Let’s go Threat Hunting

Slides:



Advertisements
Similar presentations
Security Life Cycle for Advanced Threats
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
The Most Analytical and Comprehensive Defense Network in a Box.
Building a Threat Intel Team Ryan Olson Director of Threat Intelligence October, 2014.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
The Most Analytical and Comprehensive Defense Network in a Box.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Ali Alhamdan, PhD National Information Center Ministry of Interior
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
How to Make Cyber Threat Intelligence Actionable
Why SIEM – Why Security Intelligence??
IT Security Mandatory Solutions Andris Soroka 2nd of July, RIGA.
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Ken Paiboon User Behavior Intelligence Fundamentals: Behaviors, Characteristics, and Facts Ken Paiboon
Understanding and breaking the cyber kill chain
Proactive Incident Response
Your Partner for Superior Cybersecurity
OIT Security Operations
3 Do you monitor for unauthorized intrusion activity?
Today’s cyber security landscape
Cybersecurity - What’s Next? June 2017
Juniper Software-Defined Secure Network
Cisco 2017 Security Annual Report
Vikas Uberoy -Channel Director ANZ
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
Real-time protection for web sites and web apps against ATTACKS
Cyber Security: State of the Nation
Compliance with hardening standards
Intelligence Driven Defense, The Next Generation SOC
Active Cyber Security, OnDemand
Dissecting the Cyber Security Threat Landscape
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Endpoint Security Market to grow at 7% CAGR from 2017 to 2024: Global Market.
Jon Peppler, Menlo Security Channels
Matt G change over point ?
Cyber Threat Intelligence Sharing Standards-based Repository
بهترین راهکار را انتخاب کنید...
Closing the Breach Detection Gap
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
How to build a defense-in-depth
How to Operationalize Big Data Security Analytics
Healthcare Cloud Security Stack for Microsoft Azure
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
PROACTIVE SNOOPING ANALYSIS
Shifting from “Incident” to “Continuous” Response
Navigating Security Seas in a Small Ship with a Limited Crew
Securing the Threats of Tomorrow, Today.
Panda Adaptive Defense Platform and Services
Secure once, run anywhere Simplify your security with Sophos
Chapter 4: Protecting the Organization
Automating Security Operations using Phantom
Healthcare Cloud Security Stack for Microsoft Azure
Coordinated Security Response
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
Strategic threat assessment
Information Protection
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Security intelligence: solving the puzzle for actionable insight
Information Protection
CyberSecurity Strategy For Defendable ROI
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Let’s go Threat Hunting Gain visibility and insight into potential threats and risks

Introductions Drives security innovation and awareness to help customers navigate the ever-evolving threat landscape. Serves on Product Advisory Councils for FireEYE, Palo Alto, Sophos, Cisco, Intel-McAfee, and Symantec Instrumental in developing the first virtual SOC and CISO programs Worked with FBI’s Cyber Crime Divisio John Ayers VP, Product Management

About Us Proven: 10 consecutive years on Gartner Magic Quadrant for SIEM Comprehensive: Combines all critical capabilities (SIEM, MD, UEBA, threat intelligence) Innovative: Only SIEM platform that also provides 24/7 co-managed SOC Effective: Practical and flexible solutions even for the “1-man” or “No-man” security team Recognized as “Best Buy”, “5 Star” and “Recommended” by trusted leading industry source.

