SlideShare a Scribd company logo
1 | © 2018 Interset Software
Name, Title
Date
Supercharging
Security with
Behavioral Analytics
September 19, 2018
2 | © 2018 Interset Software
Today’s Panel
STEPHAN JOU
Chief Technology Officer
PAUL REID
Security Strategist
Special Guest
JOSEPH BLANKENSHIP
Principal Analyst
3 | © 2018 Interset Software
Why Does Security Need Analytics?
4© 2018 FORRESTER. REPRODUCTION PROHIBITED.
Biggest Security Challenges
Base: 1,502 Security decision-makers
Source: Forrester Data Global Business Technographics Security Survey, 2018
19%
21%
21%
21%
22%
23%
24%
25%
26%
28%
29%
34%
Lack of empowerment to make security decisions
Lack of visibility and influence within the organization
Other priorities in the organization taking precedence over…
Inability to measure the effectiveness of our security program
Unavailability of security employees with the right skills
Building a culture of data stewardship
Lack of staff (the security team is understaffed)
Lack of budget
Day-to-day tactical activities taking up too much time
Compliance with new privacy laws
Changing/evolving nature of IT threats (internal and external)
Complexity of our IT environment
Which of the following are the biggest IT security challenges for
your firm?
5© 2018 FORRESTER. REPRODUCTION PROHIBITED.
56% of Firms Were Breached in the Last 12 Months
1Base: 1,147 Network Path Security decision-makers who have experienced a breach in the past 12 months
Source: Forrester's Business Technographics Global Security Survey, 2018
External
attack
41%
Internal Attack
23%
Third-party
Incident
21%
Lost/stolen
asset
15%
Causes of confirmed breaches in the past 12
months
In these cases 35% were due
to software exploits, 36% were
due to web application attack,
and 22% due to stolen
credentials
In these cases 55% were due
to malicious intent, 38% were
due to inadvertent misuse,
and 7% were a combination
of both
6© 2018 FORRESTER. REPRODUCTION PROHIBITED.
Top 5 Data Types Breached
Base: 546 Network Path Security decision-makers who have experienced a breach in the past 12 months
Source: Forrester Data Global Business Technographics Security Survey, 2018
27%
27%
28%
29%
33%
Authentication credentials (user IDs and
passwords, other forms of credentials)
Account numbers
Payment/credit card data
Intellectual property
Personally identifiable information (name, address,
phone, Social Security number)
"What types of data were potentially compromised or breached in the past
12 months?"
(Multiple responses accepted)
7© 2018 FORRESTER. REPRODUCTION PROHIBITED.
Too Many Alerts / Too Few Analysts
Source: Forrester’s Security Operations Center (SOC) Staffing
8© 2018 FORRESTER. REPRODUCTION PROHIBITED.
We Need a New Set of Tools
› Rules based SIM hasn’t proven effective
• Too many alerts, too many false positives
• Difficult to maintain
• Only finds known threats
› Effective security analytics tools:
• Use data science to detect anomalous behavior
• Utilize internal and external threat intelligence
• Examine historical data
• Detect data exfiltration
• Provide increased security context for responders
• Enable investigations and response
9© 2018 FORRESTER. REPRODUCTION PROHIBITED.
The Security Analytics Ecosystem
10© 2018 FORRESTER. REPRODUCTION PROHIBITED.
The Security Analytics Ecosystem
Source: Forrester’s Vendor Landscape: Security Analytics (SA)
11© 2018 FORRESTER. REPRODUCTION PROHIBITED.
Evolution of Security Analytics
Perimeter Defense
• Focus on network security
• Event filtering and basic correlation
• Log management and retention
• Events per second: <5,000
• Storage: gigabytes
• Manual breach response
• High false positive rate, limited scalability
Compliance
• Reporting
• Information sources: various log formats
(still log focused)
• Advanced correlation
• Signature-based alerting
• Increasing devices: >1,000
• Events per second: >10,000
• Storage: terabytes
• Focus on threat detection and response,
breach response still slow, highly
dependent on security analyst skills
Enterprise Security Intelligence
• Log management
• Feeds from applications, databases,
endpoints
• Threat detection
• More robust IAM integration
• Advanced analytics with additional
security context
• User and network behavior
• Feeds from additional sources: multiple
log sources, NetFlow, reputation data,
threat intelligence feeds
• Huge number of devices: >5,000
• Events per second: >100,000
• Storage: petabytes – Big Data
infrastructure
• Near real-time breach response, same
day remediation
Sophistication,volume,velocityandcomplexity
1995 – 2000 (SEM)
2005 – 2014 (SIM)
2014+ Security Analytics
12© 2018 FORRESTER. REPRODUCTION PROHIBITED.
Defining Security Analytics
A platform built on big data infrastructure to converge logging, correlating, and
reporting feeds from security information management (SIM), security solutions,
network flow data, external threat intelligence, and diverse endpoints and
applications. The SA platform uses this information and machine learning
