Three Considerations To Amplify Your Detection and Response Program
with Mark Dufresne and David Lavinder
Confidential and Proprietary
Who Are We?
Mark Dufresne (@mark_dufresne)
Endgame - Director of Threat
Research and Adversary Prevention
David Lavinder (@dllavinder)
Morphick - Vice President,
Threat Intelligence
Prior: 13 years at NSA, Operations Chief
for Offensive and Defensive Cyber Ops
Prior: 7 years as Air Force Digital Network
Intelligence Principal Intelligence Analyst
Confidential and Proprietary
Topics
§  3 Key Challenges to a Detection and Response Program
–  Advanced TTPs
–  Analytical Tradecraft
–  Detection Methodologies
§  The Morphick / Endgame Approach
–  Beyond IOC/Signature Detection
–  Uncovering the Full Story
–  Integrated Prevention, Detection, and Response
Confidential and Proprietary
Advanced TTPs
§  New Attacks > Existing Defenses
–  Paradigm Shift – Attackers are People
§  Designed to defeat off-the-shelf defense
–  Advanced Evasion Techniques
–  Custom rolled malware
Confidential and Proprietary
§  In-memory Attacks
–  DLL side-loading
–  Malware-less attacks
§  Malicious use of Admin Tools
–  Powershell
–  WMI
The Analytical Tradecraft Gap
Confidential and Proprietary
The Detection Problem
The technology problem:
§  Limited enterprise-wide visibility
§  Complex tools that don’t work well together
§  Static defenses that do not adapt
§  Difficult to deploy and maintain solutions
§  SOC analyst talent shortage
§  Alert fatigue
§  Fighting an asymmetric battle
§  Unprepared for an incident
The people problem:
Confidential and Proprietary
So What Do I Need?
The right tradecraft
armed with
The right technology
Confidential and Proprietary
The Right Technology
§  Detection
–  Beyond IOC/Signature-based detection
§  Visibility
–  Enabling visibility and rapid detection of unknown advanced attackers
§  Prevention
–  Automatically protecting against the vast majority of malicious activity
Confidential and Proprietary
Beyond IOC/Signature-Based Detection
§  Signatures (IOCs) aren’t enough
§  Attackers adjust tools and tradecraft
§  Attackers cycle infrastructure
§  Attackers live off the land
Good for pivoting.
Bad foundation for protection.
WHAT ABOUT THE UNKNOWN?
Confidential and Proprietary
So What Should I Do Instead?
10
Confidential and Proprietary
§  Focused on behaviors/techniques
§  At each stage off the attacker lifecycle
§  Layered and working together
You need a different method of detection
But EVERYONE is Saying “Behavior”
11
Confidential and Proprietary
§  NGAV – malware and exploit prevention
§  But what about bypass and file-less attacks? Only part of the problem

