SlideShare a Scribd company logo
1 of 29
Building a Better Analyst
Using Cognitive Psychology
Chris Sanders
Bsides Augusta 2015
Chris Sanders
• Christian
• Southerner
• PhD Researcher
• FireEye
• GSE
• BBQ Pit Master
**Disclaimer**
I’m going to talk about matters of the brain, not
just the normal tech stuff.
My research for this presentation involved
consultation with psychologists.
I, however, am not one….yet.
Outline
Objectives:
 Metacognition
 Perception
 Intuition
 Working Memory
“How metacognitive awareness can help you make
better technical decisions during security
investigations.“
Metacognition
• Thinking about thinking
• Research shows a relationship between
metacognitive awareness and cognitive
performance.
• Two Components:
– Knowledge of cognition (understand it)
– Regulation of cognition (apply it)
The Investigation
• Investigations are an attempt to determine
the ground truth of what really happened.
– Is there a bad guy?
– What did they do?
• Investigations introduce cognitive challenges
Perception, Reality, and Bias
Perception vs. Reality
• Perception:
– “A way of regarding, understanding, or
interpreting something.”
• Reality:
– “The state of things as they actually exist.”
Our investigative path depends on mindset and biases
Mindsets and Blur
• Mindsets frame how
we see the world
• Quick to form and
resistant to change
• The initial picture we
see forms our first
mindset impression
• Biases applied here
carry forward
Diminishing Initial Blur
• Provide relevant information up front
• Real-istic time alerting
• Formalization of triage function
– Put your expertise here
– Gather info, make recommendations, pass on
– Smaller orgs can use partner analysis
Inattentional Blindness (IB)
• Attention – Focusing on something
– Overt or covert
– Attention is a limited resource
– Many things fight for analyst attention
• It is very easy to miss things right in front of us
Diminishing IB
• Experienced analyst are usually less suceptible
• Mastery of your environment
– Mise en place
• Controlling attention
– Limit extraneous info
– Direct focus
– Gaze tracking
Intuition and Memory
It’s a Hard SOC Life
• Investigative knowledge is tacit
– Senior analysts can’t explain their success
– Junior analysts can’t effectively learn
• Knowledge transfer is limited
– “Watch and learn”
Analysts rely on intuition!
Intuition
• in·tu·i·tion (noun)
– The ability to understand something immediately,
without the need for conscious reasoning.
• Previously not well understood, often dismissed
“It is an illusion to expect
anything from intuition.”
– Sigmund Freud
A Biological Basis for Intuition
Precuneus
2.1x Larger Response
TED Talk: The Rise of Augmented Intelligence: https://www.youtube.com/watch?v=mKZCa_ejbfg
Modeling Memory
Using the Visuo-Spatial Sketchpad (VSP)
• A primary component of working memory
• Allows for visual manipulation of objects
• Studies show that “intuition” is directly tied to
use of VSSP (via the precuneus)
Related VSSP Usage
“If you look deep enough you will see music” – Thomas Carlyle
Visually Investigating
• Draw a picture!
– It’s what your brain is doing anyway
– Whiteboards everywhere
• Visualize Data Appropriately
– Don’t use viz for the sake of viz (geo maps )
– Incident timelines
– Link graphs
– Identify relationships (nouns/verbs)
Thinking Visually - Breakfast
Thinking Visually - Breach
WM Capacity Limitations
• The capacity of WM is biologically limited
• WM capacity is set from birth
– Humans can remember 7 items, + or - 2.
– Complexity of items matters
Hard to Remember Easy to Remember
248.232.122.193 6.5.4.3
sub29203.domain3789.com sub.domain.com
domain.com/me/?id=29381913 domain.com/path/url.htm
a39e3d50ba4aeb134d95ae7aa4
d6c578
system32.dll
Diminishing WM Capacity Limitations
• Source Monitoring
– Which IP was $suspicious_activity associated with?
– Was this file downloaded by $dropper or $attacker?
– Which case was $domain
• Chunking
– Grouping similar information
– Mapping to an existing schema
Schemas
Picture These Items
Stapler
Buffalo
Book
Foot
Flag
Eggs
Bacon
Grits
Sausage
Coffee
Unrelated to
Schema
Related to
Breakfast Schema
Conclusion
• The biggest hurdle to overcome when
investigating security incidents is our own
cognitive limitations
• Metacognition can diminish these limitations
Thank You!
E-Mail: chris@chrissanders.org
Twitter: @chrissanders88
Blog: http://www.chrissanders.org
Foundation: http://www.ruraltechfund.org

