Taking Action on Your Security Alerts
Today’s Speakers
Jack Naglieri
Founder, CEO
Thomas Kinsella
Co-Founder, COO
8+ years in Detection and Response
Ex-Airbnb and Yahoo
Co-creator of StreamAlert
8+ years in Security Operations
Ex-DocuSign and eBay
Security teams must leverage automation
to keep up with continuously growing
attack surfaces and data volumes
The Problem
Teams can utilize Panther for security
analytics and Tines for automated security
response at cloud-scale
A Path Forward
● Keep your team focused
● Avoid team burnout
● Modular, repeatable, tailored
● Scalable! Built for the cloud
Benefits of this Approach
Automating Detection and Response
Collect
Parse, normalize,
and store for
analytics
Detect
Apply real-time
Python detections
on logs
Alert
Fire off alerts to
Tines for automated
response and triage
Respond
Ping users for more
information, hit
external APIs, take
automated action
Investigate
Only triage and
investigate high-
confident alerts
01
Scenario 1
SSO Monitoring
Scenario 1: Monitor admin assignment in Okta
Scenario 1 - Collect the Logs
Scenario 1 - Collect the Logs
Scenario 1 - Normalize
Scenario 1 - Understand the Logs
Scenario 1 - Write a Detection
Detection Logic
Alerting and
Grouping
Scenario 1 - Activity
Scenario 1 - Initial Alert
Scenario 1 - Responding to Alerts
Incoming Alerts
Scenario 1 - Responding to Alerts
● Pass Alert Context
● Parameterized
requests
● Shared API
credentials
● Templates for 150+
tools, but trivial to
edit to make your
own calls
Scenario 1 - Configuring Stories
Scenario 1 - Analyzing API Responses
Scenario 1 - Ping Users
Scenario 1 - Create a Case
Scenario 1 - Recap
● Flexible Detections
● Data Lake for Analytics
● Get context on initial signal with VirusTotal
● Ping employees to validate activity
● Automate remediation and containment
● Create repeatable Stories and workflows
02
Scenario 2
Alert Post-Processing
Scenario 2: Alert Enrichment and Post-Processing
Scenario 2 - Initial Alert
Scenario 2 - Initial Alert
Scenario 2 - Alert Context
Scenario 2 - Enrichment
Scenario 2 - Data Schemas
● Panther normalizes data based on a schema
● Enables detection, analytics, and storage
● YML declaration in the UI
Scenario 2 - Post-Processing
Scenario 2 - Alert
Scenario 2 - Searching Data
Scenario 2 - Recap
● Flag initial activity
● Send to Tines for automating lookups
● Use a repeatable ‘Send to Story’ to analyze IP
● Feedback into Panther via S3
● Post-process with Python
● Store in SQL for a history of records
03
Wrapping Up
Automate all of the things!
● High-scale data processing and analytics
● Detections as Code
● Automated Response
● Plug into commonly used security APIs
● Kick-start your investigations
● Tailored to fit your needs
● Flexible deployments
Better Together
Get Started
Join Panther & Tines Community
We can't wait to see what you build!
slack.runpanther.io
github.com/panther-labs/panther
sales@runpanther.io
tines.io/slack
tines.io/community-edition
sales@tines.io
Be sure to check out our
blog.runpanther.io!
04
Q & A
Thank You

More Related Content

PPTX
Threat Hunting at Scale
PPTX
Customer Story: Scaling Security With Detections-as-Code
PPTX
Cloud Security 101 (Webinar Deck)
PPTX
Panther 101: Bootstrapping Your Cloud SIEM (Webinar Deck)
PPTX
Detecting s3 breaches with panther slide deck
PPTX
How to Implement Snowflake Security Best Practices with Panther
PPTX
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
PDF
Incident response-in-the-cloud
Threat Hunting at Scale
Customer Story: Scaling Security With Detections-as-Code
Cloud Security 101 (Webinar Deck)
Panther 101: Bootstrapping Your Cloud SIEM (Webinar Deck)
Detecting s3 breaches with panther slide deck
How to Implement Snowflake Security Best Practices with Panther
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
Incident response-in-the-cloud

What's hot (20)