§  Both EDR and NGAV are adding detection of behaviors
§  Capturing process actions and writing rules (IOAs)
§  Still a signature. Still brittle. Vulnerable to bypass.
§  Experts needed for configuration
This is still not the right mix
Gather Visibility – Endpoints and Network
§  You need full visibility on system events and other data
–  Persistence
–  Processes
–  Network
–  Users
–  More
§  A mountain of data doesn’t do you much good without analytics
–  Endgame provides sophisticated analytics to guide the hunt
–  Chatbot guides users through the hunt
–  Robust API allows for flexible and powerful access and
enrichment
Confidential and Proprietary
Gather Visibility - Memory
§  Memory is a permissive environment for attackers. Why?
–  Memory analysis doesn’t scale
–  Need to know what you are looking for (search based)
–  Until now…
§  Endgame technology
–  Patent-pending technology detects stealthy adversaries in
memory in seconds, at scale
–  Detects process hollowing, thread hijacking, module hiding,
and much more
§  Precise identification of suspicious memory and remediation
§  Follow on analytic actions such as extraction of IOCs
Confidential and Proprietary
Behavioral Preventions
§  Exploits – Hardware and Software approaches
§  Macros – Detecting malicious execution of macros
§  Malware – Machine learning (Malwarescore™)
§  Kernel-level technique preventions
–  Atomic-level system state in the presence of malicious behaviors
–  More than streaming rules. Simple configuration, inline and hardened.
§  Ransomware
Layered prevention minimizes adversary’s capability to entrench
Much more than traditional AV
Confidential and Proprietary
The Right Tradecraft
§  Analytical Pivoting
–  Discovering unknowns from knowns, across the kill chain
§  Generate Threat Intelligence
–  Extract as much intel from a positive detection event as possible
§  Harden Defenses
–  Update defenses with new intelligence
Confidential and Proprietary
Visibility Across the Kill Chain
§  A security analyst’s job doesn’t END at detection, it BEGINS there
§  Take that single detection event and explore the kill chain
–  How did it get here?
–  What was it going to do next?
Confidential and Proprietary
Visibility Across the Kill Chain
§  A security analyst’s job doesn’t END at detection, it BEGINS there
§  Take that single detection event and explore the kill chain
–  How did it get here?
–  What was it going to do next?
Confidential and Proprietary
The Power of a Security Analyst
§  Discovering unknowns from knowns
–  Identifying missed detection opportunities
§  Telling the whole story
–  Tracing an event to earlier kill chain steps
§  Then BUILD IT BACK IN
§  The analysis tradecraft is getting lost amongst all the tools
§  Visibility is key, but good tradecraft unlocks the power of that visibility
Confidential and Proprietary
SOLUTION
§  Combination of Technology and Tradecraft
Technology provides layered behavioral prevention
Technology provides visibility and access
Tradecraft finds the remaining adversary
Tradecraft hardens defenses
Confidential and Proprietary
Managed Endpoint Detection and Response (MEDR)
§  Continuous Endpoint Threat Monitoring & Advanced Prevention
§  Full Attack Cycle Threat Detection
§  Proactive, scalable Threat Hunting
§  Detailed Forensic Investigation and Threat Validation
§  NSA-CIRA Accredited Incident Response Services
Best in-class Tech, Wrapped in Best in-class Service
Confidential and Proprietary
Interested in learning more?
Come see us at RSA
§  Endgame Booth, South Hall #1739
§  Morphick Booth, North Hall #5004
Schedule a Demo
§  Endgame
–  Ashwini Almad
–  AAlmad@Endgame.com
§  Morphick
–  Tom Doepker
–  Tom.Doepker@Morphick.com
Confidential and Proprietary

More Related Content

PDF
Dreaming of IoCs Adding Time Context to Threat Intelligence
PDF
Threat Hunting 102: Beyond the Basics
PPTX
Crowd-Sourced Threat Intelligence
PPTX
Bsides 2019 - Intelligent Threat Hunting
PDF
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
PDF
Click and Dragger: Denial and Deception on Android mobile
PDF
Threat hunting 101 by Sandeep Singh
PDF
The Rise of the Purple Team
Dreaming of IoCs Adding Time Context to Threat Intelligence
Threat Hunting 102: Beyond the Basics
Crowd-Sourced Threat Intelligence
Bsides 2019 - Intelligent Threat Hunting
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Click and Dragger: Denial and Deception on Android mobile
Threat hunting 101 by Sandeep Singh
The Rise of the Purple Team

What's hot (20)

