Benefits of Semi Automation - Learn Security Analysis A Lot From Football

Slides:



Advertisements
Similar presentations
System Development Life Cycle (SDLC)
Advertisements

2009 – E. Félix Security DSL Toward model-based security engineering: developing a security analysis DSML Véronique Normand, Edith Félix, Thales Research.
Complete and Integrated Lifecycle Management. Challenges 1.
Step 5: Complete Your Project. Setting the scene Suppose you have been running a project to write a small piece of computer software for a business. The.
Critical Thinking Problem Hint: Think outside the box (cover all nine circles with four straight lines)
AGENDA Proportionality: a challenge for regulation
Introduction to CSCI 1311 Dr. Mark C. Lewis
SAM Baseline Review Engagement
STARTER Identify the main reasons why you think Sergio Aguero decided to sign and play football for Manchester City.
7.4 Control Costs The process of monitoring the status of the project costs and managing changes to the cost baseline. Involves updating the project budget.
Effective Time Management
What is a CAT? What is a CAT?.
Integrating Data From Multiple Schedules
‘Asset Management – It’s not just Renewal’
Assessing Your Strengths
An Introduction to Motivational Interviewing
Digital Workplace.
Unit OP 1 Support children with additional needs
Architecture & Construction:
It’s not all about the tool!
CS101 Introduction to Computing Lecture 19 Programming Languages
Recall The Team Skills Analyzing the Problem
Extreme Programming.
ALEXANDRIA CITY PUBLIC SCHOOLS Applying Risk Management Consulting
Geography: Exam Skills for GCSE
SAM Cloud Productivity Engagement
SAM Server Optimization Engagement
APM 2010 – 2011 Study Directing of Project Portfolios: Good Governance of Change initiatives Carried out by: Governance Specific Interest Group This.
Stages of Team Development
Case Study on Selection of a Work and Asset Management System
SAM Infrastructure Optimization Engagement
Dr Anna Stodter FST Department of Sport and Exercise Sciences
CAMMS Webinar cammsinsights - Friday 25th of May, 2018
1. Copy your homework. 2. Take out your essay. **Write Draft #2 on top. 3. On the top of your essay write down one question or concern you have about.
‘Asset Management – It’s not just Renewal’
Professional Learning Team Workshop #4
Verification and Validation Unit Testing
Fundamental Test Process
UNIT 3 CHAPTER 1 LESSON 4 Using Simple Commands.
Automating Profitable Growth™
Systems Analysis and Design
Why Resilience is Part of Research
Road Infrastructure for Road Vehicles Automation
Get In Shape With EMS Training. INTRODUCTION Those that are thinking about making a change in their life might have thought about going through with EMS.
DMAIC Roadmap DMAIC methodology is central to Six Sigma process improvement projects. Each phase provides a problem solving process where-by specific tools.
Agile testing for web API with Postman
CS385T Software Engineering Dr.Doaa Sami
Business Connect Visitor Management February 2017.
Killer Project Management Best Practices
Introduction to Ergonomics
Business Intelligence
The Thematic Essay Questions set will require coverage of the whole period, which will be of at least 100 years. The whole period will not need to be covered.
Overview of Workflows: Why Use Them?
Applying Use Cases (Chapters 25,26)
Applying Use Cases (Chapters 25,26)
Automating Profitable Growth™
The PPSO SIG Autumn 2005 Conference…
What is WFA? Scenario – FC Provisioning
Manage testing by time boxes
System analysis and design
AUDIT TESTS.
Think about your view of QA
Building Strong Partnerships
Automating Profitable Growth
Lesson 12 – Another Primary Research Method
MSSP Security Orchestration Shopping List
OU BATTLECARD: E-Business Suite Courses and Certifications
Changing Role Tier 1 SOC Analysts Should You Stop Hiring?
10 Signs You Should Invest In Security Automation
Security Orchestration - A Catalyst for MSSP Speed to Market
Presentation transcript:

Benefits of Semi Automation Benefits of Semi Automation

Introduction In football, planning every move down to the smallest details is everything. Any coach worth his or her salt has a playbook of strategies and every move, as impulsive as it may seem, has been carefully calculated with perfect “If this, then that” precision, before it ever took place. Yet, although every play has been pre-charted, effective execution relies on the adaptability of players in the moment and a keen understanding of the adjustments

When it comes to the security of corporate data, it’s not all that different from football. In order to be ready for anything that comes your way, all aspects need to be planned and mapped out beforehand, automated with a predetermined course of action – in the vernacular, “IFTTT”. This security playbook is called security automation and it’s an imperative part of keeping all parts of a security operation workflow moving together in precise and accurate motion.security automation Security Playbook

In the complex corporate security environment, automation is increasingly the “go-to” answer for organizations lost in a sea of alerts, logs and data. But there is a danger in putting too much faith into security automation and orchestration alone. Organizations often turn to automation looking for a technological cure-all for their security woes, but while they are very good at what they do (at least theoretically), many security professionals are wary of handing off their most critical processes to a black box that cannot make up for the human intellect element.security automation and orchestration Automation

Machines are not people and as such, do not waiver from their predetermined playbooks, sometimes to the detriment of the goal at hand – that of keeping corporate data secure. As Gartner security analyst Anton Chuvakin points out. “There is – at this stage of security technology development, at least – GOOD AUTOMATION and EVIL AUTOMATION. Longer term, we will certainly see more automation and more domains of information security (cybersecurity, if you have to) covered by automation, BUT I’d be willing to bet anything that the profession of a security analyst will never be full automated.”1 Technology Development

In Forbes, Courtney Nash writes: “From a security standpoint, automation provides infrastructure security, and makes it auditable. But it doesn’t really increase data/information security (e.g. this file can/cannot live on that server)–those too are human tasks requiring human judgement.” Often, just like football’s receiver has to make a moment’s call and adjust strategies, relying on automation and orchestration alone is too rigid. To be truly useful, orchestration must become far more flexible and include people in those processes. What To Learn From Football

When incorporating flexibility into the automation process, a typical scenario could go something like this: Within Automation

The automated process and human intellect work together to create a dynamic, adaptable security infrastructure. Properly implemented the right balance of man/machine mix help validate the relevancy of alerts – allowing analysts to close/eliminate cases more quickly and make sure analysts only look at cases that actually matter while getting rid of the “noise”. Because maintaining varying degrees of flexibility is in part dependent on the ability to navigate effectively across the security infrastructure, teams need tight integration with other security tools – the tighter the integration of all tools from end to end, the greater the ability to traverse between automation and human investigation. The Automated Process

Finding the perfect balance between human intellect and predetermined moves is a bit of an art form, just like in football. Flexibility within automation, with the input of those people who know their processes best, is the key to complete security. Conclusion