techniques to provide real-time monitoring and facilitate the rapid incident
detection, analysis, and response.
Source: Forrester’s Counteract Cyberattacks With Security Analytics
13© 2018 FORRESTER. REPRODUCTION PROHIBITED.
Security User Behavior Analytics (SUBA)
› Detects anomalous user and device behavior
• Ingests endpoint, network, and host log data
• Uses machine learning techniques to detect suspicious behavior
• Alerts on abnormal activity
• Deploys as a SIM supplement in many cases
SUBA is often the first technology
organizations think of when starting an
insider threat team.
14© 2018 FORRESTER. REPRODUCTION PROHIBITED.
Defining SUBA
Functionality that enables security and risk teams to build a unified view of users'
actions across the network. SUBA collects and correlates detailed information
about user activity from a variety of logs and other data sources to heuristically
and automatically set a user activity baseline from which it can detect, risk score,
prioritize, intercept, and enable the investigation of anomalous behavior in real
time.
Source: Forrester’s Market Overview: Security User Behavior Analytics (SUBA), 2016 report
15 | © 2018 Interset Software
Interset’s behavioral analytics allows for detection of anomalies, complementing the
pattern matching of rules and thresholds for policy enforcement and the machine
learning of malware detection.
Interset Augments Your Security Ecosystem
16 | © 2018 Interset Software
How Does Interset Do This?
17 | © 2018 Interset Software
Machine Learning is Everywhere…
I’m
smart!
Super machine
learning!The best
Bayesian! Buy me!
I do it all!
18 | © 2018 Interset Software
Two Categories of Machine Learning Algorithms
Bu
y
me!
Supe
r ML!
The best
Bayesian
!
I
do it
all!
Classification
Support Vector Machines
Discriminant Analysis
Naive Bayes
Nearest Neighbor
Regression
Linear Regression | GLM
SVR | GPR
Ensemble Methods
Decision Trees
Neural Networks
Clustering
K-means | Fuzzy C-means
Hidden Markov Model
Neural Networks
Hierarchical
Guassian Mixture
Supervised Unsupervised
19 | © 2018 Interset Software
Cybersecurity: Supervised Machine Learning Approach
Ideal for finding malware
▪ Decades of data to study
▪ Always looks the same no
matter where it manifests
“Tell me what I’m looking for…”
20 | © 2018 Interset Software
When searching for insider threats, how do you determine what is productive or
malicious activity within your enterprise?
The activities related to insider threats are masked by behavior that, when removed from
context, present as benign. This means we cannot simply match a pattern or look for a
signature—we have to take a different approach that separates abnormal from normal.
▪ Working at midnight?
▪ Attaching 500MB to an email?
▪ Looking at corporate strategy data?
▪ Checking out software code from Project X?
▪ A machine communicating on port 465?
▪ Machine A & B connecting via HTTP?
▪ Printer “P015” printing 50 pages at noon?
▪ cmd.exe launched on a workstation?
Cybersecurity: Unsupervised Machine Learning Approach
21 | © 2018 Interset Software
What are the ”MOST WANTED” Insider Threats?
Compromised
Account
Infected Host Account Misuse Data Staging
Low & Slow
Attacks
Unauthorized
Print Job
Fileless Malware Zero-day Attack
Not all insider threats are internal employees or disgruntled personnel.
22 | © 2018 Interset Software
How Does Security Analytics Impact
the SOC?
23© 2018 FORRESTER. REPRODUCTION PROHIBITED.
SA Enables SOC Processes
› Monitoring and alerting
› Event correlation
› Alert triage
› Incident response
› Threat hunting
24 | © 2018 Interset Software
How Does Interset Change SOC Operations and Threat Hunting?
25 | © 2018 Interset Software
Interset Security Analytics Dashboard: Top Risky Entities
26 | © 2018 Interset Software
Interset Security Analytics Dashboard: Anomalous Behavior
27© 2018 FORRESTER. REPRODUCTION PROHIBITED.
Considerations for Selecting An SA Solution
› Monitoring requirements
› Data sources
› Out of the box content
› Scalability
› Threat intelligence sources
› Size of security staff
› Security team maturity
› Compliance needs
28© 2018 FORRESTER. REPRODUCTION PROHIBITED.
Wrap-Up
› Security teams lack the speed and agility to stop breaches
• Inadequate tools and slow, manual processes impede progress
› Rules-based SIM alone not able to detect anomalous behavior
• Combination of capabilities enabling better threat detection and response
› We have to make better, faster security decisions
• Security analytics tools help make that happen
• Analysts require analytics to speed detection and enable threat hunting
29 | © 2018 Interset Software
Questions?
30 | © 2018 Interset Software
Want to learn more? Contact us!
STEPHAN JOU
CTO, Interset
sjou@interset.com
@eeksock
PAUL REID
Security Strategist, Interest
preid@interset.com
JOSEPH BLANKENSHIP
Principal Analyst, Forrester
jblankenship@forrester.com
@infosec_jb
31 | © 2018 Interset Software
Thank You!
Learn more at Interset.AI