More Related Content

What's hot

NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - Hacking Performance Management, the Blue Green GameNTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - Hacking Performance Management, the Blue Green GameNorth Texas Chapter of the ISSA
 
Learning About At-Risk Veterans Using 
Online Network Surveys
Learning About At-Risk Veterans Using 
Online Network SurveysLearning About At-Risk Veterans Using 
Online Network Surveys
Learning About At-Risk Veterans Using 
Online Network SurveysSean Taylor
 
The Top 4 Ways On How Neuro-Marketing Influences The Online Dating Arena
The Top 4 Ways On How Neuro-Marketing Influences The Online Dating ArenaThe Top 4 Ways On How Neuro-Marketing Influences The Online Dating Arena
The Top 4 Ways On How Neuro-Marketing Influences The Online Dating ArenaStoic Advantage, LLC.
 
Trusted Advisor.pdf
Trusted Advisor.pdfTrusted Advisor.pdf
Trusted Advisor.pdfYuanSari1
 
Max Shron, Thinking with Data at the NYC Data Science Meetup
Max Shron, Thinking with Data at the NYC Data Science MeetupMax Shron, Thinking with Data at the NYC Data Science Meetup
Max Shron, Thinking with Data at the NYC Data Science Meetupmortardata
 
#ATAGTR2018 Presentation "The Subtle Influence of Cognitive Biases on Testing...
#ATAGTR2018 Presentation "The Subtle Influence of Cognitive Biases on Testing...#ATAGTR2018 Presentation "The Subtle Influence of Cognitive Biases on Testing...
#ATAGTR2018 Presentation "The Subtle Influence of Cognitive Biases on Testing...Agile Testing Alliance
 
Ask an Expert: Findings and Decisions
Ask an Expert: Findings and DecisionsAsk an Expert: Findings and Decisions
Ask an Expert: Findings and DecisionsKevin Gamble
 
A predictive analytics primer
A predictive analytics primerA predictive analytics primer
A predictive analytics primerShesha
 
How Do You want Scientists to be Perceived
How Do You want Scientists to be PerceivedHow Do You want Scientists to be Perceived
How Do You want Scientists to be PerceivedJohn C. Besley
 
Applying Psychology To The Estimation of QA
Applying Psychology To The Estimation of QAApplying Psychology To The Estimation of QA
Applying Psychology To The Estimation of QAPaula Heenan
 
Effective Fraud Investigations: 10 Keys to a Successful Outcome
Effective Fraud Investigations: 10 Keys to a Successful OutcomeEffective Fraud Investigations: 10 Keys to a Successful Outcome
Effective Fraud Investigations: 10 Keys to a Successful OutcomeCase IQ
 
Games vs Surveys - A case study - Upfront Analytics
Games vs Surveys - A case study - Upfront AnalyticsGames vs Surveys - A case study - Upfront Analytics
Games vs Surveys - A case study - Upfront AnalyticsMerlien Institute
 
Estimate and Measure. Minimize work, maximize value. Part 1
Estimate and Measure. Minimize work, maximize value. Part 1Estimate and Measure. Minimize work, maximize value. Part 1
Estimate and Measure. Minimize work, maximize value. Part 1Shiftup
 
Start Thinking Like a Data Scientist
Start Thinking Like a Data ScientistStart Thinking Like a Data Scientist
Start Thinking Like a Data ScientistAmanMehta47
 
