SlideShare uma empresa Scribd logo
1 de 23
Gianluca Gaias
Security, Risk & Compliance Director
YOOX NET-A-PORTER Group
Giovanni Curatola
Building an Enterprise-grade Security
Intelligence Platform at YOOX NET-A-PORTER
Group
(Gain the Big Picture)
Personal introduction
Gianluca Gaias, YOOX NET-A-PORTER Group
Security, Risk & Compliance Director
YOOX NET-A-PORTER Group is the global Internet retailing partner
for leading fashion and luxury brands
2
Key Takeaways
From a technology oriented approach to an info-centric approach.
From log correlation to pattern recognition.
From a passive/display platform to a proactive/executive platform.
From standard dashboards to real-time dynamic dashboards.
From a security event to an context-aware security information.
3
Agenda
4
Yoox Group: business and challenges.
Security evolution overview
From Tech Oriented approach to Information Oriented approach
– Deep Investigation
– Proactive Dashboard: IP Blacklist
– Real-time Dynamic Dashboard: Attack Map
Risk Management and Pattern Recognition
– Use Case: Attackers Activity
Reconsidering dashboard design
Next Steps
YOOX NET-A-PORTER GROUP
Over 180 countries served
DCs
US, UK, Italy, China, Hong Kong, Japan
Customer care covering all time zones
Local Offices:
New York, London, Milan, Bologna, Paris,
Hong Kong, Shanghai, Tokyo
Same-Day Delivery in London, Manhattan, Connecticut
and Hong Kong
Digital production facilities
US, UK, Italy, China, Hong Kong, Japan
Butler service and authenticity RFid seal
1 order processed every 4 seconds 1.7 billion revenues
27.1 million active customers
PRO-FORMA 2015 FY
7.1 million orders
27.1 million active customers
Rest of Europe
48.8%
 Global premier online luxury
fashion destination for content
and commerce for the season’s
must-have womenswear
collections
 Unparalleled editorial content,
including its weekly online
magazine THE EDIT and bi-
monthly print magazine PORTER
 Global destination for men’s style
with unparalleled offering from
the season of the leading
menswear, watchmakers and
specialist grooming brands
 Rich editorial content through the
weekly online magazine The
Journal and bi-monthly
newspaper The MR PORTER Post
MULTI-BRAND IN-SEASON MULTI-BRAND OFF-SEASON
Rest of Europe
48.8% The world’s leading online
lifestyle store for fashion, design
and art
 Broad offering of off-season
premium apparel and accessories,
exclusive collections, home &
design and artworks
 The online destination for women
dedicated entirely to in-season
high-end shoes
 Exclusive shoe-related services
and editorial component
Rest of Europe
48.8%
 Go-to destination for previous-
season designer fashion for the
global style-conscious woman
looking for the best designer
products at great prices
 In-house label of styling
essentials “Iris and Ink”
 The luxury online boutique
devoted to creating distinctive
style through an eclectic and
selective in-season assortment of
high fashion and directional
designers for men and women
 Dedicated mini-stores
ONLINE FLAGSHIP STORES
 Official Online Flagship Stores of leading fashion and
luxury brands for which YNAP is the exclusive partner
 Long-term partnerships
and many more …
JVCo with Kering
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
 Proprietary business where YNAP operates as an
e-tailer for the season’s luxury fashion collections under
its four own brand names
 Proprietary business where YNAP operates as an
e-tailer mainly for the previous-season designer fashion
under its two own brand names
“Powered by YOOX NET-A-PORTER GROUP”
YOOX NET-A-PORTER Group: Challenges
7
Keep the trust
– Data Confidentiality
– Data Integrity and Completeness
– Data Processing Transparency
High Availability in hostile enviroment
Gain the big picture:
– Challenge and Enabler
 Shareholders
 Customers
 Stakeholders
Security Evolution Overview
8
0
1
2
3
4
5
6
7
8
9
Data Leakage Prevention
Information Security
Compliance
IPS & Anomaly Detection
Administrative Access
Control
PCI-DSS Compliance
Sites Vulnerability Checks
Code Review
Logical Access
Governance
Security Intelligence
Platform
Online Brand Protection
Privacy Compliance
Information Process
Analysis
2011 2013 2015
Security Evolution – Tech vs Info
Technology Oriented:
– Info confined to technology
– Partial identity definition
– No covered gaps
Information Oriented - Splunk:
– Enrichement of tech logs
– Event correlation
– Clear identity definition
9
From Tech to Info
“From a technology oriented approach to an info-centric approach.”
1
Investigation
1
Investigation: show details
1
Advanced Dashboard: IP Blacklist
• Proactive Dashboard
• One-click blacklist on
Akamai WAF through
Akamai API calls
• Splunk is able to run
a command on input
source
Drilldown
«From a passive/display platform to a
proactive/executive platform»
WAF activity rapresentation: standard dashboard
• Statistical evidences by:
– Source IP
– Attack type
– WAF Action
• Event distribution over the time
• Spike visibility depends from the scale
• Is not evident:
– Attack frequency
– Relation between Source IP, Attack type and
WAF action
Pros Cons
“From standard dashboards to real-time dynamic dashboards”
Real-time Dynamic Dashboard: Attack Map
Security Evolution – Risk Mgmt & Pattern Rec.
Risk Management:
– Correlation of Tech Elements and Business Elements
– Support to quantitative risk analysis
– Assigning Risk value to alerts
Pattern Recognition:
– Different levels of correlation
– Pattern as result of several high-level events from different systems by identity
– Knowledge from historical incidents and analysts experience
– Goal: detect user behavior and recurrent attack patterns
Pattern Recognition
Single security events may be part of a more complex action.
Correlation
Brute Force
Exce. Out Data
High Conn.
Correlation
Level 1
Correlation
Level 2
Correlation
Level n
Data Exfiltration
«From log correlation to pattern recognition»
Sequence
Introduced by high level analyst
Pattern Consolidation
Analyst
Risk Management
“From a security event to
an context-aware security
information”
Risk
Static
Assign.
(Lookup)
N level
correlation
Content
Eval
Usually single security event has a static risk
We need risk value based on content and other events correlated.
Use Case: Attackers Activity
Detect sequence of relevant event by identity
Activity Score: vertical axes, max of the same alert type
Activity Frequency: ball diameter
Pattern Recognition
Risk Value
Reconsidering dashboard design
Native Log Collection
Splunk Log Collection
Standard Dashboards
Advanced
Dashboards
Pattern
Recognition
Splunk
Engineers
NOC
SOC
Security Analyst
Head of Security
Knowledge
Data Meaning
The Big Picture
Key Takeaways
From a technology oriented approach to an info-centric approach.
From log correlation to pattern recognition.
From a passive/display platform to a proactive/executive platform.
From standard dashboards to real-time dynamic dashboards.
From a security event to an context-aware security information.
Questions?
Grazie

