SplunkLive! - Splunk for Security

Splunk
SplunkSplunk
Copyright © 2015 Splunk Inc.
Security Session
Philipp Drieger
Sales Engineer
Beginnt um 14:30
2
Safe Harbor Statement
During the course of this presentation,we may make forward looking statements regarding future events
or the expected performance of the company. We caution you that such statements reflect our current
expectations and estimates based on factors currently known to us and that actual events or results could
differ materially. For important factors that may cause actual results to differ from those contained in our
forward-looking statements, please review our filings with the SEC. The forward-looking statements
made in this presentation are being made as of the time and date of its live presentation. If reviewed
after its live presentation, this presentation may not contain current or accurate information. We do not
assume any obligation to update any forward looking statements we may make. In addition, any
information about our roadmap outlines our general product direction and is subject to change at any
time without notice. It is for informational purposes only and shall not be incorporated into any contract
or other commitment. Splunk undertakes no obligation either to develop the features or functionality
described orto includeany suchfeatureor functionalityina futurerelease.
3
Agenda
Splunk for Security
ZEUS Demo
Enterprise Security
Splunk User Behavior Analytics
Splunk for Security
5
CYBER
CRIMINALS
MALICIOUS
INSIDERS
NATION
STATES
5
6
Advanced Threats Are Hard to Find
6
Cyber Criminals
Nation States
Insider Threats
Source: Mandiant M-Trends Report 2012/2013/2014
100%
Valid credentials were used
40
Average # of systems accessed
229
Median # of days before detection
67%
Of victims were notified by
external entity
7 7
Servers
Storage
DesktopsEmail Web
Transaction
Records
Network
Flows
DHCP/ DNS
Hypervisor
Custom
Apps
Physical
Access
Badges
Threat
Intelligence
Mobile
CMDB
Intrusion
Detection
Firewall
Data Loss
Prevention
Anti-
Malware
Vulnerability
Scans
Traditional
Authentication
All Data is Security Relevant = Big Data
8
Solution: Splunk, The Engine For Machine Data
8
Online
Services
Web
Services
Servers
Security
GPS
Location
Storage
Desktops
Networks
Packaged
Applications
Custom
Applications
Messaging
Telecoms
Online
Shopping
Cart
Web
Clickstreams
Databases
Energy
Meters
Call Detail
Records
Smartphones
and Devices
RFID
Developer
Platform
Report
and
analyze
Custom
dashboards
Monitor
and alert
Ad hoc
search
Real-Time
Machine Data
References – Coded fields, mappings, aliases
Dynamic information – Stored in non-traditional formats
Environmental context – Human maintained files, documents
System/application – Available only using application request
Intelligence/analytics – Indicators, anomaly, research, white/blacklist
9
Fraud
Detection
Insider
Threat
Advanced
Threat
Detection
Security &
Compliance
Reporting
Incident
Analysis &
Investigations
Real-time
Monitoring
& Alerting
Security Intelligence Use Cases
Splunk provides solutions that address SIEM use cases and more
Security &
Compliance
Reporting
Incident
Analysis &
Investigations
Real-time
Monitoring
& Alerting
10 1
Example Patterns of Fraud in Machine Data
Industry Type of Fraud/Theft/Abuse Pattern
Financial Services Account takeover
Abnormally high number or dollar amounts of wire transfer
withdrawals
Healthcare Physician billing Physician billing for drugs outside their expertise area
E-Tailing Account takeover Many accounts accessed from one IP
Telecoms Calling plan abuse
Customer making excessive amount of international calls
on an unlimited plan
Online Education Student loan fraud
Student receiving federal loan has IP in “high-risk” overseas
country and is absent from online classrooms and forums
11
Insider Threat
What To Look For Data Source
Abnormally high number of file transfers to USB or CD/DVD OS
Abnormally large amount of data going to personal webmail account or uploaded to external
file hosting site
Email / web server
Unusual physical access attempts (after hours, accessing unauthorized area, etc) Physical badge records / AD
Above actions + employee is on an internal watchlist as result of transfer / demotion / poor
review / impending layoff
HR systems / above
User name of terminated employee accessing internal system AD / HR systems
11
12
Example of Advanced Threat Activities
1
HTTP (web) session to
command & control
server
Remote control,
Steal data,
Persist in company,
Rent as botnet
WEB
Conduct
Business
Create additional
environment
Gain Access
to systemTransaction
.pdf
.pdf executes & unpacks malware
overwriting and running “allowed” programs
Svchost.exeCalc.exe
Attacker hacks website
Steals .pdf files
Web
Portal.pdf
Attacker creates
malware, embed in .pdf,
Emails
to the target
MAIL
Read email, open attachment
Threat intelligence
Auth - User Roles
Host
Activity/Security
Network
Activity/Security
13
Connect the “Data-Dots” to See the Whole Story
1
Persist, Repeat
Threat intelligence
Auth - User Roles,
Corp Context
Host
Activity/Security
Network
Activity/Security
Attacker, know relay/C2 sites, infected sites, IOC, attack/campaign
intent and attribution
Where they went to, who talked to whom, attack transmitted,
abnormal traffic, malware download
What process is running (malicious, abnormal, etc.) Process
owner, registry mods, attack/malware artifacts, patching level,
attack susceptibility
Access level, privileged users, likelihood of infection, where they
might be in kill chain
Delivery, Exploit
Installation
Gain Trusted
Access
ExfiltrationData GatheringUpgrade (escalate)
Lateral movement
Persist, Repeat
• Third-party Threat Intel
• Open source blacklist
• Internal threat intelligence
• Firewall
• IDS / IPS
• Vulnerability scanners
• Web Proxy
• NetFlow
• Network
• Endpoint (AV/IPS/FW)
• Malware detection
• PCLM
• DHCP
• OS logs
• Patching
• Active Directory
• LDAP
• CMDB
• Operating System
• Database
• VPN, AAA, SSO
14
Threat intelligence
Host
Activity/Security
Network
Activity/Security
Command & ControlExploitation & InstallationDelivery Accomplish Mission
Security Ecosystem for Coverage and Protection
Auth - User Roles,
Corp Context
15
STIX/TAXII and Open IOC 101
• Info sharing across companies
and industries
• Standardized XML
• IOCs include IPs, web/email
domains, hashes, processes,
registry key, certificates
16
Threat Intelligence in Splunk
17
Sample TAXII Feeds
User Community Organisation
Cyber Threat XChange Health Information Trust Alliance
Defense Security Information Exchange Defense Industrial Base Information and Sharing
and Analysis Organization
