SlideShare a Scribd company logo
Enviar pesquisa
Carregar
Entrar
Cadastre-se
.conf Go Zurich 2022 - Security Session
Denunciar
Splunk
Seguir
Splunk
6 de Oct de 2022
•
0 gostou
•
58 visualizações
1
de
33
.conf Go Zurich 2022 - Security Session
6 de Oct de 2022
•
0 gostou
•
58 visualizações
Denunciar
Tecnologia
.conf Go Zurich Oct 4th 2022 - Security Session Speakers: Le-Khanh Au Juerg Fischer
Splunk
Seguir
Splunk
Recomendados
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
Amazon Web Services
677 visualizações
•
22 slides
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...
AWS Summits
286 visualizações
•
22 slides
Securing Your Public Cloud Infrastructure
Qualys
4.4K visualizações
•
41 slides
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
1K visualizações
•
40 slides
Managed security services
manoharparakh
68 visualizações
•
21 slides
AWS live hack: Atlassian + Snyk OSS on AWS
Eric Smalling
248 visualizações
•
20 slides
Mais conteúdo relacionado
Similar a .conf Go Zurich 2022 - Security Session
Splunk for Enterprise Security Featuring UBA
Splunk
2.1K visualizações
•
53 slides
Slide Griffin - Practical Attacks and Mitigations
EnergySec
547 visualizações
•
35 slides
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk
700 visualizações
•
52 slides
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA Cyber Security
3.4K visualizações
•
48 slides
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
1.2K visualizações
•
119 slides
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte
160 visualizações
•
40 slides
Similar a .conf Go Zurich 2022 - Security Session
(20)
Splunk for Enterprise Security Featuring UBA
Splunk
•
2.1K visualizações
Slide Griffin - Practical Attacks and Mitigations
EnergySec
•
547 visualizações
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk
•
700 visualizações
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA Cyber Security
•
3.4K visualizações
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
•
1.2K visualizações
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte
•
160 visualizações
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
Splunk
•
395 visualizações
SplunkLive! - Splunk for Security
Splunk
•
1.5K visualizações
Inherent Security Design Patterns for SDN/NFV Deployments
OPNFV
•
834 visualizações
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
•
1.1K visualizações
Splunk for Enterprise Security and User Behavior Analytics
Splunk
•
3.2K visualizações
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec
•
334 visualizações
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk
•
603 visualizações
Splunk for Security Breakout Session
Splunk
•
1.8K visualizações
Building a Security Architecture
Cisco Canada
•
4.7K visualizações
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security
•
956 visualizações
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
•
2.7K visualizações
Gain visibility & real-time actionable security alerts with VPC Flow Logs & A...
Amazon Web Services
•
421 visualizações
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk
•
469 visualizações
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Amazon Web Services
•
728 visualizações
Mais de Splunk
Splunk x Freenet - .conf Go Köln
Splunk
91 visualizações
•
18 slides
Splunk Security Session - .conf Go Köln
Splunk
174 visualizações
•
54 slides
Data foundations building success, at city scale – Imperial College London
Splunk
80 visualizações
•
15 slides
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk
125 visualizações
•
15 slides
SOC, Amore Mio! | Security Webinar
Splunk
455 visualizações
•
31 slides
.conf Go 2022 - Observability Session
Splunk
285 visualizações
•
26 slides
Mais de Splunk
(20)
Splunk x Freenet - .conf Go Köln
Splunk
•
91 visualizações
Splunk Security Session - .conf Go Köln
Splunk
•
174 visualizações
Data foundations building success, at city scale – Imperial College London
Splunk
•
80 visualizações
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk
•
125 visualizações
SOC, Amore Mio! | Security Webinar
Splunk
•
455 visualizações
.conf Go 2022 - Observability Session
Splunk
•
285 visualizações
.conf Go Zurich 2022 - Keynote
Splunk
•
42 visualizações
.conf Go Zurich 2022 - Platform Session
Splunk
•
82 visualizações
Inside SecOps at bet365
Splunk
•
956 visualizações
IT Sicherheitsgesetz 2.0
Splunk
•
988 visualizações
Risikowahrnehmung und Cyber-Resilienz Herausforderungen in der Angriffserkennung
Splunk
•
123 visualizações
Der Weg in den vollautomatisierten SOC Betrieb
Splunk
•
242 visualizações
Die Grundlagen für den KI gestützten IT-Betrieb
Splunk
•
173 visualizações
SVA: Digitaler Föderalismus
Splunk
•
117 visualizações
Computacenter: Public Sector Digital Labor
Splunk
•
190 visualizações
Splunk Webinar: Full-Stack End-to-End SAP-Monitoring mit Splunk
Splunk
•
555 visualizações
Best of .conf21 Session Recommendations
Splunk
•
293 visualizações
Best of Conf21 - Apietsch
Splunk
•
1.2K visualizações
Catch these Sessions on-demand at .conf Online
Splunk
•
308 visualizações
.conf21 Recommended Sessions for Security Beginners
Splunk
•
232 visualizações
Último
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
TrustArc
34 visualizações
•
21 slides
Prompt Engineering - an Art, a Science, or your next Job Title?