PPTX
Threat Hunting with Splunk
PPTX
Open Source Malware Lab
PDF
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
PDF
Sqrrl May Webinar: Data-Centric Security
PPTX
Detecting and Blocking Suspicious Internal Network Traffic
PPTX
#ALSummit: Cyber Resiliency: Surviving the Breach
PPTX
Episode IV: A New Scope
PDF
Save Time and Act Faster with Playbooks
PPTX
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic Webinar
PDF
MITRE ATT&CKcon 2018: VCAF: Expanding the ATT&CK Framework to cover VERIS Thr...
PPTX
Threat Hunting with Splunk
PPTX
Lacework AWS Security Week Presentation
PPTX
Threat Hunting for Command and Control Activity
PPTX
#ALSummit: Architecting Security into your AWS Environment
PDF
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
PPTX
RSA 2018: Recon For the Defender - You know nothing (about your assets)
PDF
How Google Protects Its Corporate Security Perimeter without Firewalls
PDF
Threat Hunting Workshop
PPTX
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
PDF
Fighting cybersecurity threats with Apache Spot
Threat Hunting with Splunk
Open Source Malware Lab
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
Sqrrl May Webinar: Data-Centric Security
Detecting and Blocking Suspicious Internal Network Traffic
#ALSummit: Cyber Resiliency: Surviving the Breach
Episode IV: A New Scope
Save Time and Act Faster with Playbooks
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic Webinar
MITRE ATT&CKcon 2018: VCAF: Expanding the ATT&CK Framework to cover VERIS Thr...
Threat Hunting with Splunk
Lacework AWS Security Week Presentation
Threat Hunting for Command and Control Activity
#ALSummit: Architecting Security into your AWS Environment
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
RSA 2018: Recon For the Defender - You know nothing (about your assets)
How Google Protects Its Corporate Security Perimeter without Firewalls
Threat Hunting Workshop
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
Fighting cybersecurity threats with Apache Spot
Ad

Similar to Taking Action on Your Security Alerts with Panther and Tines (20)

PDF
Speaker0 session7874 1
PDF
Automated Cloud-Native Incident Response with Kubernetes and Service Mesh
PPTX
Customer Presentation with a Healthcare Company
PPTX
SplunkLive! Customer Presentation – HCA
PPTX
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
PDF
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
PPTX
OWASP Poland Day 2018 - Ralf Kempf - SAP Security - Detecting the hand still ...
PDF
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
PDF
A practical look at how to build & run IoT business logic
PPTX
Security Analytics for Data Discovery - Closing the SIEM Gap
PDF
Threat detection with 0 cost
PDF
Dev opsdays 2018 - Observability, the practical approach
PPTX
Observability, the practical approach - Anton Drukh - DevOpsDays Tel Aviv 2018
PPTX
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
PPTX
VALEO.pptx
PDF
Monitoring
PDF
Visualization in the Age of Big Data
PPTX
Security Automation & Orchestration
PPTX
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
PPTX
ISO 27k talk for django meet up
Speaker0 session7874 1
Automated Cloud-Native Incident Response with Kubernetes and Service Mesh
Customer Presentation with a Healthcare Company
SplunkLive! Customer Presentation – HCA
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
OWASP Poland Day 2018 - Ralf Kempf - SAP Security - Detecting the hand still ...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
A practical look at how to build & run IoT business logic
Security Analytics for Data Discovery - Closing the SIEM Gap
Threat detection with 0 cost
Dev opsdays 2018 - Observability, the practical approach
Observability, the practical approach - Anton Drukh - DevOpsDays Tel Aviv 2018
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
VALEO.pptx
Monitoring
Visualization in the Age of Big Data
Security Automation & Orchestration
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
ISO 27k talk for django meet up
Ad

Recently uploaded (20)

PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPT
Geologic Time for studying geology for geologist
PDF
Architecture types and enterprise applications.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
The various Industrial Revolutions .pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Five Habits of High-Impact Board Members
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPT
What is a Computer? Input Devices /output devices
Chapter 5: Probability Theory and Statistics
Web Crawler for Trend Tracking Gen Z Insights.pptx
Geologic Time for studying geology for geologist
Architecture types and enterprise applications.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
Final SEM Unit 1 for mit wpu at pune .pptx
observCloud-Native Containerability and monitoring.pptx
Hindi spoken digit analysis for native and non-native speakers
Enhancing emotion recognition model for a student engagement use case through...
Tartificialntelligence_presentation.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
The various Industrial Revolutions .pptx
Module 1.ppt Iot fundamentals and Architecture
A novel scalable deep ensemble learning framework for big data classification...
Group 1 Presentation -Planning and Decision Making .pptx
Getting started with AI Agents and Multi-Agent Systems
Five Habits of High-Impact Board Members
Zenith AI: Advanced Artificial Intelligence
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
What is a Computer? Input Devices /output devices

Taking Action on Your Security Alerts with Panther and Tines

  • 1. Taking Action on Your Security Alerts
  • 2. Today’s Speakers Jack Naglieri Founder, CEO Thomas Kinsella Co-Founder, COO 8+ years in Detection and Response Ex-Airbnb and Yahoo Co-creator of StreamAlert 8+ years in Security Operations Ex-DocuSign and eBay
  • 3. Security teams must leverage automation to keep up with continuously growing attack surfaces and data volumes The Problem
  • 4. Teams can utilize Panther for security analytics and Tines for automated security response at cloud-scale A Path Forward
  • 5. ● Keep your team focused ● Avoid team burnout ● Modular, repeatable, tailored ● Scalable! Built for the cloud Benefits of this Approach
  • 6. Automating Detection and Response Collect Parse, normalize, and store for analytics Detect Apply real-time Python detections on logs Alert Fire off alerts to Tines for automated response and triage Respond Ping users for more information, hit external APIs, take automated action Investigate Only triage and investigate high- confident alerts
  • 8. Scenario 1: Monitor admin assignment in Okta
  • 9. Scenario 1 - Collect the Logs
  • 10. Scenario 1 - Collect the Logs
  • 11. Scenario 1 - Normalize
  • 12. Scenario 1 - Understand the Logs
  • 13. Scenario 1 - Write a Detection Detection Logic Alerting and Grouping
  • 14. Scenario 1 - Activity
  • 15. Scenario 1 - Initial Alert
  • 16. Scenario 1 - Responding to Alerts Incoming Alerts
  • 17. Scenario 1 - Responding to Alerts
  • 18. ● Pass Alert Context ● Parameterized requests ● Shared API credentials ● Templates for 150+ tools, but trivial to edit to make your own calls Scenario 1 - Configuring Stories
  • 19. Scenario 1 - Analyzing API Responses
  • 20. Scenario 1 - Ping Users
  • 21. Scenario 1 - Create a Case
  • 22. Scenario 1 - Recap ● Flexible Detections ● Data Lake for Analytics ● Get context on initial signal with VirusTotal ● Ping employees to validate activity ● Automate remediation and containment ● Create repeatable Stories and workflows
  • 24. Scenario 2: Alert Enrichment and Post-Processing
  • 25. Scenario 2 - Initial Alert
  • 26. Scenario 2 - Initial Alert
  • 27. Scenario 2 - Alert Context
  • 28. Scenario 2 - Enrichment
  • 29. Scenario 2 - Data Schemas ● Panther normalizes data based on a schema ● Enables detection, analytics, and storage ● YML declaration in the UI
  • 30. Scenario 2 - Post-Processing
  • 31. Scenario 2 - Alert
  • 32. Scenario 2 - Searching Data
  • 33. Scenario 2 - Recap ● Flag initial activity ● Send to Tines for automating lookups ● Use a repeatable ‘Send to Story’ to analyze IP ● Feedback into Panther via S3 ● Post-process with Python ● Store in SQL for a history of records
  • 35. Automate all of the things! ● High-scale data processing and analytics ● Detections as Code ● Automated Response ● Plug into commonly used security APIs ● Kick-start your investigations ● Tailored to fit your needs ● Flexible deployments Better Together
  • 36. Get Started Join Panther & Tines Community We can't wait to see what you build! slack.runpanther.io github.com/panther-labs/panther sales@runpanther.io tines.io/slack tines.io/community-edition sales@tines.io
  • 37. Be sure to check out our blog.runpanther.io!