SlideShare a Scribd company logo
1 of 21
The 3 Generations of
Security Operations
Centres
Our journey to a modern SOC
Daily payments UK GDP / day Staff Endpoints CDC staff
£630B 1/3 4,000 10,000 12
Detect and respond to cyber-attacks
against the Bank of England
Security tools detect
your attacks
1.0 Alert driven
Problems with an alert driven SOC
Expensive humans triaging
alerts you have little control
over
Alert fatigue
How do you detect attacks
your vendors have no
knowledge of?
Known unknowns
Reliant on your security
vendor tools to detect
attacks
Vendor reliance
Time for change
Attacker groups, tactics,
techniques or procedures
known by the Bank
Unknown attacks
Attacker groups, tactics,
techniques or procedures
known by the Bank
Unknown attacks
Attacker groups, tactics,
techniques or procedures
known by the Bank
Unknown attacks
High volume untargeted attacks Low volume targeted bespoke attacks
High sophistication
Low sophistication
Attacker groups, tactics,
techniques or procedures
known by the Bank
Unknown attacks
Attacker groups, tactics,
techniques or procedures
known by the Bank
Unknown attacks
High sophistication
Low sophistication
High volume untargeted attacks Low volume targeted bespoke attacks
Log
analysis
Large scale data
mining – attack
discovery
Threat
intelligence
matching
Preventative
controls
Security tools detect
your attacks
1.0 Alert driven
Data and tools to discover
unknown attacks
2.0 Discovery driven
SOC 2.0 - Attack discovery
Enabling your analysts to discover unknown attacks through data mining
Think beyond traditional
security logs
Data
As attackers change
techniques, so will you
Continual improvement
Consider how your analysts
will learn about the latest
attacker tactics, techniques
and procedures
Attacker knowledge
2.0 Operating model
Threat
intelligence
Data
analytics
Incident
response
Understanding our attackers’
tactics, techniques and
procedures
25% of analysts
Continually
developing new
Splunk searches
looking for latest
attacker
behaviour
50% of analysts
Responding to
suspicious
behaviours
25% of analysts
75%
75% of SOC analysts
focused on improving
detection
Security tools detect
your attacks
1.0 Alert driven
Data and tools to discover
unknown attacks
2.0 Discovery driven
Rise of the robots
3.0 Automation driven
SOC 3.0
Our automation aims
Can we free up expensive
human analysts?
Automated triage and IR
Can we bring together all
SOC process and encourage
silo reduction?
Reducing silos
Can we bring infrastructure
as code principles to the
SOC?
Infrastructure as code
Why do you want to
detect this attack?
Threat
intel
How are you going to
detect the attack?
Splunk
search
How do you prove
your detection works?
Test
criteria
How will you triage
results?
Triage
actions
How will you respond
to the attack?
Response
actions
Threat
intel
Splunk
search
Test
criteria
Triage
actions
Response
actions
Threat
intel
Splunk
search
Test
criteria
Triage
actions
Response
actions
Deploy using automation
Threat
intel
Splunk
search
Test
criteria
Triage
actions
Response
actions
Defence template
Threat
intel
Splunk
search
Test
criteria
Triage
actions
Response
actions
Defence template
Triage
actions
Response
actions
Defence template
Response
actions
Defence template
Response
actions
Defence template
Type 1 - Human triage and response Type 2 - Human response
Type 4 - Fully automatedType 3 - Human verification
4.0 Prediction
• Many years worth of incident and attack data
• Can we identify (predict) the precursors of an
attack?
• Intervene before the attack can occur using
automation?
The future
Identifying precursors to
an attack and proactively
intervening
2 Only you can know your adversaries, your
environment and your business. Your
security vendors cannot. Invest in your
people.
Don’t be driven by your technology
1 Your operating model is just as important
as your technology.
Operating model first
3 If you're not constantly developing new
ways of detecting attacks, your
monitoring is getting worse every day.
Continual improvement
4 Every organisation’s threat profile is
different. Build a Security Operations
Centre proportionate to your threats.
Build a proportionate SOC
Key takeaways
Splunk at the Bank of England