More Related Content

PDF
WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
PDF
Cybersecurity Series SEIM Log Analysis
PPTX
How to Improve Threat Detection & Simplify Security Operations
PDF
How can i find my security blind spots ulf mattsson - aug 2016
PDF
How to Operationalize Big Data Security Analytics
PPTX
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
PPT
Big Data, Security Intelligence, (And Why I Hate This Title)
PDF
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
Cybersecurity Series SEIM Log Analysis
How to Improve Threat Detection & Simplify Security Operations
How can i find my security blind spots ulf mattsson - aug 2016
How to Operationalize Big Data Security Analytics
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Big Data, Security Intelligence, (And Why I Hate This Title)
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...

What's hot (20)

PDF
How can i find my security blind spots in Oracle - nyoug - sep 2016
PPTX
Big Data Analytics for Cyber Security: A Quick Overview
PDF
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
PDF
IT Executive Guide to Security Intelligence
PDF
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
PPTX
Vendor Landscape: Email Security Gateway
PDF
Building an effective Information Security Roadmap
PPTX
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
PPTX
Marc Crudgington Who I Am
PPTX
Security Analytics and Big Data: What You Need to Know
PPTX
Automation: Embracing the Future of SecOps
PPTX
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
PPTX
Are You Ready to Move Your IAM to the Cloud?
PDF
Cybersecurity Roadmap Development for Executives
PPTX
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
PDF
IYeste - Nova - ISEC695 - Final
PPTX
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
PPTX
Top 5 Things to Look for in an IPS Solution
PDF
Machine Learning + AI for Accelerated Threat-Hunting
PDF
Next generation security analytics
How can i find my security blind spots in Oracle - nyoug - sep 2016
Big Data Analytics for Cyber Security: A Quick Overview
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
IT Executive Guide to Security Intelligence
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
Vendor Landscape: Email Security Gateway
Building an effective Information Security Roadmap
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Marc Crudgington Who I Am
Security Analytics and Big Data: What You Need to Know
Automation: Embracing the Future of SecOps
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Are You Ready to Move Your IAM to the Cloud?
Cybersecurity Roadmap Development for Executives
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
IYeste - Nova - ISEC695 - Final
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Top 5 Things to Look for in an IPS Solution
Machine Learning + AI for Accelerated Threat-Hunting
Next generation security analytics
Ad

Similar to [Webinar] Supercharging Security with Behavioral Analytics (20)

PPTX
Operationalizing Big Data Security Analytics - IANS Forum Dallas
PDF
Interset-advanced threat detection wp
PDF
How to Operationalize Big Data Security Analytics
PPTX
A New Approach to Threat Detection: Big Data Security Analytics
PPTX
Data Connectors San Antonio Cybersecurity Conference 2018
PPTX
RSA 2016 Security Analytics Presentation
PPTX
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
PPTX
Operational Security Intelligence
PDF
From SIEM to SA: The Path Forward
 
