4. Defenders think in
lists. Attackers think
in graphs.
Source:
https://github.com/JohnLaTwC/Shared/blob/master/Defenders%20think%20in%20lists.%2
0Attackers%20think%20in%20graphs.%20As%20long%20as%20this%20is%20true%2C%20
attackers%20win.md
5. Defenders think in
lists. Attackers
think in graphs.
Source: https://github.com/BloodHoundAD/BloodHound
6. Concrete use cases.
Attack paths
(read team).
Incident
response.
Digital
forensics.
Cyber Threat
Intelligence.
Threat
detection.
7. Graph analytics adds
context to your
investigations, no
matter how big or
complex your data
is.
Faster investigations
Cyber security analysts can navigate
everything associated with a threat to act
with confidence.
Improved detection of attack patterns
New complex patterns can be added to
your arsenal of threat detection rules.
Enhance coverage of risks.
13. Example: analysing a
phishing attack.
Who is involved in investigating and
stopping phishing attacks?
Cyber-analyst Fraud analyst
14. How silos turn into
cyber-security
blindspots.
Ineffective identification of suspicious
behaviors
With analytics focused on silo-specific
information, the opportunity to detect
anomalies is reduced.
Harder to identify the spread of an
attack
Shifting from one data domain to another
within an investigation is complex. It limits
the ability to map the full extent of
accomplices and security issues.
Wasted resources
The time of investigators is wasted on
internal communications or ad-hoc data
wrangling.
15. A paradigm shift:
from tables to
graph.
Data
preparation.
Graph
database.
Linkurious
Enterprise.
Stop cyber
attacks.
Your team identifies
the relevant data
sources for your
project.
A graph expert
imports your data in a
graph database, it’s a
matter of days for
structured data.
Your analysts work
with a graph expert
to customize the look
and feel of Linkurious
Enterprise and setup
alerts and query
templates based on
your requirements.
Your analysts
connect to Linkurious
Enterprise or access it
via an existing app to
detect and investigate
cyber attacks.