The power of regular reviews
The power of regular reviewsThe power of regular reviews
The power of regular reviewsEbere Ikerionwu
 
Critical thinking tung
Critical thinking tungCritical thinking tung
Critical thinking tung131IV14
 

What's hot (17)

NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - Hacking Performance Management, the Blue Green GameNTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
 
Learning About At-Risk Veterans Using 
Online Network Surveys
Learning About At-Risk Veterans Using 
Online Network SurveysLearning About At-Risk Veterans Using 
Online Network Surveys
Learning About At-Risk Veterans Using 
Online Network Surveys
 
The Top 4 Ways On How Neuro-Marketing Influences The Online Dating Arena
The Top 4 Ways On How Neuro-Marketing Influences The Online Dating ArenaThe Top 4 Ways On How Neuro-Marketing Influences The Online Dating Arena
The Top 4 Ways On How Neuro-Marketing Influences The Online Dating Arena
 
Trusted Advisor.pdf
Trusted Advisor.pdfTrusted Advisor.pdf
Trusted Advisor.pdf
 
Max Shron, Thinking with Data at the NYC Data Science Meetup
Max Shron, Thinking with Data at the NYC Data Science MeetupMax Shron, Thinking with Data at the NYC Data Science Meetup
Max Shron, Thinking with Data at the NYC Data Science Meetup
 
#ATAGTR2018 Presentation "The Subtle Influence of Cognitive Biases on Testing...
#ATAGTR2018 Presentation "The Subtle Influence of Cognitive Biases on Testing...#ATAGTR2018 Presentation "The Subtle Influence of Cognitive Biases on Testing...
#ATAGTR2018 Presentation "The Subtle Influence of Cognitive Biases on Testing...
 
Ask an Expert: Findings and Decisions
Ask an Expert: Findings and DecisionsAsk an Expert: Findings and Decisions
Ask an Expert: Findings and Decisions
 
A predictive analytics primer
A predictive analytics primerA predictive analytics primer
A predictive analytics primer
 
How Do You want Scientists to be Perceived
How Do You want Scientists to be PerceivedHow Do You want Scientists to be Perceived
How Do You want Scientists to be Perceived
 
Applying Psychology To The Estimation of QA
Applying Psychology To The Estimation of QAApplying Psychology To The Estimation of QA
Applying Psychology To The Estimation of QA
 
Effective Fraud Investigations: 10 Keys to a Successful Outcome
Effective Fraud Investigations: 10 Keys to a Successful OutcomeEffective Fraud Investigations: 10 Keys to a Successful Outcome
Effective Fraud Investigations: 10 Keys to a Successful Outcome
 
Games vs Surveys - A case study - Upfront Analytics
Games vs Surveys - A case study - Upfront AnalyticsGames vs Surveys - A case study - Upfront Analytics
Games vs Surveys - A case study - Upfront Analytics
 
Estimate and Measure. Minimize work, maximize value. Part 1
Estimate and Measure. Minimize work, maximize value. Part 1Estimate and Measure. Minimize work, maximize value. Part 1
Estimate and Measure. Minimize work, maximize value. Part 1
 
Start Thinking Like a Data Scientist
Start Thinking Like a Data ScientistStart Thinking Like a Data Scientist
Start Thinking Like a Data Scientist
 
The power of regular reviews
The power of regular reviewsThe power of regular reviews
The power of regular reviews
 
Real-Time Responsive Text Analytics
Real-Time Responsive Text Analytics Real-Time Responsive Text Analytics
Real-Time Responsive Text Analytics
 
Critical thinking tung
Critical thinking tungCritical thinking tung
Critical thinking tung
 

Viewers also liked

Cuckoo sandbox
Cuckoo sandboxCuckoo sandbox
Cuckoo sandboxTensor
 
Анализ запросов российских пользователей на туры в различные страны в октябре...
Анализ запросов российских пользователей на туры в различные страны в октябре...Анализ запросов российских пользователей на туры в различные страны в октябре...
Анализ запросов российских пользователей на туры в различные страны в октябре...ATOR
 