Mais conteúdo relacionado

Mais procurados

Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk
 
Information Security: Advanced SIEM Techniques
Information Security: Advanced SIEM TechniquesInformation Security: Advanced SIEM Techniques
Information Security: Advanced SIEM TechniquesReliaQuest
 
Gov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior AnalyticsGov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior AnalyticsSplunk
 
Hp arcsight services 2014 ewb
Hp arcsight services 2014   ewbHp arcsight services 2014   ewb
Hp arcsight services 2014 ewbrty_ngtglobal
 
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) ArkhipovaOWASP Russia
 
Splunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case StudySplunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case StudyAndrew Gerber
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesImperva
 
ExpertsLiveNL - Post Breach Security with ATA or ATP
ExpertsLiveNL - Post Breach Security with ATA or ATPExpertsLiveNL - Post Breach Security with ATA or ATP
ExpertsLiveNL - Post Breach Security with ATA or ATPTim De Keukelaere
 
LogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEMLogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEMDenitsa Dimova
 
Cloud Breach – Preparation and Response
Cloud Breach – Preparation and ResponseCloud Breach – Preparation and Response
Cloud Breach – Preparation and ResponsePriyanka Aash
 
Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017Splunk
 
SplunkLive! Utrecht - Splunk for Security - Monzy Merza
SplunkLive! Utrecht - Splunk for Security - Monzy MerzaSplunkLive! Utrecht - Splunk for Security - Monzy Merza
SplunkLive! Utrecht - Splunk for Security - Monzy MerzaSplunk
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
Splunk Enterprise Security
Splunk Enterprise SecuritySplunk Enterprise Security
Splunk Enterprise SecuritySplunk
 
Big Data Security with HP ArcSight
Big Data Security with HP ArcSightBig Data Security with HP ArcSight
Big Data Security with HP ArcSightSridhar Karnam
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Erin Sweeney
 

Mais procurados (20)

Splunk for Security
Splunk for SecuritySplunk for Security
Splunk for Security
 
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
 
Information Security: Advanced SIEM Techniques
Information Security: Advanced SIEM TechniquesInformation Security: Advanced SIEM Techniques
Information Security: Advanced SIEM Techniques
 