Maxim Salnikov
16 visualizações
•
28 slides
Safe Community Call #12.pdf
LornyPfeifer
14 visualizações
•
24 slides
Keynote: Two years at the British Library... and counting / Alan Danskin (Bri...
CILIP MDG
22 visualizações
•
33 slides
Die ultimative Anleitung für HCL Nomad Web Administratoren
panagenda
57 visualizações
•
71 slides
Knowledge graph use cases in natural language generation
Elena Simperl
83 visualizações
•
47 slides
Último
(20)
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
TrustArc
•
34 visualizações
Prompt Engineering - an Art, a Science, or your next Job Title?
Maxim Salnikov
•
16 visualizações
Safe Community Call #12.pdf
LornyPfeifer
•
14 visualizações
Keynote: Two years at the British Library... and counting / Alan Danskin (Bri...
CILIP MDG
•
22 visualizações
Die ultimative Anleitung für HCL Nomad Web Administratoren
panagenda
•
57 visualizações
Knowledge graph use cases in natural language generation
Elena Simperl
•
83 visualizações
Connecting Africa.docx
Eric Annan
•
13 visualizações
Roottoo Innovation V24_CP.pdf
roottooinnovation
•
23 visualizações
Getting your enterprise ready for Microsoft 365 Copilot
Vignesh Ganesan I Microsoft MVP
•
74 visualizações
Advancing Equity and Inclusion for Deaf Students in Higher Education
3Play Media
•
141 visualizações
Elevate Your Enterprise with FME 23.1
Safe Software
•
271 visualizações
Future of Skills
Alison B. Lowndes
•
33 visualizações
web test repair.pptx
YuanzhangLin
•
25 visualizações
info_session_gdsc_tmsl .pptx
NikitaSingh741518
•
14 visualizações
Webinar: Discover the Power of SpiraTeam - A Jira Alternative To Revolutioniz...
Inflectra
•
32 visualizações
BuilderAI Proposal_Malesniak
Michael Lesniak
•
84 visualizações
Google Cloud Study Jams Info Session
GDSCPCCE
•
20 visualizações
Demystifying ML/AI
Matthew Reynolds
•
23 visualizações
Framing Few Shot Knowledge Graph Completion with Large Language Models
MODUL Technology GmbH
•
25 visualizações
Scaling out with WordPress
Konstantin Kovshenin
•
54 visualizações
.conf Go Zurich 2022 - Security Session
1.
© 2022 SPLUNK
INC. Security Session October 4th, Zurich
2.
© 2022 SPLUNK
INC.
3.
© 2022 SPLUNK
INC. Speaker Security Advisor Le-Khanh Au Manager Sales Engineering | Alps Security Spearhead Juerg Fischer
4.
© 2022 SPLUNK
INC. Agenda Cyber Security Resilience PMI Story: Application Monitoring at Scale Top 3 CISO priorities Conclusion
5.
© 2022 SPLUNK
INC. Cyber Security Resilience Source: World Economic Forum
6.
© 2022 SPLUNK
INC. The Data-Centric Modern SOC Threat Detection, Investigation and Response Data Platform Intelligence Management Threat Research Analytics Automation and Orchestration Detect/Correlate Predict/Prevent Discover/Prepare Analyze/Investigate Report/Comply Triage/Respond Unparalleled Ecosystem • Apps • Technical architectures • Connections • Partners • Community
7.