ICS-ISAC Industrial Control System Information Sharing and
Analysis Center
NH-ISAC National Health Cybersecurity
Intelligence Platform
National Health Information and Analysis Center
FS-ISAC / Soltra Edge Financial Services Information Sharing and
Analyses Center (FS-ISAC)
Retail Cyber Intelligence Sharing Center,
Intelligence Sharing Portal
Retail Information Sharing and Analysis Center
(Retail-ISAC)
More: http://stixproject.github.io/supporters/
ZEUS Demo
19
ZEUS Live Demo
Demo
Customer Example
21
Sample Nasdaq - Heartbleed
22
22
Splunk Enterprise is a well thought-out solution, designed from the outset for
development and operation, and it delivers immediate results in a number of
areas.
“
SIEM General Project Manager, Finanz Informatik GmbH & Co. KG
Challenges: Existing SIEM tools did not meet security needs
– Different security information and event management (SIEM) solutions for the mainframe, network, Unix and
Windows.
– Difficult to correlate Security incidents accross variuos plaforms
Enter Splunk: One unified solution
– A single solution across platforms and functions means faster and more comprehensive investigation and
resolution of security incidents
– Guarantee Full protection of its customer data and at the same time reduce complexity, error rates and costs.
– Alerts that identify security events, authorization violations or unusual patterns of queries.
Splunk at Finanz Informatik
“ “
23
Replacing a SIEM @ Cisco
23
We moved to Splunk from traditional SIEM as Splunk is designed and
engineered for “big data” use cases. Our previous SIEM was not and simply
could not scale to the data volumes we have.
““
Gavin Reid, Leader, Cisco Computer Security Incident Response Team
Challenges: SIEM could not meet security needs
– Very difficult to index non-security or custom app log data
– Serious scale and speed issues. 10GB/day and searches took > 6 minutes
– Difficult to customize with reliance on pre-built rules which generated false positives
Enter Splunk: Flexible SIEM and empowered team
– Easy to index any type of machine data from any source
– Over 60 users doing investigations, RT correlations, reporting, advanced threat detection
– All the data + flexible searches and reporting = empowered team
– 900 GB/day and searches take < minute. 7 global data centers with 350TB stored data
– Estimate Splunk is 25% the cost of a traditional SIEM
Enterprise Security
25
26
1Risk-based
security
Fast Incident Review and Investigation
27
1Risk-based
security
Continuous Monitoring for Security Domains
2
28
Visual Investigations—Kill Chain
29
Visual investigations—Kill Chain
30
31
32
33
Spot Suspicious Access
• Simultaneous logins for single
user occurring at two distant
locations
• Concurrent application access –
password sharing or theft
34
35
36
Features in Enterprise Security 4.0
Optimize multi-step
analyses to improve breach
detection and response
Extensible Analytics &
Collaboration
INVESTIGATION COLLABORATION
• Investigator Journal
• Attack & Investigation Timeline
• Open Solutions Framework
• Framework App : PCI
SplunkLive! - Splunk for Security
User Behavior Analytics
ENTERPRISE CHALLENGES
THREATS
PEOPLE
EFFICIENCY
Cyber Attacks, Insider
Threats, Hidden,
Or Unknown
Availability of
Security Expertise
Too Many Alerts And
False Positives
40
Majority of the
Threat Detection Solutions
focus on the KNOWNS.
UNKNOWNS?
What about the
OLD PARADIGM
SIGNATURES
RULES HUMAN
ANALYSIS
DATA-SCIENCE DRIVEN
BEHAVIORAL ANALYTICS
BIG DATA
DRIVEN
SECURITY
ANALYTICS
MACHINE
LEARNING
A NEW PARADIGM
MAPPING RATs
TO
ACTIONABLE KILL-CHAIN
A
W
N
O
M
A
L
I
E
S
H
R
E
A
T
ADVANCED CYBER ATTACKS
SPLUNK UBA detects
& INSIDER THREATS
with BEHAVIORAL THREAT DETECTION
SECURITY ANALYTICS
ADVANCED
SplunkLive! - Splunk for Security
47
SECURITY ANALYTICS
KILL-CHAIN
HUNTER
KEY WORKFLOWS - HUNTER
 Investigate suspicious users, devices,
and applications
 Dig deeper into identified anomalies
and threat indicators
 Look for policy violations
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
50
THREAT DETECTION
KEY WORKFLOWS – SOC ANALYST
SOC ANALYST
 Quickly spot threats within your
network
 Leverage Threat Detection workflow
to investigate insider threats and
cyber attacks
 Act on forensic details – deactivate
accounts, unplug network devices, etc.
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
55
INSIDER THREAT
5
USER ACTIVITIES RISK/THREAT DETECTION AREAS
John logs in via VPN from 1.0.63.14
Unusual Geo (China)
Unusual Activity Time3:00 PM
Unusual Machine Access
(lateral movement; individual +
peer group)
3:15 PMJohn (Admin) performs an ssh as root to a new
machine from the BizDev department
Unusual Zone (CorpPCI) traversal
(lateral movement)3:10 PM
John performs a remote desktop on a system as
Administrator on the PCI network zone
3:05 PM Unusual Activity Sequence
(AD/DC Privilege Escalation)
John elevates his privileges for the PCI network
Excessive Data Transmission
(individual + peer group)
Unusual Zone combo (PCIcorp)
6:00 PMJohn (Adminroot) copies all the negotiation docs
to another share on the corp zone
Unusual File Access
(individual + peer group)3:40 PM
John (Adminroot) accesses all the excel and
negotiations documents on the BizDev file shares
Multiple Outgoing Connections
Unusual VPN session duration (11h)11:35 PMJohn (Adminroot) uses a set of Twitter handles to
chop and copy the data outside the enterprise
56
EXTERNAL ATTACK
5
USER ACTIVITIES RISK/THREAT DETECTION AREAS
Peter and Sam access a malicious website. A
backdoor gets installed on their computers
Malicious Domain (AGD)
Unusual Browser HeaderNov 15
Unusual Machine Access for Peter
(lateral movement; individual + peer group)Dec 10The attacker logs on to Domain Controller via
VPN with Peter’s stolen credentials from 1.0.63.14
Unusual Browser Header for Peter
and SamNov 16
The attacker uses Peter and Sam’s backdoors to
download and execute WCE to crack their password
Nov 16 Beacons for Peter and Sam to
www.byeigs.ddns.com
Peter and Sam’s machines are communicating
with www.byeigs.ddns.info
Unusual Machine Access for Sam
Unusual File Access for Sam
(individual + peer group))
Dec 10
The attacker logs in as Sam and accesses all excel
and negotiations docs on the BizDev shares
Unusual Activity Sequence of Admin for
Sam (AD/DC Privilege Escalation)Dec 10
The attacker steals the admin Kerberos ticket from
admin account and escalates the privileges for Sam.
Excessive Data Transmission for Peter
Unusual VPN session durationJan 14The attacker VPNs as Peter, copies the docs to an
external staging IP and then logs out after 3 hours.
Copyright © 2015 Splunk Inc.
Thank You! – Q&A
1 de 57

