SlideShare a Scribd company logo
1 of 22
Security Analytics Beyond Cyber 
Phil Huggins, Vice President, Security Science 
11/9/2014
SECURITY SCIENCE 
2 
Agenda 
 Big Data and Cyber 
 Situational Awareness 
 Security Analytics Beyond Cyber
3 
Big Data and Cyber Security
SECURITY SCIENCE 
4 
Big Data? 
 Over-used buzzword. 
 Doug Laney defined 3Vs in 2001 
 Gartner promoted 3Vs in 2012 
Google Trends 
“Big Data” search interest over time 
The 3Vs 
Volume Velocity Variety Value Veracity
SECURITY SCIENCE 
Big Data Disciplines 
 More useful to break Big Data down by activities you actually do: 
• Decision Making 
Data-Driven 
Management 
Data Science • Analytics, Sense-Making 
• Technology, Nuts and Bolts 
Data 
Engineering
SECURITY SCIENCE 
6 
Data Lakes & CoEs 
 The data lake, an enterprise-wide Big Data platform, is emerging in 
large scale businesses. 
• Concentration of data 
• Concentration of technology 
 Tends to be associated with Big Data “Centres of Excellence”. 
• Concentration of Data Engineering skills 
• Concentration of Data Science skills 
• The CoEs are often hunting for well-defined early adopter Use 
Cases to prove their value. 
• The Data Lakes provide unexpected opportunities for ‘data 
enrichment’ across organisational boundaries.
SECURITY SCIENCE 
7 
Why Big Data for Cyber Security? 
 Cyber Security is increasingly a data problem. 
 We are collecting, processing and analysing more and more data in 
order to address the threat landscape. 
• Known threat indicators 
• Indicator targeted subsets of monitoring 
data 
• Assumes in advance what the risk is 
• Near real-time analysis with limited memory 
Network 
Monitoring 
using SIEM
SECURITY SCIENCE 
8 
What are the main Cyber Security use cases for Big Data? 
 Early adoption, provable ROI, vendor can develop a PoC without a 
customer 
• Probable matches to likely/possible threat 
methods 
• All the monitoring data over a longer period of 
time 
• Retroactive analysis using intelligence feeds 
• Combining internal and external data sources 
Network 
Behavioural 
Analytics 
• More context and more data to investigate 
• Single screen analysis 
• Faster automated tooling for entity resolution and 
event resolution 
• Variety of visualisations available, timeline 
visualisation especially key 
Data-enabled 
Investigation
SECURITY SCIENCE 
Tools 
• Hardware and 
software 
components 
• Configuration 
and utilization of 
solution 
components 
People 
• Skills of people 
involved 
• Engagement of 
necessary 
stakeholders 
• Training 
available 
Process 
• Essential 
processes for 
solution to work 
• Includes 
management of 
tools, 
knowledge, 
intelligence and 
people 
Data 
Sources 
• The raw data 
from a variety of 
tools across the 
environment. 
• Includes 
sensors, security 
alerts and log 
files. 
Intelligence 
• Data that 
provides the 
necessary 
context to 
enrich, interpret 
and prioritize 
analytic results 
Knowledge 
•The goal of the 
data analysis 
which is both 
delivered to 
stakeholders 
and better 
informs further 
questions of the 
data 
9 
What is a Big Data Security Analytics Capability?
SECURITY SCIENCE 
10 
What does a Big Data Security Analytics solution look like?
SECURITY SCIENCE 
11 
How does the Security Analytics team fit into an existing Security Team?
12 
Situational Awareness
SECURITY SCIENCE 
13 
What is Situational Awareness? 
 Large body of academic work 
 A variety of different processual vs cognitive models suggested 
 Warning! The science is not robust in this area. 
 Dr Mica Endsley described the popular three stage model in 1995 
 Correlation with John Boyds OODA Loop. 
SITUATIONAL AWARENESS 
PERCEIVE UNDERSTAND PREDICT
SECURITY SCIENCE 
14 
How does Situational Awareness fit into Cyber Security? 
OPERATIONAL CYBER SECURITY 
OBSERVE ORIENTATE DECIDE ACT 
SITUATIONAL AWARENESS 
OPERATORS 
HUNTERS 
RESPONDERS 
RESOLVERS 
AUTOMATION?
SECURITY SCIENCE 
15 
How does Situational Awareness fit into Security Management? 
SECURITY MANAGMENT 
PLAN DO CHECK ACT 
STUDY 
SITUATION 
SET GOALS 
PLAN 
ACTIVITIES 
MEASURE 
SUCCESS 
STUDY 
RESULTS 
IMPROVE & 
STANDARDISE 
DELIVER 
ACTIVITIES 
SITUATIONAL 
AWARENESS 
SITUATIONAL AWARENESS AUTOMATION?
16 
Security Analytics Beyond Cyber
SECURITY SCIENCE 
17 
Why Data-Driven Security Management? 
“The dearth of metrics and decision-making tools places the 
determination of Information Security risk to the enterprise on the 
judgment of IT security practitioners.” INFOSEC Research Council 
“At present, the practice of measuring security is very ad-hoc. Many of 
the processes for measurement and metric selection are mostly or 
completely subjective or procedural.” Department of Homeland 
Security 
 Most security decisions made in absence of good data. 
 Best/Good Practice is “cargo cult security”.
SECURITY SCIENCE 
18 
Low Hanging Fruit – Quantitative Security Management 
 Mixed Data Sources, Visualisation, Sets of Questions, Summary 
Statistics 
 Trend Analysis, Security Posture, Perimeter View, Operational KPIs, 
Controls Performance 
 Good indicator is large Excel sheets with complex pivot tables 
• Multiple data sources; vuln scanners or probes, 
hardware inventory, cmdb, patch servers, SOC 
monitoring, external information feeds 
• Multiple clear questions. 
• Candidate for Question-Focused Dataset 
Vulnerability 
Management 
• Multiple data sources; risk register, project 
plans, incident reports, SOC feed, audit reports 
• Multiple stakeholders with distinct interests 
• Candidate for Interactive Visualisation 
Executive 
Dashboard
SECURITY SCIENCE 
19 
Big Data Security Analytics Opportunities 
 Once the Cyber use cases have been implemented there are 
opportunities to operationalise and potentially automate some aspects 
of security management activities 
• Continuous monitoring, not just an annual 
phishing exercise 
• Enrich with HR data 
• Report on trends and effectiveness of 
awareness programs and training events 
• Targeted training 
Risky Staff 
Behaviour 
• Pre-Approved Change Controls at agreed 
risk thresholds 
• Firewall, network and server configuration 
changes 
• Increased targeted monitoring 
• Distribution of IOCs to multiple endpoints 
Automated 
Incident 
Response
SECURITY SCIENCE 
20 
The Future - Hypothesis-Driven Security Management 
 Experiments to identify the effectiveness of security activities and 
controls in your environment 
 Multiple iterations following the Deming cycle 
 Replace Best/Good Practice with the Right Practice for You 
 Key skills: 
1. Forming a useful, practical and measurable hypothesis 
2. Achieving executive support for management experimentation 
3. Understanding and applying the results to the business 
• Some of these are Data Scientist skills, some are CISO skills. 
• The CISO of the future will need to understand how to talk to Data 
Scientists productively!
21 
Conclusion 
 There are no silver bullets! 
 We will still need humans in the loop but automation will allow us to 
do more with less 
 Build open cyber big data analytics platforms 
 Invest in analytics skills now 
 Security is transforming from a subjective art to a data and 
automation discipline
THANK YOU 
strozfriedberg.com 
Phil Huggins, Vice President 
T: +44 207 061 2299 
phuggins@strozfriedberg.com