Agenda What is threat hunting? What is a threat? Why me? What is the threat lifecycle? Why hunt for threats? What is needed to hunt? When should you hunt for threats? Hunting maturity What if you find something? The role of threat intelligence Demonstration – some examples How SIEMphonic hunts for threats What have we caught? Questions

What is a threat? Threats occur because adversaries have intent, capacity and opportunity INTENT The goals your adversary wants to achieve CAPABILITY The ability of your adversary to successfully breach your organization and achiever their intended goals (s) OPPORTUNITY Your adversary’s timing and knowledge of your environment, including its vulnerabilities A THREAT A threat to your organization + + =

What is threat hunting? You have “good stuff” in your network, the bad guys want it; they are attacking you as we speak-trying to get a foothold Yes you have defenses (NGFW, AV, IDS, SIEM…) but Pobodys Nerfect Assume Breach paradigm is needed Despite your best defenses, the bad guys are inside – what now? Answer: Go looking for them Threat hunting is A focused, iterative approach to seeking adversaries inside your network Threat hunting is not Waiting for someone else to tell you that you’ve been hacked

Why hunt for threats? 80%+ of malware is tailored to the target network Time to discover is 200+ days

The Kill Chain of Advanced Threats Antispam Malicious Email Spam Spam Web Filtering Malicious Link Malicious Link Malicious Web Site Intrusion Prevention Customer Office Exploit Exploit Anti-Malware Malware Malware App Control Command & Control Server Bot Commands & Stolen Data Bot Commands & Stolen Data Access Confirmed

A win is a win – catch them anywhere in the cycle Where in the kill chain to catch them? A win is a win – catch them anywhere in the cycle and you win; they lose Don’t buy the bogus argument: Defenders have to win every time all the time but attackers get infinite tries and need to win only once With this shift, show them there will be losers… we should have a slight variation of this slide per vertical depending on Source: Verizon report

Assume you’ll catch something, then what? Work out an Incident Response Plan Who does what when an incident is found Stages of IR

What do you need to start hunting? Get data from assets Passive defense first Active defense next Meld TI into the mix Only hypothetical: Offense If you have nation-state capabilities (hint: you don’t)

How to hunt? Form a hypotheses. For example – VPN connections from outside our home country bear investigation First time seen processes on critical machines need eyes Get data Linked data makes analysis possible; pivoting is key How to search Visualization, anomaly How to focus Enrichment

Who should hunt? This is a full time job – hard to do part time Dedicated staff is preferred Ideally focused on true threats, not sidelined by alert response or network maintenance or vulnerability patching tasks Curious people with exposure to security technologies Security Operations Skills: Tier 1 Rankings 80% Log analysis and use of analytic tools 78% Knowledge of baseline network activity 70% Threat analysis (including the use of threat intelligence) 66% Understanding of baseline endpoint apps, users and access

Hunting Maturity Model LEVEL 0 INITIAL Relies primarily on automated alerting Little or no routine data collection LEVEL 1 MINIMAL Incorporates threat intelligence indicator searches Moderate or high level of routine data collections LEVEL 2 PROCEDURAL Follows data analysis procedures created by others High or very high level of routine data collection LEVEL 3 INNOVATIVE Creates new data analysis procedures LEVEL 4 LEADING Automates the majority of successful data analysis procedures

Demonstration EventTracker 9 is a threat hunters dream weapon Super fast search with linked data via Elastic Search Visualizations, enrichment, anomaly engine Death Star

How SIEMphonic hunts Start with end in mind – IR Plan Identify data sources and integrate them Integrate threat intelligence Get triggers from various sources Anomaly detection in network Notification from threat intel (global or community) Review hourly reports Crown jewels analysis Escalate L1  L2 L3  customer with remediation recommendations Recording via Case book - Leverage IR Playbook Update Risk Register

eventtracker.com/catch-of-the-day We review billions of logs daily to protect our customers. See what we caught today! eventtracker.com/catch-of-the-day

Resources The Threat Hunting Project: www.threathunting.net • Enterprise Detection & Response: http://detect-respond.blogspot.com • “The Who, What, Where, When, Why and How of Effective Threat Hunting”: www.sans.org/reading-room/whitepapers/analyst/who-what-where-when-effective-threat-hunting-36785 • “Generating Hypotheses for Successful Threat Hunting”: www.sans.org/reading-room/whitepapers/threats/generating-hypotheses-successful-threat-hunting-37172

Q&A

Thank you.