Gov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior AnalyticsGov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior Analytics
 
HP ArcSight
HP ArcSight HP ArcSight
HP ArcSight
 
Hp arcsight services 2014 ewb
Hp arcsight services 2014   ewbHp arcsight services 2014   ewb
Hp arcsight services 2014 ewb
 
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
 
Splunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case StudySplunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case Study
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
 
ExpertsLiveNL - Post Breach Security with ATA or ATP
ExpertsLiveNL - Post Breach Security with ATA or ATPExpertsLiveNL - Post Breach Security with ATA or ATP
ExpertsLiveNL - Post Breach Security with ATA or ATP
 
LogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEMLogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEM
 
Cloud Breach – Preparation and Response
Cloud Breach – Preparation and ResponseCloud Breach – Preparation and Response
Cloud Breach – Preparation and Response
 
Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017
 
SplunkLive! Utrecht - Splunk for Security - Monzy Merza
SplunkLive! Utrecht - Splunk for Security - Monzy MerzaSplunkLive! Utrecht - Splunk for Security - Monzy Merza
SplunkLive! Utrecht - Splunk for Security - Monzy Merza
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Splunk Enterprise Security
Splunk Enterprise SecuritySplunk Enterprise Security
Splunk Enterprise Security
 
Big Data Security with HP ArcSight
Big Data Security with HP ArcSightBig Data Security with HP ArcSight
Big Data Security with HP ArcSight
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 

Semelhante a SplunkLive! Milano 2016 - customer presentation - Yoox - Net a porter

Splunk in Yoox: Security and Compliance
Splunk in Yoox: Security and ComplianceSplunk in Yoox: Security and Compliance
Splunk in Yoox: Security and ComplianceTimur Bagirov
 
Social Media in a Corporate Context 2010 - Leesa Fogarty, Augure
Social Media in a Corporate Context 2010 - Leesa Fogarty, AugureSocial Media in a Corporate Context 2010 - Leesa Fogarty, Augure
Social Media in a Corporate Context 2010 - Leesa Fogarty, AugureCommunicate Magazine
 
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...Nordic APIs
 
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital RiskUsing SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital RiskSurfWatch Labs
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Decisions
 
Maximizing the Value of Event-Driven Architecture.pdf
Maximizing the Value of Event-Driven Architecture.pdfMaximizing the Value of Event-Driven Architecture.pdf
Maximizing the Value of Event-Driven Architecture.pdfapidays
 
2022 apidays LIVE Helsinki & North_Event API Products – Maximizing the Value ...
2022 apidays LIVE Helsinki & North_Event API Products – Maximizing the Value ...2022 apidays LIVE Helsinki & North_Event API Products – Maximizing the Value ...
2022 apidays LIVE Helsinki & North_Event API Products – Maximizing the Value ...apidays
 
Monitoring and Analysis of Web Information for Various Business Contexts : Co...
Monitoring and Analysis of Web Information for Various Business Contexts : Co...Monitoring and Analysis of Web Information for Various Business Contexts : Co...
Monitoring and Analysis of Web Information for Various Business Contexts : Co...Dr. Haxel Consult
 
Smau Milano 2015 - Cisco
Smau Milano 2015 - CiscoSmau Milano 2015 - Cisco
Smau Milano 2015 - CiscoSMAU
 
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j Neo4j
 
Avira - NOAH17 Berlin
Avira - NOAH17 BerlinAvira - NOAH17 Berlin
Avira - NOAH17 BerlinNOAH Advisors
 
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...apidays
 
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...WhiteSource
 
Using Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital RiskUsing Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital RiskSurfWatch Labs
 
Investing.com - NOAH17 Berlin
Investing.com - NOAH17 BerlinInvesting.com - NOAH17 Berlin
Investing.com - NOAH17 BerlinNOAH Advisors
 
Applications of Network Theory in Finance
Applications of Network Theory in FinanceApplications of Network Theory in Finance
Applications of Network Theory in FinanceKimmo Soramaki
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceSPAN Infotech (India) Pvt Ltd
 

Semelhante a SplunkLive! Milano 2016 - customer presentation - Yoox - Net a porter (20)

Splunk in Yoox: Security and Compliance
Splunk in Yoox: Security and ComplianceSplunk in Yoox: Security and Compliance
Splunk in Yoox: Security and Compliance
 
Social Media in a Corporate Context 2010 - Leesa Fogarty, Augure
Social Media in a Corporate Context 2010 - Leesa Fogarty, AugureSocial Media in a Corporate Context 2010 - Leesa Fogarty, Augure
Social Media in a Corporate Context 2010 - Leesa Fogarty, Augure
 