More Related Content

What's hot

Top Level Cyber Security Strategy
Top Level Cyber Security Strategy Top Level Cyber Security Strategy
Top Level Cyber Security Strategy John Gilligan
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtJohn D. Johnson
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cade Zvavanjanja
 
7 Habits of Smart Threat Intelligence Analysts
7 Habits of Smart Threat Intelligence Analysts7 Habits of Smart Threat Intelligence Analysts
7 Habits of Smart Threat Intelligence AnalystsRecorded Future
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksTripwire
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?John D. Johnson
 
Collaborated cyber defense in pandemic times
Collaborated cyber defense in pandemic times Collaborated cyber defense in pandemic times
Collaborated cyber defense in pandemic times Denise Bailey
 
Top 6 Sources for Identifying Threat Actor TTPs
Top 6 Sources for Identifying Threat Actor TTPsTop 6 Sources for Identifying Threat Actor TTPs
Top 6 Sources for Identifying Threat Actor TTPsRecorded Future
 
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeMeet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeDragos, Inc.
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceSurfWatch Labs
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementPriyanka Aash
 
Evidence-Based Risk Management
Evidence-Based Risk ManagementEvidence-Based Risk Management
Evidence-Based Risk ManagementEnergySec
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsFidelis Cybersecurity
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDIDavid Sweigert
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 

What's hot (20)

Top Level Cyber Security Strategy
Top Level Cyber Security Strategy Top Level Cyber Security Strategy
Top Level Cyber Security Strategy
 