More Related Content

What's hot

Power of Splunk Search Processing Language (SPL)
Power of Splunk Search Processing Language (SPL)Power of Splunk Search Processing Language (SPL)
Power of Splunk Search Processing Language (SPL)Splunk
 
Splunk 101
Splunk 101Splunk 101
Splunk 101Splunk
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
IT Governance Presentation
IT Governance PresentationIT Governance Presentation
IT Governance Presentationjmcarden
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability SessionSplunk
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Turnkey Network Services - Aviat Networks
Turnkey Network Services - Aviat NetworksTurnkey Network Services - Aviat Networks
Turnkey Network Services - Aviat NetworksAviat Networks
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course contentShivamSharma909
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseSplunk
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
SAP INTEGRATIONS WITH SERVICENOW
SAP INTEGRATIONS WITH SERVICENOWSAP INTEGRATIONS WITH SERVICENOW
SAP INTEGRATIONS WITH SERVICENOWAspediens
 
Getting started with Splunk - Break out Session
Getting started with Splunk - Break out SessionGetting started with Splunk - Break out Session
Getting started with Splunk - Break out SessionGeorg Knon
 
SplunkLive! München - Flughafen München
SplunkLive! München - Flughafen MünchenSplunkLive! München - Flughafen München
SplunkLive! München - Flughafen MünchenSplunk
 
Taking Splunk to the Next Level - Management
Taking Splunk to the Next Level - ManagementTaking Splunk to the Next Level - Management
Taking Splunk to the Next Level - ManagementSplunk
 
SplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use CaseSplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use CaseSplunk
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiDataWorks Summit
 
Building Cloud Competencies
Building Cloud CompetenciesBuilding Cloud Competencies
Building Cloud Competenciesit-workforce.com
 

What's hot (20)

Splunk overview
Splunk overviewSplunk overview
Splunk overview
 
PACE-IT: The Importance of Network Segmentation
PACE-IT: The Importance of Network SegmentationPACE-IT: The Importance of Network Segmentation
PACE-IT: The Importance of Network Segmentation
 
Power of Splunk Search Processing Language (SPL)
Power of Splunk Search Processing Language (SPL)Power of Splunk Search Processing Language (SPL)
Power of Splunk Search Processing Language (SPL)
 
Splunk 101
Splunk 101Splunk 101
Splunk 101
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
IT Governance Presentation
IT Governance PresentationIT Governance Presentation
IT Governance Presentation
 
Splunk-Presentation
Splunk-Presentation Splunk-Presentation
Splunk-Presentation
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Turnkey Network Services - Aviat Networks
Turnkey Network Services - Aviat NetworksTurnkey Network Services - Aviat Networks
Turnkey Network Services - Aviat Networks
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
SAP INTEGRATIONS WITH SERVICENOW
SAP INTEGRATIONS WITH SERVICENOWSAP INTEGRATIONS WITH SERVICENOW
SAP INTEGRATIONS WITH SERVICENOW
 
Getting started with Splunk - Break out Session
Getting started with Splunk - Break out SessionGetting started with Splunk - Break out Session
Getting started with Splunk - Break out Session
 
SplunkLive! München - Flughafen München
SplunkLive! München - Flughafen MünchenSplunkLive! München - Flughafen München
SplunkLive! München - Flughafen München
 
Taking Splunk to the Next Level - Management
Taking Splunk to the Next Level - ManagementTaking Splunk to the Next Level - Management
Taking Splunk to the Next Level - Management
 
SplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use CaseSplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use Case
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
 
Building Cloud Competencies
Building Cloud CompetenciesBuilding Cloud Competencies
Building Cloud Competencies
 

Similar to Splunk at the Bank of England

10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton ChuvakinAnton Chuvakin
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfinfosec train
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfShivamSharma909
 
Cyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdfCyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdfCyberhunter Cyber Security
 
Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)ENOInstitute
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...Adrian Sanabria
 
NCC Group Pro-active Breach Discovery: Network Threat Assessment
NCC Group Pro-active Breach Discovery: Network Threat AssessmentNCC Group Pro-active Breach Discovery: Network Threat Assessment
NCC Group Pro-active Breach Discovery: Network Threat AssessmentOllie Whitehouse
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Happiest Minds Technologies
 
Threat Intelligence Making your Bespoke Security Operations Centre Work for Y...
Threat Intelligence Making your Bespoke Security Operations Centre Work for Y...Threat Intelligence Making your Bespoke Security Operations Centre Work for Y...
Threat Intelligence Making your Bespoke Security Operations Centre Work for Y...maximumnetworks
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
Reducing cyber risks in the era of digital transformation
Reducing cyber risks in the era of digital transformationReducing cyber risks in the era of digital transformation
Reducing cyber risks in the era of digital transformationSergey Soldatov
 
SOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfSOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfinfosec train
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
SFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfSFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfBecky Burwell
 
ITD BSides PDX Slides
ITD BSides PDX SlidesITD BSides PDX Slides
ITD BSides PDX SlidesEricGoldstrom
 
Intelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseIntelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseEMC
 
Threat Intelligence + Secuirity Monitoring
Threat Intelligence + Secuirity MonitoringThreat Intelligence + Secuirity Monitoring
Threat Intelligence + Secuirity MonitoringTalha Riaz
 
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxOutsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxmanas23pgdm157
 

Similar to Splunk at the Bank of England (20)

Threat Hunters
Threat HuntersThreat Hunters
Threat Hunters
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
 
Cyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdfCyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdf
 
Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
 
NCC Group Pro-active Breach Discovery: Network Threat Assessment
NCC Group Pro-active Breach Discovery: Network Threat AssessmentNCC Group Pro-active Breach Discovery: Network Threat Assessment
NCC Group Pro-active Breach Discovery: Network Threat Assessment
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime
 
Threat Intelligence Making your Bespoke Security Operations Centre Work for Y...
Threat Intelligence Making your Bespoke Security Operations Centre Work for Y...Threat Intelligence Making your Bespoke Security Operations Centre Work for Y...
Threat Intelligence Making your Bespoke Security Operations Centre Work for Y...
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
Reducing cyber risks in the era of digital transformation
Reducing cyber risks in the era of digital transformationReducing cyber risks in the era of digital transformation
Reducing cyber risks in the era of digital transformation
 
SOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfSOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdf
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
SFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfSFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdf
 
ITD BSides PDX Slides
ITD BSides PDX SlidesITD BSides PDX Slides
ITD BSides PDX Slides
 
Intelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseIntelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and Response
 
Threat Intelligence + Secuirity Monitoring
Threat Intelligence + Secuirity MonitoringThreat Intelligence + Secuirity Monitoring
Threat Intelligence + Secuirity Monitoring
 
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxOutsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
 

More from Splunk

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routineSplunk
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTVSplunk
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)Splunk
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank InternationalSplunk
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett Splunk
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)Splunk
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...Splunk
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...Splunk
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)Splunk
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)Splunk
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College LondonSplunk
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSplunk
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - KeynoteSplunk
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform SessionSplunk
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security SessionSplunk
 
Inside SecOps at bet365
Inside SecOps at bet365 Inside SecOps at bet365
Inside SecOps at bet365 Splunk
 

More from Splunk (20)

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 
Inside SecOps at bet365
Inside SecOps at bet365 Inside SecOps at bet365
Inside SecOps at bet365
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Splunk at the Bank of England