Recomendados

SplunkLive! München 2016 - Splunk für Security por
SplunkLive! München 2016 - Splunk für SecuritySplunkLive! München 2016 - Splunk für Security
SplunkLive! München 2016 - Splunk für SecuritySplunk
956 visualizações57 slides
Splunk for Security Breakout Session por
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
1.8K visualizações54 slides
SplunkLive! Zürich - Splunk für Security por
SplunkLive! Zürich - Splunk für SecuritySplunkLive! Zürich - Splunk für Security
SplunkLive! Zürich - Splunk für SecuritySplunk
337 visualizações59 slides
Splunk for Security - Hands-On por
Splunk for Security - Hands-On Splunk for Security - Hands-On
Splunk for Security - Hands-On Splunk
737 visualizações38 slides
Splunk for Security-Hands On por
Splunk for Security-Hands OnSplunk for Security-Hands On
Splunk for Security-Hands OnSplunk
2.4K visualizações103 slides
SplunkLive! - Splunk for IT Operations por
SplunkLive! - Splunk for IT OperationsSplunkLive! - Splunk for IT Operations
SplunkLive! - Splunk for IT OperationsSplunk
873 visualizações28 slides

Mais conteúdo relacionado

Mais procurados

SplunkSummit 2015 - Splunk User Behavioral Analytics por
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunk
2.2K visualizações33 slides
Enterprise Security Guided Tour por
Enterprise Security Guided TourEnterprise Security Guided Tour
Enterprise Security Guided TourSplunk
672 visualizações97 slides
SplunkLive! Splunk Enterprise 6.3 - Data On-boarding por
SplunkLive! Splunk Enterprise 6.3 - Data On-boardingSplunkLive! Splunk Enterprise 6.3 - Data On-boarding
SplunkLive! Splunk Enterprise 6.3 - Data On-boardingSplunk
889 visualizações18 slides
Gov & Education Day 2015 - User Behavior Analytics por
Gov & Education Day 2015 - User Behavior AnalyticsGov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior AnalyticsSplunk
1.2K visualizações34 slides
Splunk für Security por
Splunk für SecuritySplunk für Security
Splunk für SecuritySplunk
692 visualizações23 slides
Level Up Your Security Skills in Splunk Enterprise por
Level Up Your Security Skills in Splunk EnterpriseLevel Up Your Security Skills in Splunk Enterprise
Level Up Your Security Skills in Splunk EnterpriseSplunk
2.3K visualizações59 slides

Mais procurados(20)

SplunkSummit 2015 - Splunk User Behavioral Analytics por Splunk
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral Analytics
Splunk2.2K visualizações
Enterprise Security Guided Tour por Splunk
Enterprise Security Guided TourEnterprise Security Guided Tour
Enterprise Security Guided Tour
Splunk672 visualizações
SplunkLive! Splunk Enterprise 6.3 - Data On-boarding por Splunk
SplunkLive! Splunk Enterprise 6.3 - Data On-boardingSplunkLive! Splunk Enterprise 6.3 - Data On-boarding
SplunkLive! Splunk Enterprise 6.3 - Data On-boarding
Splunk889 visualizações
Gov & Education Day 2015 - User Behavior Analytics por Splunk
Gov & Education Day 2015 - User Behavior AnalyticsGov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior Analytics
Splunk1.2K visualizações
Splunk für Security por Splunk
Splunk für SecuritySplunk für Security
Splunk für Security
Splunk692 visualizações
Level Up Your Security Skills in Splunk Enterprise por Splunk
Level Up Your Security Skills in Splunk EnterpriseLevel Up Your Security Skills in Splunk Enterprise
Level Up Your Security Skills in Splunk Enterprise
Splunk2.3K visualizações
Splunk conf2014 - Dashboard Fun - Creating an Interactive Transaction Profiler por Splunk
Splunk conf2014 - Dashboard Fun - Creating an Interactive Transaction ProfilerSplunk conf2014 - Dashboard Fun - Creating an Interactive Transaction Profiler
Splunk conf2014 - Dashboard Fun - Creating an Interactive Transaction Profiler
Splunk3.2K visualizações
Enterprise Sec + User Bahavior Analytics por Splunk
Enterprise Sec + User Bahavior AnalyticsEnterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior Analytics
Splunk1.5K visualizações
PPT-Splunk-LegacySIEM-101_FINAL por Risi Avila
PPT-Splunk-LegacySIEM-101_FINALPPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINAL
Risi Avila967 visualizações
Splunk for IT Operations Breakout Session por Georg Knon
Splunk for IT Operations Breakout SessionSplunk for IT Operations Breakout Session
Splunk for IT Operations Breakout Session
Georg Knon380 visualizações
Splunk for Enterprise Security Featuring User Behavior Analytics por Splunk
Splunk for Enterprise Security Featuring User Behavior Analytics Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk469 visualizações
Getting Started with Splunk (Hands-On) por Splunk
Getting Started with Splunk (Hands-On) Getting Started with Splunk (Hands-On)
Getting Started with Splunk (Hands-On)
Splunk1.2K visualizações
Building a Security Information and Event Management platform at Travis Per... por Splunk
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...
Splunk2.2K visualizações
SplunkLive! München 2016 - Splunk für IT Operations por Splunk
SplunkLive! München 2016 - Splunk für IT OperationsSplunkLive! München 2016 - Splunk für IT Operations
SplunkLive! München 2016 - Splunk für IT Operations
Splunk467 visualizações
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods por Splunk
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics MethodsSplunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk656 visualizações
Getting Started with Splunk Enterprise Hands-On por Splunk
Getting Started with Splunk Enterprise Hands-OnGetting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-On
Splunk487 visualizações
Getting Started with Splunk Enterprise Hands-On por Splunk
Getting Started with Splunk Enterprise Hands-OnGetting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-On
Splunk551 visualizações
Hands-On Security Breakout Session- ES Guided Tour por Splunk
Hands-On Security Breakout Session- ES Guided TourHands-On Security Breakout Session- ES Guided Tour
Hands-On Security Breakout Session- ES Guided Tour
Splunk1.9K visualizações
Splunk Enterpise for Information Security Hands-On por Splunk
Splunk Enterpise for Information Security Hands-OnSplunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-On
Splunk1.4K visualizações
Splunk for Enterprise Security featuring User Behavior Analytics por Splunk
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk1K visualizações

Destaque

Incident Response Tactics with Compromise Indicators por
Incident Response Tactics with Compromise IndicatorsIncident Response Tactics with Compromise Indicators
Incident Response Tactics with Compromise IndicatorsF _
4.1K visualizações31 slides
City of San Diego Customer Presentation por
City of San Diego Customer PresentationCity of San Diego Customer Presentation
City of San Diego Customer PresentationShannon Cuthbertson
204 visualizações18 slides
Honeycon2014: Mining IoCs from Honeypot data feeds por
Honeycon2014: Mining IoCs from Honeypot data feedsHoneycon2014: Mining IoCs from Honeypot data feeds
Honeycon2014: Mining IoCs from Honeypot data feedsF _
2.5K visualizações71 slides
Broadcom Customer Presentation por
Broadcom Customer PresentationBroadcom Customer Presentation
Broadcom Customer PresentationSplunk
1.3K visualizações9 slides
Splunk Application logging Best Practices por
Splunk Application logging Best PracticesSplunk Application logging Best Practices
Splunk Application logging Best PracticesGreg Hanchin
8.7K visualizações38 slides
City of San Diego Customer Presentation por
City of San Diego Customer PresentationCity of San Diego Customer Presentation
City of San Diego Customer PresentationSplunk
646 visualizações46 slides

Destaque(11)