Managing Insider Risk
Managing Insider RiskManaging Insider Risk
Managing Insider Risk
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1
 
7 Habits of Smart Threat Intelligence Analysts
7 Habits of Smart Threat Intelligence Analysts7 Habits of Smart Threat Intelligence Analysts
7 Habits of Smart Threat Intelligence Analysts
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security Attacks
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
 
Modern Security Risk
Modern Security RiskModern Security Risk
Modern Security Risk
 
Collaborated cyber defense in pandemic times
Collaborated cyber defense in pandemic times Collaborated cyber defense in pandemic times
Collaborated cyber defense in pandemic times
 
Top 6 Sources for Identifying Threat Actor TTPs
Top 6 Sources for Identifying Threat Actor TTPsTop 6 Sources for Identifying Threat Actor TTPs
Top 6 Sources for Identifying Threat Actor TTPs
 
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeMeet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
 
Countering Cyber Threats
Countering Cyber ThreatsCountering Cyber Threats
Countering Cyber Threats
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Evidence-Based Risk Management
Evidence-Based Risk ManagementEvidence-Based Risk Management
Evidence-Based Risk Management
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDI
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 

Viewers also liked

First Responder Course - Session 9 - Volatile Evidence Collection [2004]
First Responder Course - Session 9 - Volatile Evidence Collection [2004]First Responder Course - Session 9 - Volatile Evidence Collection [2004]
First Responder Course - Session 9 - Volatile Evidence Collection [2004]Phil Huggins FBCS CITP
 
First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]Phil Huggins FBCS CITP
 
First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]Phil Huggins FBCS CITP
 
First Responders Course - Session 8 - Digital Evidence Collection [2004]
First Responders Course - Session 8 - Digital Evidence Collection [2004]First Responders Course - Session 8 - Digital Evidence Collection [2004]
First Responders Course - Session 8 - Digital Evidence Collection [2004]Phil Huggins FBCS CITP
 
Penetration Testing; A customers perspective
Penetration Testing; A customers perspectivePenetration Testing; A customers perspective
Penetration Testing; A customers perspectivePhil Huggins FBCS CITP
 
PIANOS: Protecting Information About Networks The Organisation and It's Syste...
PIANOS: Protecting Information About Networks The Organisation and It's Syste...PIANOS: Protecting Information About Networks The Organisation and It's Syste...
PIANOS: Protecting Information About Networks The Organisation and It's Syste...Phil Huggins FBCS CITP
 
Security and Resilience Vulnerabilities in the UK’s Telecoms Networks
Security and Resilience Vulnerabilities in the UK’s Telecoms Networks Security and Resilience Vulnerabilities in the UK’s Telecoms Networks
Security and Resilience Vulnerabilities in the UK’s Telecoms Networks Phil Huggins FBCS CITP
 
First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]Phil Huggins FBCS CITP
 
PIANOS: Protecting Information About Networks The Organisation and It's Systems
PIANOS: Protecting Information About Networks The Organisation and It's Systems PIANOS: Protecting Information About Networks The Organisation and It's Systems
PIANOS: Protecting Information About Networks The Organisation and It's Systems Phil Huggins FBCS CITP
 

Viewers also liked (18)

Network Reconnaissance Infographic
Network Reconnaissance InfographicNetwork Reconnaissance Infographic
Network Reconnaissance Infographic
 
UK Legal Framework (2003)
UK Legal Framework (2003)UK Legal Framework (2003)
UK Legal Framework (2003)
 
First Responder Course - Session 9 - Volatile Evidence Collection [2004]
First Responder Course - Session 9 - Volatile Evidence Collection [2004]First Responder Course - Session 9 - Volatile Evidence Collection [2004]
First Responder Course - Session 9 - Volatile Evidence Collection [2004]
 
Introduction to Hacktivism
Introduction to HacktivismIntroduction to Hacktivism
Introduction to Hacktivism
 
First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]
 
First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]
 
Security Metrics [2008]
Security Metrics [2008]Security Metrics [2008]
Security Metrics [2008]
 
First Responders Course - Session 8 - Digital Evidence Collection [2004]
First Responders Course - Session 8 - Digital Evidence Collection [2004]First Responders Course - Session 8 - Digital Evidence Collection [2004]
First Responders Course - Session 8 - Digital Evidence Collection [2004]
 
Measuring black boxes
Measuring black boxesMeasuring black boxes
Measuring black boxes
 
Penetration Testing; A customers perspective
Penetration Testing; A customers perspectivePenetration Testing; A customers perspective
Penetration Testing; A customers perspective
 
PIANOS: Protecting Information About Networks The Organisation and It's Syste...
PIANOS: Protecting Information About Networks The Organisation and It's Syste...PIANOS: Protecting Information About Networks The Organisation and It's Syste...
PIANOS: Protecting Information About Networks The Organisation and It's Syste...
 