PDF
Opsec for security researchers
PPTX
The Diamond Model for Intrusion Analysis - Threat Intelligence
PDF
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
PDF
Analogic Opsec 101
PDF
TTPs for Threat hunting In Oil Refineries
PPTX
Cyber Threat Hunting with Phirelight
PPTX
Threat hunting - Every day is hunting season
PDF
Building a Threat Hunting Practice in the Cloud
PPTX
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
PDF
Threat Hunting
PPT
An Underground education
PDF
What's a MITRE with your Security?
PDF
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PDF
MITRE ATT&CKcon 2018: Helping Your Non-Security Executives Understand ATT&CK ...
PDF
Threat Intelligence Is Like Three Day Potty Training
PDF
Enabling effective hunt teaming and incident response
PDF
From Theory to Practice: How My ATTACK Perspectives Have Changed
PDF
MITRE ATTACKcon Power Hour - October
PPTX
Building a Successful Threat Hunting Program
Opsec for security researchers
The Diamond Model for Intrusion Analysis - Threat Intelligence
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
Analogic Opsec 101
TTPs for Threat hunting In Oil Refineries
Cyber Threat Hunting with Phirelight
Threat hunting - Every day is hunting season
Building a Threat Hunting Practice in the Cloud
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
Threat Hunting
An Underground education
What's a MITRE with your Security?
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Effective Threat Hunting with Tactical Threat Intelligence
MITRE ATT&CKcon 2018: Helping Your Non-Security Executives Understand ATT&CK ...
Threat Intelligence Is Like Three Day Potty Training
Enabling effective hunt teaming and incident response
From Theory to Practice: How My ATTACK Perspectives Have Changed
MITRE ATTACKcon Power Hour - October
Building a Successful Threat Hunting Program
Ad

Viewers also liked (12)

PPTX
Gamification of your Global Information Security Operations Center - RSA 2015
PDF
Forrester Emerging MSSP Wave
PDF
Rapid7 NERC-CIP Compliance Guide
PDF
Le gouvernement électronique au Togo : Etat des lieux et prospectives
PDF
Its Not You Its Me MSSP Couples Counseling
PDF
To MSSP or not to MSSP IISF 2015
PPTX
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
PPTX
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
PPTX
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
PPTX
Key Ingredients for Your MSSP Offering
PDF
Trustwave Cybersecurity Education Catalog
PDF
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Gamification of your Global Information Security Operations Center - RSA 2015
Forrester Emerging MSSP Wave
Rapid7 NERC-CIP Compliance Guide
Le gouvernement électronique au Togo : Etat des lieux et prospectives
Its Not You Its Me MSSP Couples Counseling
To MSSP or not to MSSP IISF 2015
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Key Ingredients for Your MSSP Offering
Trustwave Cybersecurity Education Catalog
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Ad

Similar to Three Considerations To Amplify Your Detection and Response Program (20)

PDF
Security Breakout Session
PDF
Applied cognitive security complementing the security analyst
PDF
Incident Response: How To Prepare
PPTX
Cause 11 im final
PPTX
Cause 11 im final
PPTX
RMS Security Breakfast
PPTX
International Conference on Cyber Security, Hide and Go Seek
PPTX
Hunting before a Known Incident
PPTX
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
PDF
Splunk for Security
PDF
SplunkLive Auckland 2015 - Splunk for Security
PDF
SplunkLive Wellington 2015 - Splunk for Security
PDF
Technical track chris calvert-1 30 pm-issa conference-calvert
PDF
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
PDF
2015 Global APT Summit Matthew Rosenquist
PPTX
Purple Teaming - The Collaborative Future of Penetration Testing
PDF
Sophisticated Attacks vs. Advanced Persistent Security
PDF
Diagnosis SOC-Atrophy: What To Do When Your SOC Is Sick
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PPTX
pbc_devsecops_eastereggs.2022oct06.jt.pptx
Security Breakout Session
Applied cognitive security complementing the security analyst
Incident Response: How To Prepare
Cause 11 im final
Cause 11 im final
RMS Security Breakfast
International Conference on Cyber Security, Hide and Go Seek
Hunting before a Known Incident
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
Technical track chris calvert-1 30 pm-issa conference-calvert
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
2015 Global APT Summit Matthew Rosenquist
Purple Teaming - The Collaborative Future of Penetration Testing
Sophisticated Attacks vs. Advanced Persistent Security
Diagnosis SOC-Atrophy: What To Do When Your SOC Is Sick
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
pbc_devsecops_eastereggs.2022oct06.jt.pptx