SMICC Manchester
SMICC ManchesterSMICC Manchester
SMICC Manchester
 
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
 
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital RiskUsing SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Quividi in retail
Quividi in retailQuividi in retail
Quividi in retail
 
Maximizing the Value of Event-Driven Architecture.pdf
Maximizing the Value of Event-Driven Architecture.pdfMaximizing the Value of Event-Driven Architecture.pdf
Maximizing the Value of Event-Driven Architecture.pdf
 
2022 apidays LIVE Helsinki & North_Event API Products – Maximizing the Value ...
2022 apidays LIVE Helsinki & North_Event API Products – Maximizing the Value ...2022 apidays LIVE Helsinki & North_Event API Products – Maximizing the Value ...
2022 apidays LIVE Helsinki & North_Event API Products – Maximizing the Value ...
 
Monitoring and Analysis of Web Information for Various Business Contexts : Co...
Monitoring and Analysis of Web Information for Various Business Contexts : Co...Monitoring and Analysis of Web Information for Various Business Contexts : Co...
Monitoring and Analysis of Web Information for Various Business Contexts : Co...
 
Smau Milano 2015 - Cisco
Smau Milano 2015 - CiscoSmau Milano 2015 - Cisco
Smau Milano 2015 - Cisco
 
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
 
Avira - NOAH17 Berlin
Avira - NOAH17 BerlinAvira - NOAH17 Berlin
Avira - NOAH17 Berlin
 
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
 
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
 
Using Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital RiskUsing Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital Risk
 
Investing.com - NOAH17 Berlin
Investing.com - NOAH17 BerlinInvesting.com - NOAH17 Berlin
Investing.com - NOAH17 Berlin
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
 
Applications of Network Theory in Finance
Applications of Network Theory in FinanceApplications of Network Theory in Finance
Applications of Network Theory in Finance
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and compliance
 

Mais de Splunk

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routineSplunk
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTVSplunk
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)Splunk
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank InternationalSplunk
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett Splunk
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)Splunk
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...Splunk
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...Splunk
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)Splunk
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)Splunk
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College LondonSplunk
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSplunk
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability SessionSplunk
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - KeynoteSplunk
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform SessionSplunk
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security SessionSplunk
 

Mais de Splunk (20)