Malware analysis as a hobby (Owasp Göteborg)
Malware analysis as a hobby (Owasp Göteborg)Malware analysis as a hobby (Owasp Göteborg)
Malware analysis as a hobby (Owasp Göteborg)Michael Boman
 
Building performance analysis system IES VE main features overview
Building performance analysis system IES VE main features overviewBuilding performance analysis system IES VE main features overview
Building performance analysis system IES VE main features overviewStatybos Akademija
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat HuntingGIBIN JOHN
 
Deeplook into apt and how to detect and defend v1.0
Deeplook into apt and how to detect and defend v1.0Deeplook into apt and how to detect and defend v1.0
Deeplook into apt and how to detect and defend v1.0Michael Gough
 
Logs, Logs, Logs - What you need to know to catch a thief
Logs, Logs, Logs - What you need to know to catch a thiefLogs, Logs, Logs - What you need to know to catch a thief
Logs, Logs, Logs - What you need to know to catch a thiefMichael Gough
 
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin FalckLuncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin FalckNorth Texas Chapter of the ISSA
 
Proper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSProper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSMichael Gough
 
Logging for Hackers v1.0
Logging for Hackers v1.0Logging for Hackers v1.0
Logging for Hackers v1.0Michael Gough
 
Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1Michael Gough
 
The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0Michael Gough
 
SOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation LabyrinthSOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation Labyrinthchrissanders88
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting WorkshopSplunk
 
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...Sam Bowne
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 

Viewers also liked (20)

Second Life at MIT
Second Life at MITSecond Life at MIT
Second Life at MIT
 
Cuckoo sandbox
Cuckoo sandboxCuckoo sandbox
Cuckoo sandbox
 
Анализ запросов российских пользователей на туры в различные страны в октябре...
Анализ запросов российских пользователей на туры в различные страны в октябре...Анализ запросов российских пользователей на туры в различные страны в октябре...
Анализ запросов российских пользователей на туры в различные страны в октябре...
 
Malware analysis as a hobby (Owasp Göteborg)
Malware analysis as a hobby (Owasp Göteborg)Malware analysis as a hobby (Owasp Göteborg)
Malware analysis as a hobby (Owasp Göteborg)
 
Pengenalan dan Analisa Malware
Pengenalan dan Analisa MalwarePengenalan dan Analisa Malware
Pengenalan dan Analisa Malware
 
Building performance analysis system IES VE main features overview
Building performance analysis system IES VE main features overviewBuilding performance analysis system IES VE main features overview
Building performance analysis system IES VE main features overview
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
Deeplook into apt and how to detect and defend v1.0
Deeplook into apt and how to detect and defend v1.0Deeplook into apt and how to detect and defend v1.0
Deeplook into apt and how to detect and defend v1.0
 
Logs, Logs, Logs - What you need to know to catch a thief
Logs, Logs, Logs - What you need to know to catch a thiefLogs, Logs, Logs - What you need to know to catch a thief
Logs, Logs, Logs - What you need to know to catch a thief
 
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin FalckLuncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
 
Apa itu malware
Apa itu malwareApa itu malware
Apa itu malware
 
Proper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSProper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoS
 
Logging for Hackers v1.0
Logging for Hackers v1.0Logging for Hackers v1.0
Logging for Hackers v1.0
 
Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1
 
The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0
 
SOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation LabyrinthSOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation Labyrinth
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
 
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 

Similar to BSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology

Heuristics, bias and critical thinking in testing distribution
Heuristics, bias and critical thinking in testing   distributionHeuristics, bias and critical thinking in testing   distribution
Heuristics, bias and critical thinking in testing distributionMatt Mansell
 
Critical thinking
Critical thinkingCritical thinking
Critical thinkingMrini Gorla
 
Collective mind futurist perspective
Collective mind  futurist perspectiveCollective mind  futurist perspective
Collective mind futurist perspectiveAziz Alizadeh
 