  • 1. The 3 Generations of Security Operations Centres Our journey to a modern SOC
  • 2.
  • 3. Daily payments UK GDP / day Staff Endpoints CDC staff £630B 1/3 4,000 10,000 12
  • 4. Detect and respond to cyber-attacks against the Bank of England
  • 5. Security tools detect your attacks 1.0 Alert driven
  • 6. Problems with an alert driven SOC Expensive humans triaging alerts you have little control over Alert fatigue How do you detect attacks your vendors have no knowledge of? Known unknowns Reliant on your security vendor tools to detect attacks Vendor reliance
  • 8. Attacker groups, tactics, techniques or procedures known by the Bank Unknown attacks
  • 9. Attacker groups, tactics, techniques or procedures known by the Bank Unknown attacks Attacker groups, tactics, techniques or procedures known by the Bank Unknown attacks High volume untargeted attacks Low volume targeted bespoke attacks High sophistication Low sophistication
  • 10. Attacker groups, tactics, techniques or procedures known by the Bank Unknown attacks Attacker groups, tactics, techniques or procedures known by the Bank Unknown attacks High sophistication Low sophistication High volume untargeted attacks Low volume targeted bespoke attacks Log analysis Large scale data mining – attack discovery Threat intelligence matching Preventative controls
  • 11. Security tools detect your attacks 1.0 Alert driven Data and tools to discover unknown attacks 2.0 Discovery driven
  • 12. SOC 2.0 - Attack discovery Enabling your analysts to discover unknown attacks through data mining Think beyond traditional security logs Data As attackers change techniques, so will you Continual improvement Consider how your analysts will learn about the latest attacker tactics, techniques and procedures Attacker knowledge
  • 13. 2.0 Operating model Threat intelligence Data analytics Incident response Understanding our attackers’ tactics, techniques and procedures 25% of analysts Continually developing new Splunk searches looking for latest attacker behaviour 50% of analysts Responding to suspicious behaviours 25% of analysts 75% 75% of SOC analysts focused on improving detection
  • 14. Security tools detect your attacks 1.0 Alert driven Data and tools to discover unknown attacks 2.0 Discovery driven Rise of the robots 3.0 Automation driven
  • 15. SOC 3.0 Our automation aims Can we free up expensive human analysts? Automated triage and IR Can we bring together all SOC process and encourage silo reduction? Reducing silos Can we bring infrastructure as code principles to the SOC? Infrastructure as code
  • 16. Why do you want to detect this attack? Threat intel How are you going to detect the attack? Splunk search How do you prove your detection works? Test criteria How will you triage results? Triage actions How will you respond to the attack? Response actions Threat intel Splunk search Test criteria Triage actions Response actions
  • 18. Defence template Triage actions Response actions Defence template Response actions Defence template Response actions Defence template Type 1 - Human triage and response Type 2 - Human response Type 4 - Fully automatedType 3 - Human verification
  • 19. 4.0 Prediction • Many years worth of incident and attack data • Can we identify (predict) the precursors of an attack? • Intervene before the attack can occur using automation? The future Identifying precursors to an attack and proactively intervening
  • 20. 2 Only you can know your adversaries, your environment and your business. Your security vendors cannot. Invest in your people. Don’t be driven by your technology 1 Your operating model is just as important as your technology. Operating model first 3 If you're not constantly developing new ways of detecting attacks, your monitoring is getting worse every day. Continual improvement 4 Every organisation’s threat profile is different. Build a Security Operations Centre proportionate to your threats. Build a proportionate SOC Key takeaways