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 

Último

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 

Último (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 

SplunkLive! Milano 2016 - customer presentation - Yoox - Net a porter

  • 1. Gianluca Gaias Security, Risk & Compliance Director YOOX NET-A-PORTER Group Giovanni Curatola Building an Enterprise-grade Security Intelligence Platform at YOOX NET-A-PORTER Group (Gain the Big Picture)
  • 2. Personal introduction Gianluca Gaias, YOOX NET-A-PORTER Group Security, Risk & Compliance Director YOOX NET-A-PORTER Group is the global Internet retailing partner for leading fashion and luxury brands 2
  • 3. Key Takeaways From a technology oriented approach to an info-centric approach. From log correlation to pattern recognition. From a passive/display platform to a proactive/executive platform. From standard dashboards to real-time dynamic dashboards. From a security event to an context-aware security information. 3
  • 4. Agenda 4 Yoox Group: business and challenges. Security evolution overview From Tech Oriented approach to Information Oriented approach – Deep Investigation – Proactive Dashboard: IP Blacklist – Real-time Dynamic Dashboard: Attack Map Risk Management and Pattern Recognition – Use Case: Attackers Activity Reconsidering dashboard design Next Steps
  • 5. YOOX NET-A-PORTER GROUP Over 180 countries served DCs US, UK, Italy, China, Hong Kong, Japan Customer care covering all time zones Local Offices: New York, London, Milan, Bologna, Paris, Hong Kong, Shanghai, Tokyo Same-Day Delivery in London, Manhattan, Connecticut and Hong Kong Digital production facilities US, UK, Italy, China, Hong Kong, Japan Butler service and authenticity RFid seal 1 order processed every 4 seconds 1.7 billion revenues 27.1 million active customers PRO-FORMA 2015 FY 7.1 million orders 27.1 million active customers
  • 6. Rest of Europe 48.8%  Global premier online luxury fashion destination for content and commerce for the season’s must-have womenswear collections  Unparalleled editorial content, including its weekly online magazine THE EDIT and bi- monthly print magazine PORTER  Global destination for men’s style with unparalleled offering from the season of the leading menswear, watchmakers and specialist grooming brands  Rich editorial content through the weekly online magazine The Journal and bi-monthly newspaper The MR PORTER Post MULTI-BRAND IN-SEASON MULTI-BRAND OFF-SEASON Rest of Europe 48.8% The world’s leading online lifestyle store for fashion, design and art  Broad offering of off-season premium apparel and accessories, exclusive collections, home & design and artworks  The online destination for women dedicated entirely to in-season high-end shoes  Exclusive shoe-related services and editorial component Rest of Europe 48.8%  Go-to destination for previous- season designer fashion for the global style-conscious woman looking for the best designer products at great prices  In-house label of styling essentials “Iris and Ink”  The luxury online boutique devoted to creating distinctive style through an eclectic and selective in-season assortment of high fashion and directional designers for men and women  Dedicated mini-stores ONLINE FLAGSHIP STORES  Official Online Flagship Stores of leading fashion and luxury brands for which YNAP is the exclusive partner  Long-term partnerships and many more … JVCo with Kering .com .com .com .com .com .com .com .com .com .com .com .com .com .com .com .com .com .com  Proprietary business where YNAP operates as an e-tailer for the season’s luxury fashion collections under its four own brand names  Proprietary business where YNAP operates as an e-tailer mainly for the previous-season designer fashion under its two own brand names “Powered by YOOX NET-A-PORTER GROUP”
  • 7. YOOX NET-A-PORTER Group: Challenges 7 Keep the trust – Data Confidentiality – Data Integrity and Completeness – Data Processing Transparency High Availability in hostile enviroment Gain the big picture: – Challenge and Enabler  Shareholders  Customers  Stakeholders
  • 8. Security Evolution Overview 8 0 1 2 3 4 5 6 7 8 9 Data Leakage Prevention Information Security Compliance IPS & Anomaly Detection Administrative Access Control PCI-DSS Compliance Sites Vulnerability Checks Code Review Logical Access Governance Security Intelligence Platform Online Brand Protection Privacy Compliance Information Process Analysis 2011 2013 2015
  • 9. Security Evolution – Tech vs Info Technology Oriented: – Info confined to technology – Partial identity definition – No covered gaps Information Oriented - Splunk: – Enrichement of tech logs – Event correlation – Clear identity definition 9
  • 10. From Tech to Info “From a technology oriented approach to an info-centric approach.” 1
  • 13. Advanced Dashboard: IP Blacklist • Proactive Dashboard • One-click blacklist on Akamai WAF through Akamai API calls • Splunk is able to run a command on input source Drilldown «From a passive/display platform to a proactive/executive platform»
  • 14. WAF activity rapresentation: standard dashboard • Statistical evidences by: – Source IP – Attack type – WAF Action • Event distribution over the time • Spike visibility depends from the scale • Is not evident: – Attack frequency – Relation between Source IP, Attack type and WAF action Pros Cons
  • 15. “From standard dashboards to real-time dynamic dashboards” Real-time Dynamic Dashboard: Attack Map
  • 16. Security Evolution – Risk Mgmt & Pattern Rec. Risk Management: – Correlation of Tech Elements and Business Elements – Support to quantitative risk analysis – Assigning Risk value to alerts Pattern Recognition: – Different levels of correlation – Pattern as result of several high-level events from different systems by identity – Knowledge from historical incidents and analysts experience – Goal: detect user behavior and recurrent attack patterns
  • 17. Pattern Recognition Single security events may be part of a more complex action. Correlation Brute Force Exce. Out Data High Conn. Correlation Level 1 Correlation Level 2 Correlation Level n Data Exfiltration «From log correlation to pattern recognition» Sequence Introduced by high level analyst Pattern Consolidation Analyst
  • 18. Risk Management “From a security event to an context-aware security information” Risk Static Assign. (Lookup) N level correlation Content Eval Usually single security event has a static risk We need risk value based on content and other events correlated.
  • 19. Use Case: Attackers Activity Detect sequence of relevant event by identity Activity Score: vertical axes, max of the same alert type Activity Frequency: ball diameter Pattern Recognition Risk Value
  • 20. Reconsidering dashboard design Native Log Collection Splunk Log Collection Standard Dashboards Advanced Dashboards Pattern Recognition Splunk Engineers NOC SOC Security Analyst Head of Security Knowledge Data Meaning The Big Picture
  • 21. Key Takeaways From a technology oriented approach to an info-centric approach. From log correlation to pattern recognition. From a passive/display platform to a proactive/executive platform. From standard dashboards to real-time dynamic dashboards. From a security event to an context-aware security information.