Data Science Transforming Security Operations



Similar documents
What s New in Security Analytics Be the Hunter.. Not the Hunted

Rashmi Knowles Chief Security Architect EMEA

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Advanced Threats: The New World Order

Analytics: The Future of Security

RSA Security Analytics

Security Analytics for Smart Grid

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

The session is about to commence. Please switch your phone to silent!

Security Information & Event Management (SIEM)

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Intelligence Driven Security

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

QRadar SIEM and FireEye MPS Integration

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

Getting Ahead of Advanced Threats

WHAT IS LOG CORRELATION? Understanding the most powerful feature of SIEM

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

THE EVOLUTION OF SIEM

QRadar SIEM and Zscaler Nanolog Streaming Service

Bridging the gap between COTS tool alerting and raw data analysis

IBM QRadar Security Intelligence April 2013

DYNAMIC DNS: DATA EXFILTRATION

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS

Discover Security That s Highly Intelligent.

The Future of the Advanced SOC

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Unified Security, ATP and more

IT Security Strategy and Priorities. Stefan Lager CTO Services

RSA Security Anatomy of an Attack Lessons learned

A Primer on Cyber Threat Intelligence

Using SIEM for Real- Time Threat Detection

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Good Guys vs. the Bad Guys: Can Big Data Tools Counteract Advanced Threats?

Active Response: Automated Risk Reduction or Manual Action?

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Breach Found. Did It Hurt?

BIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Joining Forces: Bringing Big Data to your Security Team

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Q1 Labs Corporate Overview

What is Security Intelligence?

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

IBM Security IBM Corporation IBM Corporation

CyberArk Privileged Threat Analytics. Solution Brief

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Hunting for the Undefined Threat: Advanced Analytics & Visualization

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Splunk Company Overview

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Cyber Situational Awareness for Enterprise Security

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Modern Approach to Incident Response: Automated Response Architecture

Security strategies to stay off the Børsen front page

How To Create Situational Awareness

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Changing the Enterprise Security Landscape

Is your SIEM ready.???

Combating a new generation of cybercriminal with in-depth security monitoring

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

How To Manage Security On A Networked Computer System

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Security Business Intelligence Big Data for Faster Detection/Response

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst

the challenge our mission our advisors

IBM Security Intelligence Strategy

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente

SAS Fraud Framework for Banking

Concierge SIEM Reporting Overview

AMPLIFYING SECURITY INTELLIGENCE

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

How To Buy Nitro Security

Security Operations. Key technologies for your Security Operations Center. Davide Veneziano - RSA Technology Consultant

Transcription:

SESSION ID: STR-W03 Data Science Transforming Security Operations Alon Kaufman Ph.D. Director Data Science & Innovation RSA

Agenda Transforming Security Operations with Data Science The Vision: Where we should head & Why The Strategy: What we need to achieve The Tactics: How we get there Key message: Data science is a key methodology and technology in this transformation, its not merely a feature. 2

Security Operation Current Operation Model Threat Landscape Current Security Operations More aggressive More complex From everywhere On everything Collect Detect Investigate Respond 3

Security Operation Current Operation Model Threat Landscape Current Approach in Failing More aggressive 2015 Information More security complex incidents: 42.8 M 48% From everywhere Confirmed On everything breaches: 2122 55% Percent of breaches where time to compromise (orange)/time to discovery(blue) was days or less Failures of the security industry, Yoran, Robertson, 2015 Verizon, 2005 DBIR 4 Current Security Operations Collect Detect Investigate Respond

We are Being Defeated, What s Happening? We have the technology, the brains, the funding. The attackers operate in a known environment! The attackers job is more predictable!! Their lives are easier!!! Our operations are slow... reactive We are running into a skill gap/fatigue We don t make their life hard enough 5

Technology at the Aid of Human Operations 1965 Aviation Radar 2015 Tactical Situation Display 6

Transforming the Role of the Human Operations Behind the Machine What s the driver s role? What s the Pilot s role? The Human role: Leaving to the human the intentions & final decisions!! 7