Incident Response Tactics with Compromise Indicators por F _
Incident Response Tactics with Compromise IndicatorsIncident Response Tactics with Compromise Indicators
Incident Response Tactics with Compromise Indicators
F _4.1K visualizações
City of San Diego Customer Presentation por Shannon Cuthbertson
City of San Diego Customer PresentationCity of San Diego Customer Presentation
City of San Diego Customer Presentation
Shannon Cuthbertson204 visualizações
Honeycon2014: Mining IoCs from Honeypot data feeds por F _
Honeycon2014: Mining IoCs from Honeypot data feedsHoneycon2014: Mining IoCs from Honeypot data feeds
Honeycon2014: Mining IoCs from Honeypot data feeds
F _2.5K visualizações
Broadcom Customer Presentation por Splunk
Broadcom Customer PresentationBroadcom Customer Presentation
Broadcom Customer Presentation
Splunk1.3K visualizações
Splunk Application logging Best Practices por Greg Hanchin
Splunk Application logging Best PracticesSplunk Application logging Best Practices
Splunk Application logging Best Practices
Greg Hanchin8.7K visualizações
City of San Diego Customer Presentation por Splunk
City of San Diego Customer PresentationCity of San Diego Customer Presentation
City of San Diego Customer Presentation
Splunk646 visualizações
DTS Solution - Building a SOC (Security Operations Center) por Shah Sheikh
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh46.7K visualizações
Wie Sie Ransomware aufspüren und was Sie dagegen machen können por Splunk
Wie Sie Ransomware aufspüren und was Sie dagegen machen könnenWie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
Splunk1.1K visualizações
Softcat Splunk Discovery Day Manchester, March 2017 por Splunk
Softcat Splunk Discovery Day Manchester, March 2017Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017
Splunk958 visualizações
Building a Cyber Security Operations Center for SCADA/ICS Environments por Shah Sheikh
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
Shah Sheikh16.8K visualizações
Workshop Logfile Analyse mit Splunk por Hannes Richter
Workshop Logfile Analyse mit SplunkWorkshop Logfile Analyse mit Splunk
Workshop Logfile Analyse mit Splunk
Hannes Richter660 visualizações

Similar a SplunkLive! - Splunk for Security

Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio... por
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...Splunk
952 visualizações30 slides
Hands-On Security Breakout Session- Disrupting the Kill Chain por
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill ChainSplunk
558 visualizações43 slides
Hands on Security - Disrupting the Kill Chain Breakout Session por
Hands on Security - Disrupting the Kill Chain Breakout SessionHands on Security - Disrupting the Kill Chain Breakout Session
Hands on Security - Disrupting the Kill Chain Breakout SessionSplunk
1.1K visualizações38 slides
Splunk for Security Workshop por
Splunk for Security WorkshopSplunk for Security Workshop
Splunk for Security WorkshopSplunk
1.1K visualizações35 slides
Hands-On Security - Disrupting the Kill Chain por
Hands-On Security - Disrupting the Kill ChainHands-On Security - Disrupting the Kill Chain
Hands-On Security - Disrupting the Kill ChainSplunk
625 visualizações38 slides
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En... por
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk
1.2K visualizações33 slides

Similar a SplunkLive! - Splunk for Security(20)

Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio... por Splunk
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk952 visualizações
Hands-On Security Breakout Session- Disrupting the Kill Chain por Splunk
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
Splunk558 visualizações
Hands on Security - Disrupting the Kill Chain Breakout Session por Splunk
Hands on Security - Disrupting the Kill Chain Breakout SessionHands on Security - Disrupting the Kill Chain Breakout Session
Hands on Security - Disrupting the Kill Chain Breakout Session
Splunk1.1K visualizações
Splunk for Security Workshop por Splunk
Splunk for Security WorkshopSplunk for Security Workshop
Splunk for Security Workshop
Splunk1.1K visualizações
Hands-On Security - Disrupting the Kill Chain por Splunk
Hands-On Security - Disrupting the Kill ChainHands-On Security - Disrupting the Kill Chain
Hands-On Security - Disrupting the Kill Chain
Splunk625 visualizações
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En... por Splunk
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk1.2K visualizações
Hands-On Security Breakout Session- Disrupting the Kill Chain por Splunk
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
Splunk1.1K visualizações
Hands-On Security Breakout Session- Disrupting the Kill Chain por Splunk
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
Splunk449 visualizações
Splunk EMEA Webinar: Scoping infections and disrupting breaches por Splunk
Splunk EMEA Webinar: Scoping infections and disrupting breachesSplunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk541 visualizações
Hands-On Security Breakout Session- Disrupting the Kill Chain por Splunk
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
Splunk706 visualizações
SplunkLive! Wien - Splunk für Security por Splunk
SplunkLive! Wien - Splunk für SecuritySplunkLive! Wien - Splunk für Security
SplunkLive! Wien - Splunk für Security
Splunk296 visualizações
Splunk for Enterprise Security and User Behavior Analytics por Splunk
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
Splunk3.2K visualizações
Splunk for Enterprise Security Featuring UBA por Splunk
Splunk for Enterprise Security Featuring UBASplunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBA
Splunk2.1K visualizações
Virtual Gov Day - Security Breakout - Deloitte por Splunk
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
Splunk1.8K visualizações
Josh Diakun - Cust Pres - Splunk Partner Event por Josh D
Josh Diakun - Cust Pres - Splunk Partner EventJosh Diakun - Cust Pres - Splunk Partner Event
Josh Diakun - Cust Pres - Splunk Partner Event
Josh D1.4K visualizações
Splunk for Enterprise Security featuring UBA Breakout Session por Splunk
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk1.7K visualizações
Splunk for Enterprise Security featuring User Behavior Analytics por Splunk
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk1.8K visualizações
Splunk for Enterprise Security featuring User Behavior Analytics por Splunk
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk1.4K visualizações
Using Big Data for Cybersecurity por Splunk
Using Big Data for CybersecurityUsing Big Data for Cybersecurity
Using Big Data for Cybersecurity
Splunk1K visualizações
Operational Security Intelligence por Splunk
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
Splunk1.2K visualizações

Mais de Splunk

.conf Go 2023 - Data analysis as a routine por
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routineSplunk
101 visualizações12 slides
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV por
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTVSplunk
96 visualizações20 slides
.conf Go 2023 - Comment Engie France Retail supervise ses activités critiques... por
.conf Go 2023 - Comment Engie France Retail supervise ses activités critiques....conf Go 2023 - Comment Engie France Retail supervise ses activités critiques...
.conf Go 2023 - Comment Engie France Retail supervise ses activités critiques...Splunk
98 visualizações28 slides
.conf Go 2023 - Navegando la normativa SOX (Telefónica) por
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)Splunk
214 visualizações31 slides
.conf Go 2023 - SIEM project @ SNF por
.conf Go 2023 - SIEM project @ SNF.conf Go 2023 - SIEM project @ SNF
.conf Go 2023 - SIEM project @ SNFSplunk
232 visualizações18 slides
.conf Go 2023 - Raiffeisen Bank International por
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank InternationalSplunk
241 visualizações16 slides

Mais de Splunk(20)

