What You Should Know About Driving Down MTTD and MTTR

Slides:



Advertisements
Similar presentations
HP Quality Center Overview.
Advertisements

Software Measurement and Process Improvement
Certified Business Process Professional (CBPP®)
1 | © 2013 Infoblox Inc. All Rights Reserved. Authoritative IP Address Management (IPAM) and its Security Implications Rick Bylina, Sr. Product Marketing.
Software Asset Management
Information Systems Controls for System Reliability -Information Security-
Introduction to Network Defense
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Dell Connected Security Solutions Simplify & unify.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
Project Portfolio Management Business Priorities Presentation.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Enable self-service – users make requests on demand Standardize and deliver Templates, workflows, processes and a common CDMB enable automation The Service.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Clare Henry Director Technical Product Marketing Michael Nappi Product Unit Manager Microsoft System Center.
Financial Management & Internal Control for Utility Companies Julia Barber, CPA and Sherman, Barber & Mullikin, CPAs Madison, IN
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Phase-1: Prepare for the Change Why stepping back and preparing for the change is so important to successful adoption: Uniform and effective change adoption.
SELF-DEFENDING NETWORK. CONTENTS Introduction What is Self Defending Network? Types of Network Attacks Structure of Self Defending Network Conclusion.
EView/390z Management for IBM Mainframe for HPE Operations Manager i (OMi) Extending the cross-platform capabilities of Hewlett Packard Enterprise Software.
MODULE 12 – STRATEGIC MANAGEMENT
Active Cyber Security, OnDemand
Business System Development
Joe, Larry, Josh, Susan, Mary, & Ken
Nicole Steen-Dutton, ClickDimensions
Speaker’s Name, SAP Month 00, 2017
BUILDING A BETTER COMMUNITY
Description of Revision
Why DevOps Success Depends on the Right Infrastructure.
I have many checklists: how do I get started with cyber security?
HSE Case: Risk Based Approach.
Making Information Security Manageable with GRC
The Discipline of Decision
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
PROACTIVE SNOOPING ANALYSIS
Automating Profitable Growth™
UNLV Data Governance Executive Sponsors Meeting
Shifting from “Incident” to “Continuous” Response
Automating Security Operations using Phantom
How to establish positive relationships with your governors.
1 5 Identify Connect Leverage MOBILE-READY SINGLE PLATFORM
Managed Content Services
Automating Profitable Growth™
The MobileIron® Threat Detection difference:
Automating Profitable Growth™
Agenda Introductions What is a Unified Shelter Model?
Honeypots Visit for more Learning Resources 1.
Prevention, Intelligence
Sachiko A. Kuwabara, PhD, MA
Time Scheduling and Project management
Capitalize on Your Business’s Technology
Data Security and Privacy Techniques for Modern Databases
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Challenges Of Network Security
Smart companies carefully track their investments in every part of their business. By carefully monitoring and managing their return on investment (ROI)
MSSP Security Orchestration Shopping List
Fortify YOUR Defense with CyberSponse Adaptive Security
CyberSecurity Strategy For Defendable ROI
Changing Role Tier 1 SOC Analysts Should You Stop Hiring?
10 Signs You Should Invest In Security Automation
Security Orchestration - A Catalyst for MSSP Speed to Market
OPIsrael And The Value Of Next Generation SOCs
Presentation transcript:

Driving Down MTTD and MTTR What You Should Know About

Introduction Effectively connect people, process and technology to minimize MTTD and MTTR There’s a reason it’s said that what gets measured gets managed. In order to successfully achieve a goal, you have to be able to measure progress. It’s the only way to know if you’re heading in the right direction. That’s why any security operations team worth their salt will be paying close attention to both their mean time to detect (MTTD) and mean time to respond (MTTR) metrics when it comes to resolving incidents.

MTTD & MTTR - Dwell Time The average dwell time for attackers still sits somewhere within the ranges of 100 – 140 days and frankly, we can do better. Security operations teams need to be fanatical when it comes to lowering these metrics within their organizations. Significantly reducing dwell time, MTTD and MTTR starts with an understanding of attacks. From there, you need multiple groups working together in harmony enabled by technology to automate and orchestrate incident response processes. incident response

Three Quick Definitions ●Mean time to detect, or MTTD, reflects the amount of time it takes your team to discover a potential security incident. ●Mean time to respond, or MTTR, is the time it takes to control, remediate and/or eradicate a threat once it has been discovered. ●Dwell time captures the entire length of a security incident – reflecting the duration from when an attacker first enters your network to the time they are removed and you have returned to a known-good state.

Factor In Reducing MTTD and MTTR People are always the first layer when it comes to reducing MTTD and MTTR within any SOC. Up and down the chain, your team needs to deeply understand both the processes and the technologies in order to detect and respond to threats quickly. This is accomplished through education and constant training. Consistent training and tabletops are also useful to test your security operations team’s understanding, alertness and procedural readiness to harden and lower your MTTD and MTTR and ensure battle-readiness when it comes to real incidents.

Security Orchestration & Automation For starters, ensure your security team fully understands your incident response processes and life cycles, common attacks and hacker techniques, and best practices for how to defend against them. As an example – security orchestration and automation tools can be used effectively by analysts of any skill level, but you’ll get even more out of your investment if your team already has a good foundation for analyzing and making judgement calls about malicious activity.security orchestration and automation

Clarify & Codify The Processes SOC teams need a detailed understanding of the assets they’re protecting, the roles and responsibilities within each group, what internal resources are available to assist with the incident and how each incident effects their organizations from a priority standpoint. Having proper processes established for security operations teams, tied to the appropriate groups and responsibilities, will significantly lower the MTTR metric within organizations since the predefined rules of engagement on how to tackle incidents has already been outlined. This builds confidence and empowers the SOC to contain and remediate threats efficiently and within the guidelines the organization has set forth.

Enable Team With Right Tools Using technology to lower MTTR and MTTD is an integral part of reducing these KPIs in today’s SOCs. Security operations groups are working with a multitude of tools, many times within in disparate consoles that can limit their visibility into an attack, so having technology that allows for a central point of reference where this data can be correlated and analyzed is required.

Right Tools To Drive Down

Drive Down MTTD and MTTR Assuming data is being directed to a central location, the next step is to start automating and orchestrating efforts to detect and remediate attacks. Having the data directed to one location is important because your SOC needs a central point of authority when it comes to making decisions on attacks. Security orchestration, automation and response (SOAR)Security orchestration, automation and response (SOAR) tools are used to take the intelligence from disparate systems to enable SOC teams to make quicker decisions, which lowers the MTTR when working incidents. In this way, technology becomes the connective tissue between the SOC’s ecosystem of tools, processes and personnel.

Conclusion Cybersecurity is a collaborative effort and effectively using the people, processes and technologies in tandem is what enables security operations teams to continuously improve performance and protect their organizations. Many organizations tackle technology first and try to adapt their processes and people based on the technology stack. In reality, it should be the reverse – technology should be the enabler that allows the other components to be streamlined into a well-oiled machine. Using SOAR technology allows for security operations teams to utilize their processes and procedures in automated ways to significantly reduce the MTTD & MTTR within their organizations.reduce the MTTD & MTTR