What Happened to The Machine Operator Human Platform Stick & throttle Gun Jet engines Missiles Radar BVR missiles RWR Detect threat Identify danger ECM Select weapon Human decision *Beyond View Range, **Radar Warning Receiver 8, ***Electronic CounterMeasure

What Happened to The Machine Operator Human Platform Stick & throttle Gun Want the same in security? Jet engines Missiles Radar BVR missiles RWR Detect threat Identify danger ECM Select weapon Human decision Leave thinking and decisions to humans and let the machines and platforms do the rest *Beyond View Range, **Radar Warning Receiver 9, ***Electronic CounterMeasure

It s Time for the Next Era HIPS IDS AV FW Vul mng 2015 Information SQL security NAC incidents: 42.8 M 48% Regex scripting Confirmed breaches: DLP Forensic 2122 anal 55% SIEM HIPS Current Approach in Failing AM IPS IVS Policy FW Percent of breaches where time to compromise (orange)/time to discovery(blue) was days or less Malware anal Sec GW Failures of the security industry, Yoran, Robertson, 2015 Verizon, 2005 DBIR 10 Advanced Security Analytics SA Comprehensive Accurate Proactive Faster Context aware Adaptive Leverage intelligence

The Next Era: Advanced Security Analytics Comprehensive All possible inputs Going beyond the known Proactive / Preventive Automatic Actionable insights & recommendation Human intelligence Knowledge Sharing Intentions & decisions 11

The Next Era: Advanced Security Analytics Comprehensive All possible inputs Going beyond the known Detect Attacks vs Alerts Prioritized Immediate Proactive / Preventive Automatic Actionable insights & recommendation Investigate Hierarchical model All prepared Risk & impact Human intelligence Knowledge Sharing Intentions & decisions Respond Automatic Self learning Recommend 12

We Need to Transform So what is needed to get there? 13

We Need to Transform So what is needed to get there? We have the DATA We know the PROBLEM we need to reveal the insights & provide actionable outcomes Data Science!!! 14

What is Data Science in 47 Seconds The use of techniques as statistics and machine learning on big multistructured data, to identify correlations and causal relationships, classify and predict events, identify patterns and anomalies, infer probabilities and interest, with the goal of extracting meaning from data and creating valuable products. Goals Constrains Visualizations Decisions Business Data warehousing Data integration Data engineering Data Manipulation Big Data Analytics Statistics Machine learning Pattern recognition Probability models The Art of solving business problems utilizing the available data

Data Science Applicative Practice Data Science is no magic! Understand your problem Learn your data Create valuable indicators Apply the right modeling techniques! Measure & Success Joint iterative work with domain experts and SMEs

The Data is all There -> Reveal the Essence DATA SCIENCE All possible inputs Going beyond the known Automatic Actionable insights & recommendation Knowledge Sharing Intentions & decisions Comprehe nsive Proactive / Preventive Human intelligence Detect the known and unknown Aggregation & prioritization Automatic learning Streaming & Batch Visibility & Context Situational aware Forecasting and predictive Recommendation systems Cross-team learning Sharing & crowd-sourcing 18 Detect Investigate Respond Attacks vs Alerts Prioritized Immediate Hierarchical model All prepared Risk & impact Automatic Self learning Recommend

Examples of Data Science in the Transformation Detect Attacks vs Alerts Prioritized Immediate Investigation Hierarchical model All prepared Risk & impact Respond Automatic Self learning Recommend 19

UAE Detect Risky IN VPN logins Country Device3 Device2 Device1 User logs in from UAE for the 1 st time. He s always located in India Score: 92 Example of a real user, login in to the corporate network Device User logs in from a new, unrecognized, device Score: 90 System learns the user behavior from his historical data Transmitted Data [MB] User transmits 1GB, user s average is 68MB Score: 93 Session Duration [hr] Sessions duration is 24 hours, user s average is 4 hours Score: 84 Many more Final Score Final score is an aggregation of the feature s scores Aggregate Score: 98