.conf Go 2023 - Data analysis as a routine por Splunk
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
Splunk101 visualizações
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV por Splunk
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
Splunk96 visualizações
.conf Go 2023 - Comment Engie France Retail supervise ses activités critiques... por Splunk
.conf Go 2023 - Comment Engie France Retail supervise ses activités critiques....conf Go 2023 - Comment Engie France Retail supervise ses activités critiques...
.conf Go 2023 - Comment Engie France Retail supervise ses activités critiques...
Splunk98 visualizações
.conf Go 2023 - Navegando la normativa SOX (Telefónica) por Splunk
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
Splunk214 visualizações
.conf Go 2023 - SIEM project @ SNF por Splunk
.conf Go 2023 - SIEM project @ SNF.conf Go 2023 - SIEM project @ SNF
.conf Go 2023 - SIEM project @ SNF
Splunk232 visualizações
.conf Go 2023 - Raiffeisen Bank International por Splunk
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
Splunk241 visualizações
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett por Splunk
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
Splunk204 visualizações
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär) por Splunk
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
Splunk245 visualizações
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu... por Splunk
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
Splunk214 visualizações
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever... por Splunk
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
Splunk219 visualizações
.conf go 2023 - De NOC a CSIRT (Cellnex) por Splunk
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
Splunk218 visualizações
conf go 2023 - El camino hacia la ciberseguridad (ABANCA) por Splunk
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk217 visualizações
Splunk - BMW connects business and IT with data driven operations SRE and O11y por Splunk
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk18 visualizações
Splunk x Freenet - .conf Go Köln por Splunk
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
Splunk97 visualizações
Splunk Security Session - .conf Go Köln por Splunk
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
Splunk204 visualizações
Data foundations building success, at city scale – Imperial College London por Splunk
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
Splunk83 visualizações
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen... por Splunk
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk154 visualizações
SOC, Amore Mio! | Security Webinar por Splunk
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
Splunk511 visualizações
.conf Go 2022 - Observability Session por Splunk
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
Splunk306 visualizações
.conf Go Zurich 2022 - Keynote por Splunk
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
Splunk48 visualizações

Último

Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... por
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...ShapeBlue
164 visualizações13 slides
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... por
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Moses Kemibaro
35 visualizações38 slides
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023 por
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023BookNet Canada
44 visualizações19 slides
"Node.js Development in 2024: trends and tools", Nikita Galkin por
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin Fwdays
33 visualizações38 slides
Optimizing Communication to Optimize Human Behavior - LCBM por
Optimizing Communication to Optimize Human Behavior - LCBMOptimizing Communication to Optimize Human Behavior - LCBM
Optimizing Communication to Optimize Human Behavior - LCBMYaman Kumar
38 visualizações49 slides
Cencora Executive Symposium por
Cencora Executive SymposiumCencora Executive Symposium
Cencora Executive Symposiummarketingcommunicati21
160 visualizações14 slides

Último(20)

Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... por ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue164 visualizações
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... por Moses Kemibaro
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Moses Kemibaro35 visualizações
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023 por BookNet Canada
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
BookNet Canada44 visualizações
"Node.js Development in 2024: trends and tools", Nikita Galkin por Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays33 visualizações
Optimizing Communication to Optimize Human Behavior - LCBM por Yaman Kumar
Optimizing Communication to Optimize Human Behavior - LCBMOptimizing Communication to Optimize Human Behavior - LCBM
Optimizing Communication to Optimize Human Behavior - LCBM
Yaman Kumar38 visualizações
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc176 visualizações
Qualifying SaaS, IaaS.pptx por Sachin Bhandari
Qualifying SaaS, IaaS.pptxQualifying SaaS, IaaS.pptx
Qualifying SaaS, IaaS.pptx
Sachin Bhandari1.1K visualizações
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT por ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue208 visualizações
Ransomware is Knocking your Door_Final.pdf por Security Bootcamp
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp98 visualizações
Why and How CloudStack at weSystems - Stephan Bienek - weSystems por ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue247 visualizações
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue por ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue137 visualizações
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue por ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue139 visualizações
Evaluation of Quality of Experience of ABR Schemes in Gaming Stream por Alpen-Adria-Universität
Evaluation of Quality of Experience of ABR Schemes in Gaming StreamEvaluation of Quality of Experience of ABR Schemes in Gaming Stream
Evaluation of Quality of Experience of ABR Schemes in Gaming Stream
Alpen-Adria-Universität38 visualizações
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... por ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue199 visualizações
"Package management in monorepos", Zoltan Kochan por Fwdays
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan Kochan
Fwdays34 visualizações
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... por The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
The Digital Insurer91 visualizações
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... por ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue108 visualizações