PDF
Big Data Analytics to Enhance Security
PDF
Demystifying Security Analytics: Data, Methods, Use Cases
PDF
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
PPTX
Splunk for Security Breakout Session
PDF
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
PDF
Changing the Security Monitoring Status Quo
 
PDF
Before the Breach: Using threat intelligence to stop attackers in their tracks
PDF
Accelerating Enhanced Threat Identification and Incident Investigation
PDF
Threat Ready Data: Protect Data from the Inside and the Outside
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PDF
Not becoming the next cybersecurity headline is difficult, very difficult - S...
Operationalizing Big Data Security Analytics - IANS Forum Dallas
Interset-advanced threat detection wp
How to Operationalize Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics
Data Connectors San Antonio Cybersecurity Conference 2018
RSA 2016 Security Analytics Presentation
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
Operational Security Intelligence
From SIEM to SA: The Path Forward
 
Big Data Analytics to Enhance Security
Demystifying Security Analytics: Data, Methods, Use Cases
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
Splunk for Security Breakout Session
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Changing the Security Monitoring Status Quo
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Accelerating Enhanced Threat Identification and Incident Investigation
Threat Ready Data: Protect Data from the Inside and the Outside
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Not becoming the next cybersecurity headline is difficult, very difficult - S...
Ad

More from Interset (13)

PDF
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
PDF
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
PDF
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
PPTX
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
PDF
DataWorks 2018: How Big Data and AI Saved the Day
PPTX
IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
PPTX
Webinar: Will the Real AI Please Stand Up?
PPTX
IANS Forum Dallas - Technology Spotlight Session
PPTX
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
PDF
Infographic: Inside Data Breaches
PDF
User and Entity Behavioral Analytics
PDF
Lead On: When More Data Becomes Less Work
PDF
The Myths + Realities of Machine-Learning Cybersecurity
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
DataWorks 2018: How Big Data and AI Saved the Day
IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
Webinar: Will the Real AI Please Stand Up?
IANS Forum Dallas - Technology Spotlight Session
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
Infographic: Inside Data Breaches
User and Entity Behavioral Analytics
Lead On: When More Data Becomes Less Work
The Myths + Realities of Machine-Learning Cybersecurity

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation theory and applications.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Electronic commerce courselecture one. Pdf
PPT
Teaching material agriculture food technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Big Data Technologies - Introduction.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Unlocking AI with Model Context Protocol (MCP)
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
Understanding_Digital_Forensics_Presentation.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation theory and applications.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Per capita expenditure prediction using model stacking based on satellite ima...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Electronic commerce courselecture one. Pdf
Teaching material agriculture food technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Big Data Technologies - Introduction.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”