© 2022 SPLUNK
INC. Application Monitoring at Scale
8.
© 2022 SPLUNK
INC. Threat Modeling ● Define Scope and Depth ● Identify and Prioritize Threats ● Structured Process Identify Assets Identify Threats & Risk Understand Line of Business Countermeasure & Gap Analysis Outline Architecture
9.
© 2022 SPLUNK
INC. Challenge ● Complex Process ● Lack of Engagement ● Asset Repository & Scoping ● Legacy Systems
10.
© 2022 SPLUNK
INC. Security Monitoring Journey ● End-to-End Structured Process ● Improve Engagement ● Measurable Outcome ● Cloud Migration ● Automation 3 1 5 2 4 6 TM Questionnaire Feasibility Assessment Abuser Detection TM Sessions Log Ingestion Remediation Playbook Abuser Monitoring
11.
© 2022 SPLUNK
INC. Self-service Splunk Infrastructure ● Cloud-native Ingestion Pipelines ● Alert Creation/Management Pipelines ● Community Contribution ● Traceability
12.
© 2022 SPLUNK
INC. ● Structured Process ● Automation & Self-service Model Take-aways
13.
© 2022 SPLUNK
INC. Top 3 CISO priorities
14.
© 2022 SPLUNK
INC. CISO Prio 1
15.
© 2022 SPLUNK
INC. Risk Based Alerting A true game changer https://www.splunk.com/en_us/blog/security/risk-based-alerting-the-new-frontier-for-siem.html
16.
© 2022 SPLUNK
INC. How Does This Look in Practice? With risk-based alerting, these events become context that informs high-fidelity alerts Risk Incident Rule: Generate alert for any user or system that exceeds a risk score of 100 in a 24 hour period Aggregated user risk score >100 ALERT With one click, view all of the risk events that contribute to the alert Potential spearphishing observed 10 pts Suspicious command disabling controls 15 pts Suspicious Powershell observed 20 pts AWS ACLs opened up all access 10 pts AWS user provisioning observed 15 pts AWS buckets created 15 pts AWS permanent creation observed 20 pts 6:55AM 6:58AM 7:03AM 1:55PM 2:03PM 2:07PM 2:15PM
17.
© 2022 SPLUNK
INC. CISO Prio 2
18.
© 2022 SPLUNK
INC. Use Case Development CIS Top 20 Controls Recommended set of actions for cyber defense that provide specific and actionable ways to stop today's most pervasive and dangerous attacks Different Frameworks/Process Flows MITRE ATT&CK MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. Customer specific use cases To organize use cases, a use case framework should be used. Such frame- works enable control over use cases and provide insight into identify how well an organization is capable of defending against cyber threats. Content Description 01 - Inventory of Authorized and Unauthorized Devices Actively manage (inventory, track, and correct) all hardware devices on the network so that only authorized devices are given access, and unauthorized and unmanaged devices are found and prevented from gaining access. 02 - Inventory of Authorized and Unauthorized Software Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution. 03 - Secure Configurations for Hardware and Software Establish, implement, and actively manage (track, report on, correct) the security configuration of mobile devices, laptops, servers, and workstations using a rigorous configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings.
19.
© 2022 SPLUNK
INC. Security Content Repository
20.
© 2022 SPLUNK
INC. Prescriptive Content What To Do Next? Security Essentials understands what data you have, and what content you already use. It uses that to recommend
21.
© 2022 SPLUNK
INC. Deliver IOC to ES Alert / Inform Employee Change Severity Check EP Search for Mails Approve Block Mails Check URL Real Use Case: Phishing Mail The Investigation Process to solve a Phishing Mail Incident Core Big Data Platform SIEM Incident Anaylst Handling SOAR Automation & Orchestration Ingest Threat Hunting Check for exiist. IOC Check for exist. User OOTB content Analyst driven ML/AI driven Ingest Event Create Ticket Check URL Change Severity Check User Endpoint Search for similar Emails (Human) Approve Process Block incoming Mail Alert Employes Deliver to Splunk Core/ES Ingest Create Ticket Deliver IOC to Core Block Mails Adaptive Response
22.