SplunkLive! - Splunk for Security

  • 1. Copyright © 2015 Splunk Inc. Security Session Philipp Drieger Sales Engineer Beginnt um 14:30
  • 2. 2 Safe Harbor Statement During the course of this presentation,we may make forward looking statements regarding future events or the expected performance of the company. We caution you that such statements reflect our current expectations and estimates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward-looking statements, please review our filings with the SEC. The forward-looking statements made in this presentation are being made as of the time and date of its live presentation. If reviewed after its live presentation, this presentation may not contain current or accurate information. We do not assume any obligation to update any forward looking statements we may make. In addition, any information about our roadmap outlines our general product direction and is subject to change at any time without notice. It is for informational purposes only and shall not be incorporated into any contract or other commitment. Splunk undertakes no obligation either to develop the features or functionality described orto includeany suchfeatureor functionalityina futurerelease.
  • 3. 3 Agenda Splunk for Security ZEUS Demo Enterprise Security Splunk User Behavior Analytics
  • 6. 6 Advanced Threats Are Hard to Find 6 Cyber Criminals Nation States Insider Threats Source: Mandiant M-Trends Report 2012/2013/2014 100% Valid credentials were used 40 Average # of systems accessed 229 Median # of days before detection 67% Of victims were notified by external entity
  • 7. 7 7 Servers Storage DesktopsEmail Web Transaction Records Network Flows DHCP/ DNS Hypervisor Custom Apps Physical Access Badges Threat Intelligence Mobile CMDB Intrusion Detection Firewall Data Loss Prevention Anti- Malware Vulnerability Scans Traditional Authentication All Data is Security Relevant = Big Data
  • 8. 8 Solution: Splunk, The Engine For Machine Data 8 Online Services Web Services Servers Security GPS Location Storage Desktops Networks Packaged Applications Custom Applications Messaging Telecoms Online Shopping Cart Web Clickstreams Databases Energy Meters Call Detail Records Smartphones and Devices RFID Developer Platform Report and analyze Custom dashboards Monitor and alert Ad hoc search Real-Time Machine Data References – Coded fields, mappings, aliases Dynamic information – Stored in non-traditional formats Environmental context – Human maintained files, documents System/application – Available only using application request Intelligence/analytics – Indicators, anomaly, research, white/blacklist
  • 9. 9 Fraud Detection Insider Threat Advanced Threat Detection Security & Compliance Reporting Incident Analysis & Investigations Real-time Monitoring & Alerting Security Intelligence Use Cases Splunk provides solutions that address SIEM use cases and more Security & Compliance Reporting Incident Analysis & Investigations Real-time Monitoring & Alerting
  • 10. 10 1 Example Patterns of Fraud in Machine Data Industry Type of Fraud/Theft/Abuse Pattern Financial Services Account takeover Abnormally high number or dollar amounts of wire transfer withdrawals Healthcare Physician billing Physician billing for drugs outside their expertise area E-Tailing Account takeover Many accounts accessed from one IP Telecoms Calling plan abuse Customer making excessive amount of international calls on an unlimited plan Online Education Student loan fraud Student receiving federal loan has IP in “high-risk” overseas country and is absent from online classrooms and forums
  • 11. 11 Insider Threat What To Look For Data Source Abnormally high number of file transfers to USB or CD/DVD OS Abnormally large amount of data going to personal webmail account or uploaded to external file hosting site Email / web server Unusual physical access attempts (after hours, accessing unauthorized area, etc) Physical badge records / AD Above actions + employee is on an internal watchlist as result of transfer / demotion / poor review / impending layoff HR systems / above User name of terminated employee accessing internal system AD / HR systems 11
  • 12. 12 Example of Advanced Threat Activities 1 HTTP (web) session to command & control server Remote control, Steal data, Persist in company, Rent as botnet WEB Conduct Business Create additional environment Gain Access to systemTransaction .pdf .pdf executes & unpacks malware overwriting and running “allowed” programs Svchost.exeCalc.exe Attacker hacks website Steals .pdf files Web Portal.pdf Attacker creates malware, embed in .pdf, Emails to the target MAIL Read email, open attachment Threat intelligence Auth - User Roles Host Activity/Security Network Activity/Security
  • 13. 13 Connect the “Data-Dots” to See the Whole Story 1 Persist, Repeat Threat intelligence Auth - User Roles, Corp Context Host Activity/Security Network Activity/Security Attacker, know relay/C2 sites, infected sites, IOC, attack/campaign intent and attribution Where they went to, who talked to whom, attack transmitted, abnormal traffic, malware download What process is running (malicious, abnormal, etc.) Process owner, registry mods, attack/malware artifacts, patching level, attack susceptibility Access level, privileged users, likelihood of infection, where they might be in kill chain Delivery, Exploit Installation Gain Trusted Access ExfiltrationData GatheringUpgrade (escalate) Lateral movement Persist, Repeat • Third-party Threat Intel • Open source blacklist • Internal threat intelligence • Firewall • IDS / IPS • Vulnerability scanners • Web Proxy • NetFlow • Network • Endpoint (AV/IPS/FW) • Malware detection • PCLM • DHCP • OS logs • Patching • Active Directory • LDAP • CMDB • Operating System • Database • VPN, AAA, SSO
  • 14. 14 Threat intelligence Host Activity/Security Network Activity/Security Command & ControlExploitation & InstallationDelivery Accomplish Mission Security Ecosystem for Coverage and Protection Auth - User Roles, Corp Context
  • 15. 15 STIX/TAXII and Open IOC 101 • Info sharing across companies and industries • Standardized XML • IOCs include IPs, web/email domains, hashes, processes, registry key, certificates
  • 17. 17 Sample TAXII Feeds User Community Organisation Cyber Threat XChange Health Information Trust Alliance Defense Security Information Exchange Defense Industrial Base Information and Sharing and Analysis Organization ICS-ISAC Industrial Control System Information Sharing and Analysis Center NH-ISAC National Health Cybersecurity Intelligence Platform National Health Information and Analysis Center FS-ISAC / Soltra Edge Financial Services Information Sharing and Analyses Center (FS-ISAC) Retail Cyber Intelligence Sharing Center, Intelligence Sharing Portal Retail Information Sharing and Analysis Center (Retail-ISAC) More: http://stixproject.github.io/supporters/
  • 21. 21 Sample Nasdaq - Heartbleed
  • 22. 22 22 Splunk Enterprise is a well thought-out solution, designed from the outset for development and operation, and it delivers immediate results in a number of areas. “ SIEM General Project Manager, Finanz Informatik GmbH & Co. KG Challenges: Existing SIEM tools did not meet security needs – Different security information and event management (SIEM) solutions for the mainframe, network, Unix and Windows. – Difficult to correlate Security incidents accross variuos plaforms Enter Splunk: One unified solution – A single solution across platforms and functions means faster and more comprehensive investigation and resolution of security incidents – Guarantee Full protection of its customer data and at the same time reduce complexity, error rates and costs. – Alerts that identify security events, authorization violations or unusual patterns of queries. Splunk at Finanz Informatik “ “
  • 23. 23 Replacing a SIEM @ Cisco 23 We moved to Splunk from traditional SIEM as Splunk is designed and engineered for “big data” use cases. Our previous SIEM was not and simply could not scale to the data volumes we have. ““ Gavin Reid, Leader, Cisco Computer Security Incident Response Team Challenges: SIEM could not meet security needs – Very difficult to index non-security or custom app log data – Serious scale and speed issues. 10GB/day and searches took > 6 minutes – Difficult to customize with reliance on pre-built rules which generated false positives Enter Splunk: Flexible SIEM and empowered team – Easy to index any type of machine data from any source – Over 60 users doing investigations, RT correlations, reporting, advanced threat detection – All the data + flexible searches and reporting = empowered team – 900 GB/day and searches take < minute. 7 global data centers with 350TB stored data – Estimate Splunk is 25% the cost of a traditional SIEM
  • 25. 25
  • 30. 30
  • 31. 31
  • 32. 32
  • 33. 33 Spot Suspicious Access • Simultaneous logins for single user occurring at two distant locations • Concurrent application access – password sharing or theft
  • 34. 34
  • 35. 35
  • 36. 36 Features in Enterprise Security 4.0 Optimize multi-step analyses to improve breach detection and response Extensible Analytics & Collaboration INVESTIGATION COLLABORATION • Investigator Journal • Attack & Investigation Timeline • Open Solutions Framework • Framework App : PCI
  • 39. ENTERPRISE CHALLENGES THREATS PEOPLE EFFICIENCY Cyber Attacks, Insider Threats, Hidden, Or Unknown Availability of Security Expertise Too Many Alerts And False Positives
  • 40. 40 Majority of the Threat Detection Solutions focus on the KNOWNS. UNKNOWNS? What about the
  • 42. DATA-SCIENCE DRIVEN BEHAVIORAL ANALYTICS BIG DATA DRIVEN SECURITY ANALYTICS MACHINE LEARNING A NEW PARADIGM
  • 44. ADVANCED CYBER ATTACKS SPLUNK UBA detects & INSIDER THREATS with BEHAVIORAL THREAT DETECTION
  • 47. 47 SECURITY ANALYTICS KILL-CHAIN HUNTER KEY WORKFLOWS - HUNTER  Investigate suspicious users, devices, and applications  Dig deeper into identified anomalies and threat indicators  Look for policy violations
  • 50. 50 THREAT DETECTION KEY WORKFLOWS – SOC ANALYST SOC ANALYST  Quickly spot threats within your network  Leverage Threat Detection workflow to investigate insider threats and cyber attacks  Act on forensic details – deactivate accounts, unplug network devices, etc.
  • 55. 55 INSIDER THREAT 5 USER ACTIVITIES RISK/THREAT DETECTION AREAS John logs in via VPN from 1.0.63.14 Unusual Geo (China) Unusual Activity Time3:00 PM Unusual Machine Access (lateral movement; individual + peer group) 3:15 PMJohn (Admin) performs an ssh as root to a new machine from the BizDev department Unusual Zone (CorpPCI) traversal (lateral movement)3:10 PM John performs a remote desktop on a system as Administrator on the PCI network zone 3:05 PM Unusual Activity Sequence (AD/DC Privilege Escalation) John elevates his privileges for the PCI network Excessive Data Transmission (individual + peer group) Unusual Zone combo (PCIcorp) 6:00 PMJohn (Adminroot) copies all the negotiation docs to another share on the corp zone Unusual File Access (individual + peer group)3:40 PM John (Adminroot) accesses all the excel and negotiations documents on the BizDev file shares Multiple Outgoing Connections Unusual VPN session duration (11h)11:35 PMJohn (Adminroot) uses a set of Twitter handles to chop and copy the data outside the enterprise
  • 56. 56 EXTERNAL ATTACK 5 USER ACTIVITIES RISK/THREAT DETECTION AREAS Peter and Sam access a malicious website. A backdoor gets installed on their computers Malicious Domain (AGD) Unusual Browser HeaderNov 15 Unusual Machine Access for Peter (lateral movement; individual + peer group)Dec 10The attacker logs on to Domain Controller via VPN with Peter’s stolen credentials from 1.0.63.14 Unusual Browser Header for Peter and SamNov 16 The attacker uses Peter and Sam’s backdoors to download and execute WCE to crack their password Nov 16 Beacons for Peter and Sam to www.byeigs.ddns.com Peter and Sam’s machines are communicating with www.byeigs.ddns.info Unusual Machine Access for Sam Unusual File Access for Sam (individual + peer group)) Dec 10 The attacker logs in as Sam and accesses all excel and negotiations docs on the BizDev shares Unusual Activity Sequence of Admin for Sam (AD/DC Privilege Escalation)Dec 10 The attacker steals the admin Kerberos ticket from admin account and escalates the privileges for Sam. Excessive Data Transmission for Peter Unusual VPN session durationJan 14The attacker VPNs as Peter, copies the docs to an external staging IP and then logs out after 3 hours.
  • 57. Copyright © 2015 Splunk Inc. Thank You! – Q&A