CriticalThinking.pdf
CriticalThinking.pdfCriticalThinking.pdf
CriticalThinking.pdfArfanSubhani
 
Hpai class 25 - emotions in ai and self -051820
Hpai   class 25 - emotions in ai and self -051820Hpai   class 25 - emotions in ai and self -051820
Hpai class 25 - emotions in ai and self -051820Jose Melendez
 
Foundations Of Knowledge
Foundations Of KnowledgeFoundations Of Knowledge
Foundations Of Knowledgesusanwrege
 
An Introduction to Critical Thinking
An Introduction to Critical ThinkingAn Introduction to Critical Thinking
An Introduction to Critical ThinkingDamian T. Gordon
 
Intelligence.ppt
Intelligence.pptIntelligence.ppt
Intelligence.pptsyedmirsyed
 
Cultivating Intuition - Through Meticulous Self-tracking
Cultivating Intuition - Through Meticulous Self-trackingCultivating Intuition - Through Meticulous Self-tracking
Cultivating Intuition - Through Meticulous Self-trackingBen Ahrens
 
Cognition and Metacognition
Cognition and MetacognitionCognition and Metacognition
Cognition and MetacognitionUsman Amin
 
The neuropsychology of the mystery shopping
The neuropsychology of the mystery shoppingThe neuropsychology of the mystery shopping
The neuropsychology of the mystery shoppingDavid Camps
 
1.intelligence sfs.pptx
1.intelligence sfs.pptx1.intelligence sfs.pptx
1.intelligence sfs.pptxRitukumar47
 
PsychIntr-The foundation of psychological.pdf
PsychIntr-The foundation of psychological.pdfPsychIntr-The foundation of psychological.pdf
PsychIntr-The foundation of psychological.pdfhankchen0119
 
Intelligence
IntelligenceIntelligence
Intelligenceirenek
 
Look Around: Question Answering, Serendipity, and the Research Process of Sch...
Look Around: Question Answering, Serendipity, and the Research Process of Sch...Look Around: Question Answering, Serendipity, and the Research Process of Sch...
Look Around: Question Answering, Serendipity, and the Research Process of Sch...KimberleyMartin
 

Similar to BSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology (20)

Heuristics, bias and critical thinking in testing distribution
Heuristics, bias and critical thinking in testing   distributionHeuristics, bias and critical thinking in testing   distribution
Heuristics, bias and critical thinking in testing distribution
 
Critical thinking
Critical thinkingCritical thinking
Critical thinking
 
Intelligence
IntelligenceIntelligence
Intelligence
 
Collective mind futurist perspective
Collective mind  futurist perspectiveCollective mind  futurist perspective
Collective mind futurist perspective
 
CriticalThinking.pdf
CriticalThinking.pdfCriticalThinking.pdf
CriticalThinking.pdf
 
Hpai class 25 - emotions in ai and self -051820
Hpai   class 25 - emotions in ai and self -051820Hpai   class 25 - emotions in ai and self -051820
Hpai class 25 - emotions in ai and self -051820
 
Social cognition
Social cognitionSocial cognition
Social cognition
 
Foundations Of Knowledge
Foundations Of KnowledgeFoundations Of Knowledge
Foundations Of Knowledge
 
An Introduction to Critical Thinking
An Introduction to Critical ThinkingAn Introduction to Critical Thinking
An Introduction to Critical Thinking
 
Intelligence.ppt
Intelligence.pptIntelligence.ppt
Intelligence.ppt
 
Intelligence
IntelligenceIntelligence
Intelligence
 
Cultivating Intuition - Through Meticulous Self-tracking
Cultivating Intuition - Through Meticulous Self-trackingCultivating Intuition - Through Meticulous Self-tracking
Cultivating Intuition - Through Meticulous Self-tracking
 
Critical Thinking
Critical ThinkingCritical Thinking
Critical Thinking
 
Cognition and Metacognition
Cognition and MetacognitionCognition and Metacognition
Cognition and Metacognition
 