Probability Calibration
Probability CalibrationProbability Calibration
Probability Calibration
 
Intelligence-led Cybersecurity
Intelligence-led Cybersecurity Intelligence-led Cybersecurity
Intelligence-led Cybersecurity
 
Security and Resilience Vulnerabilities in the UK’s Telecoms Networks
Security and Resilience Vulnerabilities in the UK’s Telecoms Networks Security and Resilience Vulnerabilities in the UK’s Telecoms Networks
Security and Resilience Vulnerabilities in the UK’s Telecoms Networks
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]
 
Delivering Secure Projects
Delivering Secure ProjectsDelivering Secure Projects
Delivering Secure Projects
 
PIANOS: Protecting Information About Networks The Organisation and It's Systems
PIANOS: Protecting Information About Networks The Organisation and It's Systems PIANOS: Protecting Information About Networks The Organisation and It's Systems
PIANOS: Protecting Information About Networks The Organisation and It's Systems
 

Similar to Security Analytics Beyond Cyber

Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteSplunk
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...TI Safe
 
Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data Naveed Ahmed
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Getting Real About Security Management and “Big Data”
Getting Real About Security Management and “Big Data” Getting Real About Security Management and “Big Data”
Getting Real About Security Management and “Big Data” EMC
 
How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...Ulf Mattsson
 
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteOperationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteInterset
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the CloudOnRamp
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseGeorge Goodall
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Interset
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshopSLVA Information Security
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareCloudera, Inc.
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are comingErnest Staats
 
Time to re think our security process
Time to re think our security processTime to re think our security process
Time to re think our security processUlf Mattsson
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Leslie McFarlin
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DaySymantec
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteGlobus
 

Similar to Security Analytics Beyond Cyber (20)

Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Getting Real About Security Management and “Big Data”
Getting Real About Security Management and “Big Data” Getting Real About Security Management and “Big Data”
Getting Real About Security Management and “Big Data”
 
How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...
 
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteOperationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Time to re think our security process
Time to re think our security processTime to re think our security process
Time to re think our security process
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Security Analytics Beyond Cyber