[Webinar] Supercharging Security with Behavioral Analytics

  • 1. 1 | © 2018 Interset Software Name, Title Date Supercharging Security with Behavioral Analytics September 19, 2018
  • 2. 2 | © 2018 Interset Software Today’s Panel STEPHAN JOU Chief Technology Officer PAUL REID Security Strategist Special Guest JOSEPH BLANKENSHIP Principal Analyst
  • 3. 3 | © 2018 Interset Software Why Does Security Need Analytics?
  • 4. 4© 2018 FORRESTER. REPRODUCTION PROHIBITED. Biggest Security Challenges Base: 1,502 Security decision-makers Source: Forrester Data Global Business Technographics Security Survey, 2018 19% 21% 21% 21% 22% 23% 24% 25% 26% 28% 29% 34% Lack of empowerment to make security decisions Lack of visibility and influence within the organization Other priorities in the organization taking precedence over… Inability to measure the effectiveness of our security program Unavailability of security employees with the right skills Building a culture of data stewardship Lack of staff (the security team is understaffed) Lack of budget Day-to-day tactical activities taking up too much time Compliance with new privacy laws Changing/evolving nature of IT threats (internal and external) Complexity of our IT environment Which of the following are the biggest IT security challenges for your firm?
  • 5. 5© 2018 FORRESTER. REPRODUCTION PROHIBITED. 56% of Firms Were Breached in the Last 12 Months 1Base: 1,147 Network Path Security decision-makers who have experienced a breach in the past 12 months Source: Forrester's Business Technographics Global Security Survey, 2018 External attack 41% Internal Attack 23% Third-party Incident 21% Lost/stolen asset 15% Causes of confirmed breaches in the past 12 months In these cases 35% were due to software exploits, 36% were due to web application attack, and 22% due to stolen credentials In these cases 55% were due to malicious intent, 38% were due to inadvertent misuse, and 7% were a combination of both
  • 6. 6© 2018 FORRESTER. REPRODUCTION PROHIBITED. Top 5 Data Types Breached Base: 546 Network Path Security decision-makers who have experienced a breach in the past 12 months Source: Forrester Data Global Business Technographics Security Survey, 2018 27% 27% 28% 29% 33% Authentication credentials (user IDs and passwords, other forms of credentials) Account numbers Payment/credit card data Intellectual property Personally identifiable information (name, address, phone, Social Security number) "What types of data were potentially compromised or breached in the past 12 months?" (Multiple responses accepted)
  • 7. 7© 2018 FORRESTER. REPRODUCTION PROHIBITED. Too Many Alerts / Too Few Analysts Source: Forrester’s Security Operations Center (SOC) Staffing
  • 8. 8© 2018 FORRESTER. REPRODUCTION PROHIBITED. We Need a New Set of Tools › Rules based SIM hasn’t proven effective • Too many alerts, too many false positives • Difficult to maintain • Only finds known threats › Effective security analytics tools: • Use data science to detect anomalous behavior • Utilize internal and external threat intelligence • Examine historical data • Detect data exfiltration • Provide increased security context for responders • Enable investigations and response
  • 9. 9© 2018 FORRESTER. REPRODUCTION PROHIBITED. The Security Analytics Ecosystem
  • 10. 10© 2018 FORRESTER. REPRODUCTION PROHIBITED. The Security Analytics Ecosystem Source: Forrester’s Vendor Landscape: Security Analytics (SA)
  • 11. 11© 2018 FORRESTER. REPRODUCTION PROHIBITED. Evolution of Security Analytics Perimeter Defense • Focus on network security • Event filtering and basic correlation • Log management and retention • Events per second: <5,000 • Storage: gigabytes • Manual breach response • High false positive rate, limited scalability Compliance • Reporting • Information sources: various log formats (still log focused) • Advanced correlation • Signature-based alerting • Increasing devices: >1,000 • Events per second: >10,000 • Storage: terabytes • Focus on threat detection and response, breach response still slow, highly dependent on security analyst skills Enterprise Security Intelligence • Log management • Feeds from applications, databases, endpoints • Threat detection • More robust IAM integration • Advanced analytics with additional security context • User and network behavior • Feeds from additional sources: multiple log sources, NetFlow, reputation data, threat intelligence feeds • Huge number of devices: >5,000 • Events per second: >100,000 • Storage: petabytes – Big Data infrastructure • Near real-time breach response, same day remediation Sophistication,volume,velocityandcomplexity 1995 – 2000 (SEM) 2005 – 2014 (SIM) 2014+ Security Analytics
  • 12. 12© 2018 FORRESTER. REPRODUCTION PROHIBITED. Defining Security Analytics A platform built on big data infrastructure to converge logging, correlating, and reporting feeds from security information management (SIM), security solutions, network flow data, external threat intelligence, and diverse endpoints and applications. The SA platform uses this information and machine learning techniques to provide real-time monitoring and facilitate the rapid incident detection, analysis, and response. Source: Forrester’s Counteract Cyberattacks With Security Analytics