© 2022 SPLUNK
INC. Security PVP - Your Security Maturity Index, Search, Monitor & Alert Level 1 ● Use of Pre-built Content ● Centralized Retention and Visibility for all Data ● Security Monitoring Dashboards ● Alerting ● Basic Reporting ● Ad-Hoc Investigation and Incident Response ● Historical Data Analysis 55% Normalize, Correlate & Risk Level 2 ● Data Normalization ● Security Use Case Library ● Risk Awareness and Alert Prioritization ● Threat Intelligence ● Information and Event Correlation ● Notable Event Management ● Triage & Investigation Workflows 50% Collaborate, Hunt & ML Level 3 ● Risk Based Alerting ● Insider Threat Detection ● Semi-Automated Playbooks (Orchestration & Response) ● Pre-Built Machine Learning security content ● Threat Hunting ● Continuous Use Case development ● Incident Collaboration 26% Simulate, Respond & Fully Automate Level 4 ● Risk Reporting ● Full Playbook Automation ● Custom Machine Learning security content ● Stream Processing and stream Analytics ● Attack Simulation ● Effective collaboration & integration with other teams or tools ● Breach Response 36% Security Maturity Reactive Proactive 42% green - implemented | orange - to be implemented medium term | red - highly recommended for the security posture xx% - Maturity today
23.
© 2022 SPLUNK
INC. CISO Prio 3
24.
© 2022 SPLUNK
INC. A Day in the Life of an Analyst Before and after SOAR
25.
© 2021 SPLUNK
INC. © 2022 SPLUNK INC. 97%agree that a SOAR allowed for increased workload maintaining the same number of staff
26.
© 2022 SPLUNK
INC. Conclusion
27.
© 2022 SPLUNK
INC. See Across Your Entire Organization End-to-End visibility that starts with the power of the Splunk platform
28.
© 2022 SPLUNK
INC. Cyber Security Resilience Security Logging & Investigation IT / OT SOC Automation Security Nerve Center © 2022 SPLUNK INC.
29.
© 2022 SPLUNK
INC. Monitoring Net/OS/Virt/App CPU/Mem/Disc Events Logs Metrics Application Traces Databases Networks Servers Virtual Machines Smartphones and Devices Custom Applications Security Web Server Sensors SAP Container IBM OpenWhisk AWS Lambda GCP Functions SIEM SOAR SOC/CERT Triage EDR NDR XDR UEBA Security Operation and Analytics NOC OT CMDB Threat Intel Use Cases ML ML Security Nerve Center Search – Correlate - Investigate – Analyze - Act
30.
© 2022 SPLUNK
INC. Databases Networks Servers Virtual Machines Smartphones and Devices Custom Applications Security Web Server Sensors SAP Container IBM OpenWhisk AWS Lambda GCP Functions SIEM SOAR SOC/CERT Triage EDR NDR XDR UEBA Security Operation and Analytics NOC OT CMDB Threat Intel Use Cases ML ML Security Nerve Center Search – Correlate - Investigate – Analyze - Act Monitoring Net/OS/Virt/App CPU/Mem/Disc Events Logs Metrics Application Traces
31.
© 2022 SPLUNK
INC. Databases Networks Servers Virtual Machines Smartphones and Devices Custom Applications Security Web Server Sensors SAP Container IBM OpenWhisk AWS Lambda GCP Functions SIEM SOAR SOC/CERT Triage EDR NDR XDR UEBA Security Operation and Analytics NOC OT CMDB Threat Intel Use Cases ML ML Security Nerve Center Search – Correlate - Investigate – Analyze - Act Monitoring Net/OS/Virt/App CPU/Mem/Disc Events Logs Metrics Application Traces
32.
© 2022 SPLUNK
INC. Monitoring Net/OS/Virt/App CPU/Mem/Disc Events Logs Metrics Application Traces Databases Networks Servers Virtual Machines Smartphones and Devices Custom Applications Security Web Server Sensors SAP Container IBM OpenWhisk AWS Lambda GCP Functions SIEM SOAR SOC/CERT Triage EDR NDR XDR UEBA Security Operation and Analytics NOC OT CMDB Threat Intel Use Cases ML ML Security Nerve Center Search – Correlate - Investigate – Analyze - Act
33.
© 2022 SPLUNK
INC. Thank You!