised or watch-listed sites ▶ Compromised systems communicating with each other ▶ Compromised endpoints Threat Intelligence Known and Early Warning Indicators Threat Intelligence Threat Feeds: Public, Free, Private, Paid or Custom – ThreatConnect, Anomali Firewall: Cisco, Palo Alto Networks
  • 12. Search and Investigate Start Basic. Other Security-Relevant Data On- Premises Private Cloud Public Cloud Storage Online Shopping Cart Telecoms Desktops Security Web Services Networks Containers Web Clickstreams RFID Smartphones and Devices Servers Messaging GPS Location Packaged Applications Custom Applications Online Services DatabasesCall Detail Records Energy Meters Firewall Intrusion Prevention Dashboards and Reports Analytics and Virtualization Threat Intelligence Platform for Operational Intelligence Add More Data for More Insights Threat Intelligence Network Endpoint Access/Identity
  • 15. Possibilities: ▶ Data Breach ▶ Infection(s) ▶ Account Takeover ▶ Application Fault ▶ Misconfiguration ▶ Missing patch ▶ User Error ▶ Other (Ignore) Alert Indicator Data Security Technologies Are Designed to Detect Bad/Suspicious Activity Endpoint Network Threat Intelligence Access/Identity
  • 16. Developing an Investigative Mindset What happened? Who was involved? When did it start? Where was it seen? How did it get in? How do I contain it? ALERT What specific questions do I want answered? Where do I look?What is the logic / methodology to apply? What’s an example?
  • 17. If each alert takes 10 min to investigate... ▶ Helps anyone handling alerts ▶ Gain control of posture • Old way – “escalate or ignore” • New way – find out what is actually going on Importance of an Investigative Mindset “Investigate” – gather data, analyze, pinpoint digital evidence * assumes 14 – 28 cases in a shift If you reduce to 5 minutes If you handle 100 alerts a month (5 alerts a day, 20 days in month) 100x10 = 1,000 min/60 = 16 hours 100x5 = 500 min/60 = 8 hours You get a day back (8 hours)
  • 20. How Do You Operationalize it All? Endpoint Network Threat Intelligence Access/Identity
  • 21. Single Source of Truth Endpoint Network Threat Intelligence Access/Identity What happened? Who was involved? When did it start? Where was it seen? How did it get in? How do I contain it?
  • 22. Splunk ES Content Updates
  • 23. Splunk ES Content Updates
  • 24. Splunk ES Content Updates
  • 25. Splunk is the Security Nerve Center
  • 26. © 2018 SPLUNK INC. Splunk Adaptive Response Initiative Cloud Security Endpoints Orchestration WAF & App Security Threat Intelligence Network Web Proxy Firewall Identity and Access
  • 27. 57 Phantom Security Operations Platform PLATFORMOVERVIEW AUTOMATION ORCHESTRATION COLLABORATION EVENT MANAGEMENT CASE MANAGEMENT REPORTING & METRICS Integrate your team, processes, and tools together. § Work smarter by automating repetitive tasks allowing analysts to focus on more mission-critical tasks. § Respond faster and reduce dwell times with automated detection, investigation, and response. § Strengthen defenses by integrating existing security infrastructure together so that each part is an active participant.
  • 28. Analytics-Driven Security: Portfolio Premium Solution Enterprise Security 3rd Party Apps & Add-ons (590+) Premium Solution User Behavior Analytics Search and Investigate Monitoring & Alerting Dashboards and Reports Incident & Breach Response Splunk Security Apps & Add-ons Network data RDBMS (any) data Windows host data Exchange data Analytics for Hadoop PCI ComplianceSecurity Essentials App for AWS ML Toolkit Google Cloud Microsoft Cloud Windows Infrastructure Discover Anomalous Behavior Detect Unknown Threats Automation & Orchestration Threat Detection Security Operations Platform for Operational Intelligence
  • 29. Proactive Operations: Start With Top 5 CIS Controls Organizations that apply just the first five CIS Controls can reduce their risk of cyberattack by around 85 percent. Implementing all 20 CIS Controls increases the risk reduction to around 94 percent. SOURCE: Center for Internet Security https://www.cisecurity.org/critical-controls.cfm
  • 30. CIS Critical Security Controls https://splunkbase.splunk.com/app/3064/#/overview https://www.splunk.com/goto/Top20CSC
  • 32. © 2018 SPLUNK INC. 1. Centralize Analysis of Key Activities 2. Use an Investigative Mindset 3. Operationalize Security Processes Strengthen Your Security Posture
  • 33. ORLANDO, FLORIDA Walt Disney World Swan and Dolphin Hotels .conf18: Monday, October 1 – Thursday, October 4 Splunk University: Saturday, September 29 – Monday, October 1