  • 13. 13© 2018 FORRESTER. REPRODUCTION PROHIBITED. Security User Behavior Analytics (SUBA) › Detects anomalous user and device behavior • Ingests endpoint, network, and host log data • Uses machine learning techniques to detect suspicious behavior • Alerts on abnormal activity • Deploys as a SIM supplement in many cases SUBA is often the first technology organizations think of when starting an insider threat team.
  • 14. 14© 2018 FORRESTER. REPRODUCTION PROHIBITED. Defining SUBA Functionality that enables security and risk teams to build a unified view of users' actions across the network. SUBA collects and correlates detailed information about user activity from a variety of logs and other data sources to heuristically and automatically set a user activity baseline from which it can detect, risk score, prioritize, intercept, and enable the investigation of anomalous behavior in real time. Source: Forrester’s Market Overview: Security User Behavior Analytics (SUBA), 2016 report
  • 15. 15 | © 2018 Interset Software Interset’s behavioral analytics allows for detection of anomalies, complementing the pattern matching of rules and thresholds for policy enforcement and the machine learning of malware detection. Interset Augments Your Security Ecosystem
  • 16. 16 | © 2018 Interset Software How Does Interset Do This?
  • 17. 17 | © 2018 Interset Software Machine Learning is Everywhere… I’m smart! Super machine learning!The best Bayesian! Buy me! I do it all!
  • 18. 18 | © 2018 Interset Software Two Categories of Machine Learning Algorithms Bu y me! Supe r ML! The best Bayesian ! I do it all! Classification Support Vector Machines Discriminant Analysis Naive Bayes Nearest Neighbor Regression Linear Regression | GLM SVR | GPR Ensemble Methods Decision Trees Neural Networks Clustering K-means | Fuzzy C-means Hidden Markov Model Neural Networks Hierarchical Guassian Mixture Supervised Unsupervised
  • 19. 19 | © 2018 Interset Software Cybersecurity: Supervised Machine Learning Approach Ideal for finding malware ▪ Decades of data to study ▪ Always looks the same no matter where it manifests “Tell me what I’m looking for…”
  • 20. 20 | © 2018 Interset Software When searching for insider threats, how do you determine what is productive or malicious activity within your enterprise? The activities related to insider threats are masked by behavior that, when removed from context, present as benign. This means we cannot simply match a pattern or look for a signature—we have to take a different approach that separates abnormal from normal. ▪ Working at midnight? ▪ Attaching 500MB to an email? ▪ Looking at corporate strategy data? ▪ Checking out software code from Project X? ▪ A machine communicating on port 465? ▪ Machine A & B connecting via HTTP? ▪ Printer “P015” printing 50 pages at noon? ▪ cmd.exe launched on a workstation? Cybersecurity: Unsupervised Machine Learning Approach
  • 21. 21 | © 2018 Interset Software What are the ”MOST WANTED” Insider Threats? Compromised Account Infected Host Account Misuse Data Staging Low & Slow Attacks Unauthorized Print Job Fileless Malware Zero-day Attack Not all insider threats are internal employees or disgruntled personnel.
  • 22. 22 | © 2018 Interset Software How Does Security Analytics Impact the SOC?
  • 23. 23© 2018 FORRESTER. REPRODUCTION PROHIBITED. SA Enables SOC Processes › Monitoring and alerting › Event correlation › Alert triage › Incident response › Threat hunting
  • 24. 24 | © 2018 Interset Software How Does Interset Change SOC Operations and Threat Hunting?
  • 25. 25 | © 2018 Interset Software Interset Security Analytics Dashboard: Top Risky Entities
  • 26. 26 | © 2018 Interset Software Interset Security Analytics Dashboard: Anomalous Behavior
  • 27. 27© 2018 FORRESTER. REPRODUCTION PROHIBITED. Considerations for Selecting An SA Solution › Monitoring requirements › Data sources › Out of the box content › Scalability › Threat intelligence sources › Size of security staff › Security team maturity › Compliance needs
  • 28. 28© 2018 FORRESTER. REPRODUCTION PROHIBITED. Wrap-Up › Security teams lack the speed and agility to stop breaches • Inadequate tools and slow, manual processes impede progress › Rules-based SIM alone not able to detect anomalous behavior • Combination of capabilities enabling better threat detection and response › We have to make better, faster security decisions • Security analytics tools help make that happen • Analysts require analytics to speed detection and enable threat hunting
  • 29. 29 | © 2018 Interset Software Questions?
  • 30. 30 | © 2018 Interset Software Want to learn more? Contact us! STEPHAN JOU CTO, Interset sjou@interset.com @eeksock PAUL REID Security Strategist, Interest preid@interset.com JOSEPH BLANKENSHIP Principal Analyst, Forrester jblankenship@forrester.com @infosec_jb
  • 31. 31 | © 2018 Interset Software Thank You! Learn more at Interset.AI