Notas do Editor

  1. Splunk Enterprise Security
  2. Splunk safe harbor statement.
  3. Lets start with today’s ever changing threat landscape: With all the news on cyber attacks and security breaches, you know we are constantly up against 3 very sophisticated adversaries: the cyber criminals, the nation states and also the malicious Insiders; All going after major stakes of our life, our company and our nation.
  4. The number of threats is increasing and also becoming more advanced. Today’s advanced threats are stealthy and sophisticated and evade detection from traditional, point security products that look for specific threat signatures. Above are 3 types of advanced threats. They are good at stealing confidential data, whether it be credit cards or IP, and many of their victims unfortunately end up in the headlines. Cyber criminals include the credit card theft at Target and Neiman Marcus. Nation state attacks include Iran and China attacking governments and private sector companies to steal intellectual property and/or national secrets. FYI these advanced threats are also commonly called APTs, or Advanced Persistent Threats. APT are hard to detect because they are not signature-based and hide behind legitimate credentialed activity to evade detection from traditional, point security products. Every year companies like Mandiant produce reports that describe the trends identified based on the breach investigation work that they do as part of their consulting practices. There are a couple metrics that I found interesting reading their recent reports. 100% is often via stealing password hashes or using keyloggers. Often they steal admin-level credentials so they can access many other systems and not be detected. The 40 implies that even if you see malware in one place, you need to look much further as there are likely multiple infected machines and backdoors 243 days shows how they can evade detection for months at a time. They move slow and low and do not set off alarms from point, signature-based security products like anti-malware solutions. 63% of victims were notified by an external entity. Notification usually starts with customer complaints like bank account drained or credit card maxed out. Often FBI informs them.
  5. There is an old parable about a group of blind men that touch an elephant to learn what it is like. Each one feels a different part, but only one part, such as the side, or the tusk. They then compare notes, and learn that they are in complete disagreement. When a sighted man walks by, the blind men also learn that they are all blind. While one’s subjective experience is true, it may not be the totality of truth. The parable is a rather apt allegory for the types of problems experienced in the past by many of our customers. Each blind man could represent a monitored data source, or a team (eg infrastructure or networks) providing a subjective view of the current security state. However these silos miss relevant activities – they only come together during escalated incidents. Data breaches often go unnoticed, attackers evading detection. Its difficult fully understand the security issue and to take decisive action without the complete picture. Splunk in this case could be the sighted man, capable of seeing the elephant as a whole. Splunk can provide end-to-end awareness by ingesting and correlating all security and infrastructure data, allowing our customers to find attackers, and threats faster, reducing the damage caused. I’m going to hand over now to my Presales Consultant, Dominique, to demo parts of the Enterprise Security App which we feel will help address some of your issues and concerns.
  6. Splunk can ingest any type of machine data, from any source in real time. These are listed here on the left and are flowing into Splunk for indexing. Once indexed, users can perform the use cases on the top right on the data. They can search through the data, monitor the data and be alerted in real-time if scheduled search parameters are met. The raw data can be aggregated in seconds for custom reports and dashboards. Also Splunk is a platform that developers can build on. It uses a well documented Rest API and several SDKs so developers and external; applications can directly access and act on the data within Splunk. Also, besides indexing raw data into its flat file data store, Splunk can also retrieve and index data that resides in other data stores such as a SQL database or Hadoop. Splunk can easily ingest external data to enrich existing data Splunk has indexed to increase accuracy and reduce false positives. This external could come from a wide range of sources outlined on this slide. It includes employee information from AD, asset information from a CMDB, blacklists of bad external IPs from 3rd-party threat intelligence feeds, IP ranges of critical internal networks (like a PCI-related credit cardholder environment). Correlation searches can include this external content. So for example Splunk can alert you if a low-level employee accesses a file share with critical data, but not if the file share has harmless data. Or Splunk can alert you if a user name is used specifically for an employee who no longer works for your organization. These are especially high-risk events.
  7. We support a full set of security intelligence use cases.. Some of you in the audience are using Splunk for the 3 traditional SIEM use cases, and doing it more effectively than using the the traditional SIEM tech! For understanding security and compliance posture in real time and conducting forensics investigation, with Splunk, you no longer have to rely on just power users ; with the simplificy Dhavany talked about, we make your whole team become Splunk Ninjas. With Splunk and all the data at your fingers tips, our customers have seen the MTTR came down from days to mins We also see more and more customers go beyond the SIEM use cases (the 3 on the right) with Splunk. With the power of analytics and visualization, our customers are better at detecting Advanced threats, the APT, the unknown, and to able to shine a bright light on user behaviors monitor and counter insider threats; With the business and security data all inside one platform, they use splunk to manage business risks such as fraud and abuse. One of our customers were able to save 10s of millions in financial fraud by leveraging data already in Splunk Thanks to all of you, your vision and championship , we have seen a great uptick in adoption of Splunk for security. So Why are the seeing the shift in our industry?
  8. Ultimately the patterns of fraud often are in machine data and searches can be written to look for these patterns and then alert on them. Examples are listed on this slide…there could be dozens and dozens of possible patterns…they vary based on the vertical, type of fraud, and organization….but we just listed a few here.
  9. Insider threat is the malicious insider (likely not technical) who is stealing confidential data. Maybe that data is customer records, financial forecasts, product roadmaps, or intellectual property. If the employee is taking the data to their next job and that is with a competitor, the stakes are higher b/c the stolen data perhaps can be used by the competitor to take market share or revenue from the organization which lost the data. Also of a course the insider could be revealing sensitive data which has national security implications, like with Edward Snowden. As with prior slide, the items listed here are just a few examples. They represent possible data loss. Is the theft of large amounts of data. Easiest is to copy vs emailing out Is data theft but via email to personal account like Gmail, or to an upload to a site like Dropbox Example could be an employee not in finance trying to badge into the floor where the finance department is after hours. Or a non-IT employee trying to badge into the physical server room These type of people are more likely to steal data out of anger/spite, or to help them with their next job Can help identify if the employee termination process is not working correctly and some of the user accounts of a terminated employee have not been disabled