The neuropsychology of the mystery shopping
The neuropsychology of the mystery shoppingThe neuropsychology of the mystery shopping
The neuropsychology of the mystery shopping
 
1.intelligence sfs.pptx
1.intelligence sfs.pptx1.intelligence sfs.pptx
1.intelligence sfs.pptx
 
PsychIntr-The foundation of psychological.pdf
PsychIntr-The foundation of psychological.pdfPsychIntr-The foundation of psychological.pdf
PsychIntr-The foundation of psychological.pdf
 
my ED presentation
my ED presentationmy ED presentation
my ED presentation
 
Intelligence
IntelligenceIntelligence
Intelligence
 
Look Around: Question Answering, Serendipity, and the Research Process of Sch...
Look Around: Question Answering, Serendipity, and the Research Process of Sch...Look Around: Question Answering, Serendipity, and the Research Process of Sch...
Look Around: Question Answering, Serendipity, and the Research Process of Sch...
 

More from chrissanders88

2018 - Using Honeypots for Network Security Monitoring
2018 - Using Honeypots for Network Security Monitoring2018 - Using Honeypots for Network Security Monitoring
2018 - Using Honeypots for Network Security Monitoringchrissanders88
 
Hacking Food - BSides Augusta 2017
Hacking Food - BSides Augusta 2017Hacking Food - BSides Augusta 2017
Hacking Food - BSides Augusta 2017chrissanders88
 
Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017chrissanders88
 
Art into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive ApproachArt into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive Approachchrissanders88
 
Abstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Huntingchrissanders88
 
BSA2016 - Honeypots for Network Security Monitoring
BSA2016 - Honeypots for Network Security MonitoringBSA2016 - Honeypots for Network Security Monitoring
BSA2016 - Honeypots for Network Security Monitoringchrissanders88
 
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
CISSA Lightning Talk - Building a Malware Analysis Lab on a BudgetCISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budgetchrissanders88
 
Using Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security MonitoringUsing Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security Monitoringchrissanders88
 
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014chrissanders88
 
Applied Detection and Analysis with Flow Data - SO Con 2014
Applied Detection and Analysis with Flow Data - SO Con 2014Applied Detection and Analysis with Flow Data - SO Con 2014
Applied Detection and Analysis with Flow Data - SO Con 2014chrissanders88
 

More from chrissanders88 (10)

2018 - Using Honeypots for Network Security Monitoring
2018 - Using Honeypots for Network Security Monitoring2018 - Using Honeypots for Network Security Monitoring
2018 - Using Honeypots for Network Security Monitoring
 
Hacking Food - BSides Augusta 2017
Hacking Food - BSides Augusta 2017Hacking Food - BSides Augusta 2017
Hacking Food - BSides Augusta 2017
 
Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017
 
Art into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive ApproachArt into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive Approach
 
Abstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Hunting
 
BSA2016 - Honeypots for Network Security Monitoring
BSA2016 - Honeypots for Network Security MonitoringBSA2016 - Honeypots for Network Security Monitoring
BSA2016 - Honeypots for Network Security Monitoring
 
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
CISSA Lightning Talk - Building a Malware Analysis Lab on a BudgetCISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
 
Using Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security MonitoringUsing Canary Honeypots for Network Security Monitoring
Using Canary Honeypots for Network Security Monitoring
 
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014
 
Applied Detection and Analysis with Flow Data - SO Con 2014
Applied Detection and Analysis with Flow Data - SO Con 2014Applied Detection and Analysis with Flow Data - SO Con 2014
Applied Detection and Analysis with Flow Data - SO Con 2014
 