Country UAE IN User logs in from UAE for the 1 st time. He s always located in India Score: 92 Device Device3 Device2 Device1 User logs in from a new, unrecognized, device Score: 90 System learns the user behavior from his historical data Transmitted Data [MB] User transmits 1GB, user s average is 68MB Score: 93 Session Duration [hr] Based on nested anomaly detection models Many User/Group more behavior analysis Ranking based on statistical significance Final Score Sessions duration is 24 hours, user s average is 4 hours Score: 84 Final score is an aggregation of the feature s scores Aggregate Score: 98

Recommending New IOCs When the analyst creates a new IOC the system can recommend: How strong is this new IOC by itself? Is it similar to already existing IOC? What is the best threshold setting (if applicable)? Recommends new IoC New Recommended IoCs, based on combining existing IoCs

Examples of Data Science in the Transformation Detect Attacks vs Alerts Prioritized Immediate Investigation Hierarchical model All prepared Risk & impact Respond Automatic Self learning Recommend 23

Community Based Data Enrichment Let the analyst know what the community thinks about the IP Take Action Investigate & Incidents

Examples of Data Science in the Transformation Detect Attacks vs Alerts Prioritized Immediate Investigation Hierarchical model All prepared Risk & impact Respond Automatic Self learning Recommend 26

Out-of-band Challenge Knowledge Others Leaning and Self-Improving Detection Risk-Based Security and Self-Protection Ongoing, automatic self-learning fraud detection model Real-time decisions/actions based on risk scores User Device Payee Risk Engine 271 937 Policy Mgr. Authenticate Deny Continue Activity details Data Science based Risk Engine Feedback Feedback Case Mgmt Step-up Authentication

Out-of-band Challenge Knowledge Others Leaning and Self-Improving Detection Risk-Based Security and Self-Protection Ongoing, automatic self-learning fraud detection model Real-time decisions/actions based on risk scores User Device Payee Based on an online-learning Bayesian engine Utilizing confidence based Activity details feedback loops Ranking based Data on Science constant based Risk case ratio Engine Risk Engine 271 937 Feedback Feedback Policy Mgr. Case Mgmt Authenticate Step-up Authentication Deny Continue

We Need to Transform So what is needed to get there? So How do you get there? 29

The Transformation Journey Collection and Big Data Platform Data Advanced Analytics platform Analytics Think differently Use Data Science Data Science Platform Skills

Conceptual Security Analytics Platform Capture, enrich and analyze data from across your network PACKETS SOCIAL VISIBILITY ANALYSIS ACTION LOGS PHYSICAL Capture Time Meta-Data Enrichment Incident Management Compliance ENDPOINT IDENTITY ENRICH Investigation Session Reconstruction NETFLOW Advanced Analytics Endpoint Analysis Intelligence Sharing platforms Threat Intelligence Rules Parsers Feeds Reports Research

Taking the Data Science Path THINK DIFFERENTLY Data science is not a feature -> it s a methodology! Data science capabilities should synergize, empower and enhance the security experts -> not replace them!! USE DATA SCIENCE - Building your own (??) Skills and expertise How specific are your requirements Learning from the past BI, web analytics, retail analytics Leveraging the community and crowd sourcing

Summary - Transforming Security Operations Current approaches are failing We have the data take advantage of it, and leverage human intelligence for the intentions & decisions Security Analytics platforms with baked-in DS; Aggregate, prioritize, recommend, self-learning & crowd sourcing. 33

Summary - Transforming Security Operations Current approaches are failing We have the data take advantage of it, and leverage human intelligence for the intentions & decisions Security Analytics platforms with baked-in DS; Aggregate, prioritize, recommend, self-learning & crowd sourcing. 34

SESSION ID: STR-R04 Data Science Transforming Security Operations Key message: Data science is a key methodology and technology in this transformation, its not merely a feature. Alon Kaufman Ph.D. (alon.kaufman@rsa.com) Director Data Science & Innovation, RSA THANK YOU