  10. Use the animation to talk to the Zeus attack scenario described in the Zeus demo. Reconn – find vulnerability, find method most likely to gain access – locate vulnerable server with .pdf Reconn - Attacker attacks an extranet portal (vulnerable server) and steals a known good document (.pdf) Weaponization - Attacker creates malware and packages up in pdf and names it the same document as that on the portal (look like a good document) Delivery - Attacker spoofs (use technique to send email that looks like it’s coming from an employee of the company) a company employee email and sends to several targets at the company Exploitation – User (all it takes is one) reads email, open the attachment, exploits a vulnerable in a document reader that allows programs to run Installation – program installs several programs that over-write “good” programs on the computer – the calculator program – calc.exe Installation – calc.exe spans svchost.exe, a generic program on windows machines Command and Control – svchost.exe establishes communication to remote command and control server. Point out – this came from a real example. The left shows the different defensive technologies that might have seen something.
  11. Password Credential Tools: WCE Windows Credential Editor werden nicht von Virenscannern erkannt. Vor allem aktuelle Versionen.
  12. Cisco, the global networking company. Their internal security team uses us. 7 clusters around globe, 900GB a day, 350TB stored data. (note – while Cisco has presented this info at numerous public events, and also blogged about it, please limit this information just to the customer you are presenting to – do not make public) Some logging and SIEM solutions we have used or evaluated required considerable effort to process custom formats (custom parsers, etc.) In our experience with SIEM 1 we found it to be rigid, inflexible, and difficult to customize Modifying how We like the ability to throw data of virtually any format/structure at our logging system No API/CLI Fat java-based clients Only direct database access or worse, no alternative access Making scripting and automation more challenging In the past, it wasn’t uncommon for regular reports and ad-hoc queries run against the SIEMs to take hours to complete CSIRT undertook reevaluation of logging/SIEM project in mid-2010 running a number of trials and proof of concepts, wrapping up in early 2011 In CY12Q1 we retired the SIEM that had been in use since CY03 (NetIQ) Extensive migration project to replicate all existing playbook reports from SIEM in Splunk logging has been successful. Moved over 400 regularly scheduled reports from our SIEM into the new logging solution. Global logging solution deployed by end of CY11 Also see: http://blogs.cisco.com/security/security-logging-in-an-enterprise-part-2-of-2/ Based on sheer cost of deployment, we estimate that investment for a global logging solution was roughly 25% of what deploying a full SIEM would have cost us Began mid-2010, completed early 2011 Evaluated, trialed, Ran PoCs: Splunk and three other loggers SIEM 1 and six other SIEMs Strategy moving forward: Retire current SIEM Undertake global logging Estimated: 25% of SIEM cost Over 90% 0f the team is using the tool (where as before we primarily had analysts running reports) It is a great fit for the brand new analyst all the way up to the most seasoned investigators Much higher percentage than SIEM 1 (which required logging in via a fat client or using direct DB access) With our revamped event collection deployment we are: Indexing over 35x the volume of data we were previously Querying on average 20x faster Long Queries: With SIEM 1: 2% over 1 hour With Splunk: <0.5% over 1 hour
  13. Cisco, the global networking company. Their internal security team uses us. 7 clusters around globe, 900GB a day, 350TB stored data. (note – while Cisco has presented this info at numerous public events, and also blogged about it, please limit this information just to the customer you are presenting to – do not make public) Some logging and SIEM solutions we have used or evaluated required considerable effort to process custom formats (custom parsers, etc.) In our experience with SIEM 1 we found it to be rigid, inflexible, and difficult to customize Modifying how We like the ability to throw data of virtually any format/structure at our logging system No API/CLI Fat java-based clients Only direct database access or worse, no alternative access Making scripting and automation more challenging In the past, it wasn’t uncommon for regular reports and ad-hoc queries run against the SIEMs to take hours to complete CSIRT undertook reevaluation of logging/SIEM project in mid-2010 running a number of trials and proof of concepts, wrapping up in early 2011 In CY12Q1 we retired the SIEM that had been in use since CY03 (NetIQ) Extensive migration project to replicate all existing playbook reports from SIEM in Splunk logging has been successful. Moved over 400 regularly scheduled reports from our SIEM into the new logging solution. Global logging solution deployed by end of CY11 Also see: http://blogs.cisco.com/security/security-logging-in-an-enterprise-part-2-of-2/ Based on sheer cost of deployment, we estimate that investment for a global logging solution was roughly 25% of what deploying a full SIEM would have cost us Began mid-2010, completed early 2011 Evaluated, trialed, Ran PoCs: Splunk and three other loggers SIEM 1 and six other SIEMs Strategy moving forward: Retire current SIEM Undertake global logging Estimated: 25% of SIEM cost Over 90% 0f the team is using the tool (where as before we primarily had analysts running reports) It is a great fit for the brand new analyst all the way up to the most seasoned investigators Much higher percentage than SIEM 1 (which required logging in via a fat client or using direct DB access) With our revamped event collection deployment we are: Indexing over 35x the volume of data we were previously Querying on average 20x faster Long Queries: With SIEM 1: 2% over 1 hour With Splunk: <0.5% over 1 hour
  14. Pre-built correlation searches trigger alerts across the security stack Alerts are based on baselines of rolling time windows and not static values - Autoconfiguring thresholds improve threat detection for hard to find attacks and reduce false positives. Use the Incident Review dashboard to manage alerts, filter, assign, prioritize and comment on alerts. Incident Review dashboard is the starting point for investigation. Expand the alert tab to get more information. Use Event Actions to get contextual drill downs and acquire deeper context
  15. Pre-built reports and dashboards for Access Protection, Endpoint Protection, Network Protection, Asset and Identity Center Simplify monitoring and exception analysis Satisfy compliance and forensics requirements to track activity Increase the effectiveness of security and IT tools across the enterprise
  16. Give all users the ability to find relationships visually Visually organize and fuse any data to discern any context Create event swim lanes from from the web UI SHOW: https://es-na.demo.splunk.com/en-US/app/SplunkEnterpriseSecuritySuite/asset_investigator?form.asset=10.11.36.20
  17. Give all users the ability to find relationships visually Visually organize and fuse any data to discern any context Create event swim lanes from from the web UI SHOW: https://es-na.demo.splunk.com/en-US/app/SplunkEnterpriseSecuritySuite/asset_investigator?form.asset=10.11.36.20
  18. Let’s talk about “What’s new in Enterprise Security 4.0” First Pillar is investigation : It’s a major release because the design is to Optimized multi-step analyses, specifically for breach analysis. In order for us to accomplish the goal, we are introducing Investigator Journal which is a feature that tracks analyst’s action Attack & Investigation timeline that puts analysis events and notes in timeline to address our plan toward managing kill chain concept. Second pillar is Collaboration : We understand that security is coordination of people and expertise which involves team efforts. So, we believed that it is important to introduce, ES as Open Solutions Framework where analysts and communities can share knowledge objects or ES specific extended features. As an example, PCI app is re written on top of ES open Solutions Framework, PCI conveniently reuses features in ES, like notable events framework, threat intelligence framework, asset and identity framework.. Etc..
  19. Find RATs. ….
  20. Horizontal timeline
  21. Horizontal timeline