Recently uploaded

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

BSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology

  • 1. Building a Better Analyst Using Cognitive Psychology Chris Sanders Bsides Augusta 2015
  • 2. Chris Sanders • Christian • Southerner • PhD Researcher • FireEye • GSE • BBQ Pit Master
  • 3. **Disclaimer** I’m going to talk about matters of the brain, not just the normal tech stuff. My research for this presentation involved consultation with psychologists. I, however, am not one….yet.
  • 4. Outline Objectives:  Metacognition  Perception  Intuition  Working Memory “How metacognitive awareness can help you make better technical decisions during security investigations.“
  • 5. Metacognition • Thinking about thinking • Research shows a relationship between metacognitive awareness and cognitive performance. • Two Components: – Knowledge of cognition (understand it) – Regulation of cognition (apply it)
  • 6. The Investigation • Investigations are an attempt to determine the ground truth of what really happened. – Is there a bad guy? – What did they do? • Investigations introduce cognitive challenges
  • 8. Perception vs. Reality • Perception: – “A way of regarding, understanding, or interpreting something.” • Reality: – “The state of things as they actually exist.”
  • 9. Our investigative path depends on mindset and biases
  • 10. Mindsets and Blur • Mindsets frame how we see the world • Quick to form and resistant to change • The initial picture we see forms our first mindset impression • Biases applied here carry forward
  • 11. Diminishing Initial Blur • Provide relevant information up front • Real-istic time alerting • Formalization of triage function – Put your expertise here – Gather info, make recommendations, pass on – Smaller orgs can use partner analysis
  • 12. Inattentional Blindness (IB) • Attention – Focusing on something – Overt or covert – Attention is a limited resource – Many things fight for analyst attention • It is very easy to miss things right in front of us
  • 13.
  • 14. Diminishing IB • Experienced analyst are usually less suceptible • Mastery of your environment – Mise en place • Controlling attention – Limit extraneous info – Direct focus – Gaze tracking
  • 16. It’s a Hard SOC Life • Investigative knowledge is tacit – Senior analysts can’t explain their success – Junior analysts can’t effectively learn • Knowledge transfer is limited – “Watch and learn” Analysts rely on intuition!
  • 17. Intuition • in·tu·i·tion (noun) – The ability to understand something immediately, without the need for conscious reasoning. • Previously not well understood, often dismissed “It is an illusion to expect anything from intuition.” – Sigmund Freud
  • 18. A Biological Basis for Intuition Precuneus 2.1x Larger Response TED Talk: The Rise of Augmented Intelligence: https://www.youtube.com/watch?v=mKZCa_ejbfg
  • 20. Using the Visuo-Spatial Sketchpad (VSP) • A primary component of working memory • Allows for visual manipulation of objects • Studies show that “intuition” is directly tied to use of VSSP (via the precuneus)
  • 21. Related VSSP Usage “If you look deep enough you will see music” – Thomas Carlyle
  • 22. Visually Investigating • Draw a picture! – It’s what your brain is doing anyway – Whiteboards everywhere • Visualize Data Appropriately – Don’t use viz for the sake of viz (geo maps ) – Incident timelines – Link graphs – Identify relationships (nouns/verbs)
  • 23. Thinking Visually - Breakfast
  • 25. WM Capacity Limitations • The capacity of WM is biologically limited • WM capacity is set from birth – Humans can remember 7 items, + or - 2. – Complexity of items matters Hard to Remember Easy to Remember 248.232.122.193 6.5.4.3 sub29203.domain3789.com sub.domain.com domain.com/me/?id=29381913 domain.com/path/url.htm a39e3d50ba4aeb134d95ae7aa4 d6c578 system32.dll
  • 26. Diminishing WM Capacity Limitations • Source Monitoring – Which IP was $suspicious_activity associated with? – Was this file downloaded by $dropper or $attacker? – Which case was $domain • Chunking – Grouping similar information – Mapping to an existing schema
  • 28. Conclusion • The biggest hurdle to overcome when investigating security incidents is our own cognitive limitations • Metacognition can diminish these limitations
  • 29. Thank You! E-Mail: chris@chrissanders.org Twitter: @chrissanders88 Blog: http://www.chrissanders.org Foundation: http://www.ruraltechfund.org

Editor's Notes

  1. What do all bad guys have in common? They want to take something from you.
  2. This slide could also be called further research.