Editor's Notes

  1. Good morning everyone, Thank you for attending our presentation, we hope you find it useful. Before we start, just so we can get a feel for the room, please can you put your hand up if you work in or have an interest in cyber security?
  2. JP: I’m Jonathan Pagett and I head up the cyber defence centre at the Bank of England. Carly: Data Analytics Lead in the Cyber Defence Centre, responsible for our detection use cases. I spend most of my day in Splunk writing search code in order to achieve this.
  3. JP: I imagine most people will know who the Bank of England is, but just in case there are some international visitors in the audience, we are the UK’s central Bank. Of the normal services you would expect a central bank to provide, from a cyber security perspective our most important assets are our payment systems, in particular the UK’s real time gross settlement system which acts as the backbone of the UK financial system. This is in addition to a large amount of sensitive information such as UK financial policy and information that other banks provide us as part of our regulatory requirements.
  4. JP: Everybody likes numbers, so I wanted to share some to describe our organisation. We are an organisation of just over 4000 people and our cyber security division is made up of around 70 people. This includes 12 within the cyber defence centre. In terms of the number of payments we process, its around a third of the UK GDP everyday.
  5. JP: Moving to the cyber defence centre, our mission is to detect and respond to cyber attacks against the Bank of England. It’s quite a simple mission statement, but those of you who work in security operations will know that this if far from easy to achieve. We wanted to share with you some of the challenges and our journey over the last 5 years in how we have evolved to met this.
  6. Carly: We started our journey back in 2014. BoE had spent money on a wide variety of commercial security tools. The strategy was driven mainly by vendors. At this time, the first iteration of the BoE SOC came about, We like to refer to this as SOC 1.0. We were a purely reactive SOC, responding to alert from the commercial tools. Our role, as analysts, was to verify that the tools had alerts correctly and ensure measures taken by the tools were as expected, For example - Anti-virus correctly identified a malicious web redirect and has blocked the traffic. This verification would be documented, but we typically wouldn’t feed anything back in to our processed. This is in part due to the fact we were using commercial tools, typical black boxes where analysts are privy to the alert logic and cannot modify or amend. Furthermore, indicators of compromise we received from forums or vendors were manually checked by analysts.
  7. Carly: So, hopefully you can see where this is going… we started to identify some problems with this operating model. Putting expensive analysts to work, just to verify something like an AV detection was correct – did not seem like a good use of analyst time. And again analysts weren’t able to improve detections due to the use black box solution where we weren’t able to view or modify alert logic. This gives us two problems: Alert fatigue – as analysts we’d often respond to the same alerts on a daily basis, but without the opportunity to improve detection this led to alert fatigue. We were dependent on vendors having adequate rulesets to detect attacks against us. Which, when considering our quite unique threat profile, as a central bank, it seemed unlikely we could be completely reliant on a broad and general set of signatures from vendors. Granted we did detect some things but… the big question that was regulalrly asked to senior tech staff was “What keeps you up at night?” and the responses weren’t “Does everything have AV on it?” it was …. How could we detect the more targeted attacks - the unknown threat?
  8. JP: Faced with seeing the need to evolve, we took a moment to pause, and redesign our detection strategy. Ignoring all the technology we had, what would our detection strategy be if we designed from scratch? Do we have a coherent detection strategy covering all the different types of threat actors that might target the Bank? Speaking with a lot of security operation centres, when I ask what their detection strategy is, they always say we have got technology X or Y but not an overarching strategy so we decided to write one.
  9. JP: At its most simple level, we consider attackers to belong in two categories – attackers we know about and those we don’t. When I say attackers we know about, that might be we have in house knowledge of how they conduct their attacks, or it might be knowledge of attacks that is baked into our security tools we have bought. A simple example being our network intrusion prevention systems get updates for our vendor, leveraging the knowledge of their security teams.
  10. JP: We then break these two categories out, along two axis, Firstly how sophisticated the attackers operation is – and I’m talk more than just how sophisticated the malware is, if malware is used. I’m talking about the attackers operation as a whole. Secondly, how targeted is the attacker against. Are they an attack after a wide range of organisations and are failing indiscriminate? Or are they after just one organisation? This roughly translates into the volume of attacks we can expect to see across different organisations. We do this so we can start mapping different attacks on this grid. For example, the Bank of Bangladesh attack, where they tried to steal 1 Billion dollars, and ultimately managed to steal 81 million, would be in the top right corner. It was a sophisticated operation and extremely targeted at just one organisation. Where as on the other hand something like a widespread ransomware attack might be delivered to a range of organisations.