  • 1. Security Analytics Beyond Cyber Phil Huggins, Vice President, Security Science 11/9/2014
  • 2. SECURITY SCIENCE 2 Agenda  Big Data and Cyber  Situational Awareness  Security Analytics Beyond Cyber
  • 3. 3 Big Data and Cyber Security
  • 4. SECURITY SCIENCE 4 Big Data?  Over-used buzzword.  Doug Laney defined 3Vs in 2001  Gartner promoted 3Vs in 2012 Google Trends “Big Data” search interest over time The 3Vs Volume Velocity Variety Value Veracity
  • 5. SECURITY SCIENCE Big Data Disciplines  More useful to break Big Data down by activities you actually do: • Decision Making Data-Driven Management Data Science • Analytics, Sense-Making • Technology, Nuts and Bolts Data Engineering
  • 6. SECURITY SCIENCE 6 Data Lakes & CoEs  The data lake, an enterprise-wide Big Data platform, is emerging in large scale businesses. • Concentration of data • Concentration of technology  Tends to be associated with Big Data “Centres of Excellence”. • Concentration of Data Engineering skills • Concentration of Data Science skills • The CoEs are often hunting for well-defined early adopter Use Cases to prove their value. • The Data Lakes provide unexpected opportunities for ‘data enrichment’ across organisational boundaries.
  • 7. SECURITY SCIENCE 7 Why Big Data for Cyber Security?  Cyber Security is increasingly a data problem.  We are collecting, processing and analysing more and more data in order to address the threat landscape. • Known threat indicators • Indicator targeted subsets of monitoring data • Assumes in advance what the risk is • Near real-time analysis with limited memory Network Monitoring using SIEM
  • 8. SECURITY SCIENCE 8 What are the main Cyber Security use cases for Big Data?  Early adoption, provable ROI, vendor can develop a PoC without a customer • Probable matches to likely/possible threat methods • All the monitoring data over a longer period of time • Retroactive analysis using intelligence feeds • Combining internal and external data sources Network Behavioural Analytics • More context and more data to investigate • Single screen analysis • Faster automated tooling for entity resolution and event resolution • Variety of visualisations available, timeline visualisation especially key Data-enabled Investigation
  • 9. SECURITY SCIENCE Tools • Hardware and software components • Configuration and utilization of solution components People • Skills of people involved • Engagement of necessary stakeholders • Training available Process • Essential processes for solution to work • Includes management of tools, knowledge, intelligence and people Data Sources • The raw data from a variety of tools across the environment. • Includes sensors, security alerts and log files. Intelligence • Data that provides the necessary context to enrich, interpret and prioritize analytic results Knowledge •The goal of the data analysis which is both delivered to stakeholders and better informs further questions of the data 9 What is a Big Data Security Analytics Capability?
  • 10. SECURITY SCIENCE 10 What does a Big Data Security Analytics solution look like?
  • 11. SECURITY SCIENCE 11 How does the Security Analytics team fit into an existing Security Team?
  • 13. SECURITY SCIENCE 13 What is Situational Awareness?  Large body of academic work  A variety of different processual vs cognitive models suggested  Warning! The science is not robust in this area.  Dr Mica Endsley described the popular three stage model in 1995  Correlation with John Boyds OODA Loop. SITUATIONAL AWARENESS PERCEIVE UNDERSTAND PREDICT
  • 14. SECURITY SCIENCE 14 How does Situational Awareness fit into Cyber Security? OPERATIONAL CYBER SECURITY OBSERVE ORIENTATE DECIDE ACT SITUATIONAL AWARENESS OPERATORS HUNTERS RESPONDERS RESOLVERS AUTOMATION?
  • 15. SECURITY SCIENCE 15 How does Situational Awareness fit into Security Management? SECURITY MANAGMENT PLAN DO CHECK ACT STUDY SITUATION SET GOALS PLAN ACTIVITIES MEASURE SUCCESS STUDY RESULTS IMPROVE & STANDARDISE DELIVER ACTIVITIES SITUATIONAL AWARENESS SITUATIONAL AWARENESS AUTOMATION?
  • 16. 16 Security Analytics Beyond Cyber
  • 17. SECURITY SCIENCE 17 Why Data-Driven Security Management? “The dearth of metrics and decision-making tools places the determination of Information Security risk to the enterprise on the judgment of IT security practitioners.” INFOSEC Research Council “At present, the practice of measuring security is very ad-hoc. Many of the processes for measurement and metric selection are mostly or completely subjective or procedural.” Department of Homeland Security  Most security decisions made in absence of good data.  Best/Good Practice is “cargo cult security”.
  • 18. SECURITY SCIENCE 18 Low Hanging Fruit – Quantitative Security Management  Mixed Data Sources, Visualisation, Sets of Questions, Summary Statistics  Trend Analysis, Security Posture, Perimeter View, Operational KPIs, Controls Performance  Good indicator is large Excel sheets with complex pivot tables • Multiple data sources; vuln scanners or probes, hardware inventory, cmdb, patch servers, SOC monitoring, external information feeds • Multiple clear questions. • Candidate for Question-Focused Dataset Vulnerability Management • Multiple data sources; risk register, project plans, incident reports, SOC feed, audit reports • Multiple stakeholders with distinct interests • Candidate for Interactive Visualisation Executive Dashboard
  • 19. SECURITY SCIENCE 19 Big Data Security Analytics Opportunities  Once the Cyber use cases have been implemented there are opportunities to operationalise and potentially automate some aspects of security management activities • Continuous monitoring, not just an annual phishing exercise • Enrich with HR data • Report on trends and effectiveness of awareness programs and training events • Targeted training Risky Staff Behaviour • Pre-Approved Change Controls at agreed risk thresholds • Firewall, network and server configuration changes • Increased targeted monitoring • Distribution of IOCs to multiple endpoints Automated Incident Response
  • 20. SECURITY SCIENCE 20 The Future - Hypothesis-Driven Security Management  Experiments to identify the effectiveness of security activities and controls in your environment  Multiple iterations following the Deming cycle  Replace Best/Good Practice with the Right Practice for You  Key skills: 1. Forming a useful, practical and measurable hypothesis 2. Achieving executive support for management experimentation 3. Understanding and applying the results to the business • Some of these are Data Scientist skills, some are CISO skills. • The CISO of the future will need to understand how to talk to Data Scientists productively!
  • 21. 21 Conclusion  There are no silver bullets!  We will still need humans in the loop but automation will allow us to do more with less  Build open cyber big data analytics platforms  Invest in analytics skills now  Security is transforming from a subjective art to a data and automation discipline
  • 22. THANK YOU strozfriedberg.com Phil Huggins, Vice President T: +44 207 061 2299 phuggins@strozfriedberg.com