Recently uploaded (20)

PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
Configure Apache Mutual Authentication
PPT
What is a Computer? Input Devices /output devices
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
STKI Israel Market Study 2025 version august
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
CloudStack 4.21: First Look Webinar slides
PDF
sustainability-14-14877-v2.pddhzftheheeeee
DOCX
search engine optimization ppt fir known well about this
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
The various Industrial Revolutions .pptx
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
Modernising the Digital Integration Hub
Taming the Chaos: How to Turn Unstructured Data into Decisions
Configure Apache Mutual Authentication
What is a Computer? Input Devices /output devices
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Abstractive summarization using multilingual text-to-text transfer transforme...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
A proposed approach for plagiarism detection in Myanmar Unicode text
STKI Israel Market Study 2025 version august
1 - Historical Antecedents, Social Consideration.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
CloudStack 4.21: First Look Webinar slides
sustainability-14-14877-v2.pddhzftheheeeee
search engine optimization ppt fir known well about this
Benefits of Physical activity for teenagers.pptx
sbt 2.0: go big (Scala Days 2025 edition)
Final SEM Unit 1 for mit wpu at pune .pptx
The various Industrial Revolutions .pptx
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Modernising the Digital Integration Hub

Three Considerations To Amplify Your Detection and Response Program

  • 1. Three Considerations To Amplify Your Detection and Response Program with Mark Dufresne and David Lavinder Confidential and Proprietary
  • 2. Who Are We? Mark Dufresne (@mark_dufresne) Endgame - Director of Threat Research and Adversary Prevention David Lavinder (@dllavinder) Morphick - Vice President, Threat Intelligence Prior: 13 years at NSA, Operations Chief for Offensive and Defensive Cyber Ops Prior: 7 years as Air Force Digital Network Intelligence Principal Intelligence Analyst Confidential and Proprietary
  • 3. Topics §  3 Key Challenges to a Detection and Response Program –  Advanced TTPs –  Analytical Tradecraft –  Detection Methodologies §  The Morphick / Endgame Approach –  Beyond IOC/Signature Detection –  Uncovering the Full Story –  Integrated Prevention, Detection, and Response Confidential and Proprietary
  • 4. Advanced TTPs §  New Attacks > Existing Defenses –  Paradigm Shift – Attackers are People §  Designed to defeat off-the-shelf defense –  Advanced Evasion Techniques –  Custom rolled malware Confidential and Proprietary §  In-memory Attacks –  DLL side-loading –  Malware-less attacks §  Malicious use of Admin Tools –  Powershell –  WMI
  • 5. The Analytical Tradecraft Gap Confidential and Proprietary
  • 6. The Detection Problem The technology problem: §  Limited enterprise-wide visibility §  Complex tools that don’t work well together §  Static defenses that do not adapt §  Difficult to deploy and maintain solutions §  SOC analyst talent shortage §  Alert fatigue §  Fighting an asymmetric battle §  Unprepared for an incident The people problem: Confidential and Proprietary
  • 7. So What Do I Need? The right tradecraft armed with The right technology Confidential and Proprietary
  • 8. The Right Technology §  Detection –  Beyond IOC/Signature-based detection §  Visibility –  Enabling visibility and rapid detection of unknown advanced attackers §  Prevention –  Automatically protecting against the vast majority of malicious activity Confidential and Proprietary
  • 9. Beyond IOC/Signature-Based Detection §  Signatures (IOCs) aren’t enough §  Attackers adjust tools and tradecraft §  Attackers cycle infrastructure §  Attackers live off the land Good for pivoting. Bad foundation for protection. WHAT ABOUT THE UNKNOWN? Confidential and Proprietary