  11. JP: The reason we do this is to overlay our detection strategy on top.
  12. JP
  13. JP
  14. Carly: At the core of this is our operating model. This brings together the vital operational functions of SOC2.0. 1. The process of data driven detection begins with Threat Intelligence. This could be from intel vendors, open source, home-grown incident data, pentest reporting or discussions had between different teams in the bank. The purpose of intel gathering is to pull out the tactic, techniques and procedures (aka TTPs). We wanted to understand the typical trends of our attackers, who and how they normally target. 2. This information feeds in to the Data Analytics section of the team, my part of the team, analysts take TTPs and generalise them to behaviours. Analysts will then code these up in splunk searches. For example....                 - Looking at entropy of DNS queries to detect data exfiltration OR          - Baselining typical netflow from groups of devices to try to identify lateral movement OR          - Clustering powershell commands to identify outliers that could indicate a malware infection These scheduled searches then generate events, which, using a variety of methods including risk scoring these searches will trigger alerts that will be triaged by the incident responders on duty. 3. As with all SOCs incident response is at the heart of our purpose, the key improvement we made during the SOC2.0 transition was to ensure incident data is fed back in to the cycle via the threat intelligence function. By doing this we can learn from where attackers slipped through our security undetected and model specific threats to BoE and be able to capture their general behaviours next time, even if they do switch up infrastructure or specific fingerprints of their attack.
  15. JP: Following on from a few years of successfully running our SOC 2.0 model, our third generation is centred around automation.
  16. JP: Our automation aims centre around 3 outcomes: Like everyone else we are keen to automate as much of our triage and incident response actions as possible, freeing up our expensive analysts to work on what people do best, the more creative tasks within the CDC. We are also keen on taking infrastructure as code principles and applying them to a SOC, which I will come back to in a minute. And lastly we want to help reduce some of the silos that have developed within the SOC, encouraging our analysts to thing of the full end to end process rather than the piece of the puzzle they are responsible for.
  17. JP: Within the SOC we have 5 main components ranging from splunk searches through to response actions. These are all configured in different tools and generally considered in isolation, but this hinders our automation aims.
  18. JP: We have introduced the concept of a defence template, a single piece of code, similar in concept to an AWS cloud formation template, that contains all the components that describe the end to end processes of the SOC. As all components are defined in a single document, it requires our analysts to think of every component together rather than in isolation. It also allows us to then automatically deploy the template against our SOC infrastructure.
  19. JP: Moving on from the automated deployment of defence templates, we also look at which templates are suitable to automate their triage and response actions. As part of defining our templates, we appreciate that not all triage and response actions can be fully automated. To this end we have introduced 4 types of defence templates each with varying levels of automation. Most new defence templates start life as a type 1 – where we still get humans to perform the triage and response actions. As we gain more confidence in the template, we then move it through the levels to a type 4, where the template is fully automated.
  20. Carly: Moving in to the more forward thinking space, as we've gone through the different evolutions of the SOC, we're gathered up a vast amount of contextual information. For example, incident data (consisting of true positive, real attack data and a whole lot of false positives). We've also grown a collection of TTPs, risk scores for assets and we're working towards applying this on high value users. So how can we use all this extra data with our raw telemetry to our benefit?, Trying to prevent and intervene in attacks before they can affect us. Similar to the way police are able to use crime data and statistics to identify crime hotspots and predict when an area is at higher risk of a crime occurring, we want to apply similar methodology with cyber security. This tied in with automation of SOC3.0 could allow us to identify triggers of early warnings/flashpoints and predefined proactive measures to shut down a risky situation before anything could happen.                 - Identify a user that has exhibited a specific pattern of risky behaviours that we've established from a previous attack and isolating, enhanced monitoring etc before anything bad can happen                 - Identifying a newly registered domain that could pose a risk to the Bank via phishing or a waterhole attack, and blocking this before anything bad can occur. Think – Minority report for Cyber Attacks.
  21. JP