  • 10. So What Should I Do Instead? 10 Confidential and Proprietary §  Focused on behaviors/techniques §  At each stage off the attacker lifecycle §  Layered and working together You need a different method of detection
  • 11. But EVERYONE is Saying “Behavior” 11 Confidential and Proprietary §  NGAV – malware and exploit prevention §  But what about bypass and file-less attacks? Only part of the problem §  Both EDR and NGAV are adding detection of behaviors §  Capturing process actions and writing rules (IOAs) §  Still a signature. Still brittle. Vulnerable to bypass. §  Experts needed for configuration This is still not the right mix
  • 12. Gather Visibility – Endpoints and Network §  You need full visibility on system events and other data –  Persistence –  Processes –  Network –  Users –  More §  A mountain of data doesn’t do you much good without analytics –  Endgame provides sophisticated analytics to guide the hunt –  Chatbot guides users through the hunt –  Robust API allows for flexible and powerful access and enrichment Confidential and Proprietary
  • 13. Gather Visibility - Memory §  Memory is a permissive environment for attackers. Why? –  Memory analysis doesn’t scale –  Need to know what you are looking for (search based) –  Until now… §  Endgame technology –  Patent-pending technology detects stealthy adversaries in memory in seconds, at scale –  Detects process hollowing, thread hijacking, module hiding, and much more §  Precise identification of suspicious memory and remediation §  Follow on analytic actions such as extraction of IOCs Confidential and Proprietary
  • 14. Behavioral Preventions §  Exploits – Hardware and Software approaches §  Macros – Detecting malicious execution of macros §  Malware – Machine learning (Malwarescore™) §  Kernel-level technique preventions –  Atomic-level system state in the presence of malicious behaviors –  More than streaming rules. Simple configuration, inline and hardened. §  Ransomware Layered prevention minimizes adversary’s capability to entrench Much more than traditional AV Confidential and Proprietary
  • 15. The Right Tradecraft §  Analytical Pivoting –  Discovering unknowns from knowns, across the kill chain §  Generate Threat Intelligence –  Extract as much intel from a positive detection event as possible §  Harden Defenses –  Update defenses with new intelligence Confidential and Proprietary
  • 16. Visibility Across the Kill Chain §  A security analyst’s job doesn’t END at detection, it BEGINS there §  Take that single detection event and explore the kill chain –  How did it get here? –  What was it going to do next? Confidential and Proprietary
  • 17. Visibility Across the Kill Chain §  A security analyst’s job doesn’t END at detection, it BEGINS there §  Take that single detection event and explore the kill chain –  How did it get here? –  What was it going to do next? Confidential and Proprietary
  • 18. The Power of a Security Analyst §  Discovering unknowns from knowns –  Identifying missed detection opportunities §  Telling the whole story –  Tracing an event to earlier kill chain steps §  Then BUILD IT BACK IN §  The analysis tradecraft is getting lost amongst all the tools §  Visibility is key, but good tradecraft unlocks the power of that visibility Confidential and Proprietary
  • 19. SOLUTION §  Combination of Technology and Tradecraft Technology provides layered behavioral prevention Technology provides visibility and access Tradecraft finds the remaining adversary Tradecraft hardens defenses Confidential and Proprietary
  • 20. Managed Endpoint Detection and Response (MEDR) §  Continuous Endpoint Threat Monitoring & Advanced Prevention §  Full Attack Cycle Threat Detection §  Proactive, scalable Threat Hunting §  Detailed Forensic Investigation and Threat Validation §  NSA-CIRA Accredited Incident Response Services Best in-class Tech, Wrapped in Best in-class Service Confidential and Proprietary
  • 21. Interested in learning more? Come see us at RSA §  Endgame Booth, South Hall #1739 §  Morphick Booth, North Hall #5004 Schedule a Demo §  Endgame –  Ashwini Almad –  AAlmad@Endgame.com §  Morphick –  Tom Doepker –  Tom.Doepker@Morphick.com Confidential and Proprietary