18
Copyright © 2016 Splun Inc. Operationalizing Threat Intelligence Learn How to Accelerate Threat Detection, Investigation & Response

Infosecurity Europe 2016: Operationalizing Threat Intelligence

  • Upload
    splunk

  • View
    143

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Infosecurity Europe 2016: Operationalizing Threat Intelligence

Copyright © 2016 Splunk, Inc.

Operationalizing Threat Intelligence

Learn How to Accelerate Threat Detection, Investigation & Response

Page 2: Infosecurity Europe 2016: Operationalizing Threat Intelligence

Fill out the Postcard and win a SONOS Play:1 today

"currentTrack":{ "artist":"College", "title":"Teenage Color - Anoraak Remix", "album":"Nightdrive With You", "albumArtURI":"/getaa?s=1&u=x-sonos-spotify%3aspotify%253atrack%253a3DjBDQs8ebkxMBo2V8V3SH%3fsid%3d9%26flags%3d32", "duration":347, "uri":"x-sonos-spotify:spotify%3atrack%3a3DjBDQs8ebkxMBo2V8V3SH?sid=9&flags=32" },

Page 3: Infosecurity Europe 2016: Operationalizing Threat Intelligence

Are you using Splunk already?

Page 4: Infosecurity Europe 2016: Operationalizing Threat Intelligence

What are common SecOps problems?

Malicious activities go undetected or are difficult to prevent

All threats look equally ominous

Long cycles to detect and respond

4

Security teams need to quickly identify and remediate issues – from early warning to breach investigation

Page 5: Infosecurity Europe 2016: Operationalizing Threat Intelligence

Why Threat Intelligence?

Difficult to keep up with rapidly evolving threat landscapeKnow your adversaries so that you can develop strategies to remediate attacks Internal resources – people, tools, process are unable to keep upUse 3rd party knowledge – collective intelligence ?Uncover compromised systems and search for advanced threatsScope and investigate potential threat

5

Page 6: Infosecurity Europe 2016: Operationalizing Threat Intelligence

What Does Threat Intelligence Consist Of?

”Feeds” – sources of threat intelligence

Platform or product with ability to ingest feeds

Visualize of threat indicators

Ability to correlate across all context

6

Page 7: Infosecurity Europe 2016: Operationalizing Threat Intelligence

Widening the Net

7

Law Enforcement

Feeds

Broad CoverageMultiple ThreatIntelligenceFeeds FromVarious Sources

ISACFeeds

Agency Feed

Commercial Service

Community Feed

Open-Source Feed

Other Enrichment

Services

Each feed provides unique perspective on threat

Each feed provides different benefit

Multiple feeds provide better “coverage”

Page 8: Infosecurity Europe 2016: Operationalizing Threat Intelligence

Law Enforcement

Feeds

TAXIICybox

XML

distribute

OpenIOC

Formattedtext

Emails

RSS

CSV

Flat file

push

pull

redistribute

retrieve

Broad Coverage viaMultiple ThreatIntelligenceFeeds FromVarious Sources

STIX

REST

Proprietary

Proprietary

Unstructuredtext

transmissiontype

transport / messaging

Data formatsUse (task)ISAC

Feed 1 ISACFeed 2

Agency Feed 1

Agency Feed 2

Commercial Service 2

Commercial Service 1

Community Feed

Open-Source Feed

Other Enrichment

Services

Other Enrichment

Services

Gather intel on darknetsGather intel per industry

Onboard new intelCentralize all intel

Monitor and triage alertsUpdate ticket status / details

Auto-search, real timeAuto-search, historical

Use for analysis / IRCollect / provide forensics

Use to hunt / uncoverUse to hunt / link events

Determine impact on networkDetermine impact on assetsDetermine impact on dataShare info with partners

It does not have to be this complex

Page 9: Infosecurity Europe 2016: Operationalizing Threat Intelligence

Threat Intel feeds

9

Law Enforcement

Feeds

ISACFeed 1 ISAC

Feed 2

Agency Feed 1

Agency Feed 2

Commercial Service 2

Commercial Service 1

Community Feed

Open-Source Feed

Other Enrichment

Services

Other Enrichment

Services

Focus on using Threat Intel to investigate and remediate not on how to bring the data in

Page 10: Infosecurity Europe 2016: Operationalizing Threat Intelligence

Collect, manage Categorize Correlate Search

Data Management Threat Activity Correlation Data / Notable Events Data Search

Threat Intelligence Framework

Framework built-in Splunk Enterprise Security

Page 11: Infosecurity Europe 2016: Operationalizing Threat Intelligence

Threat Intel

Splunk Threat Intelligence Ecosystem

Splunk Security Ecosystem as of 2015-11-0211

Page 12: Infosecurity Europe 2016: Operationalizing Threat Intelligence

Threat Data Sources• Agencies• Relationships • Vendor Subscriptions • ISACs

Customer Success #1

12

Splunk Threat

Intelligence

Framework

• Malicious IP / URLs Blocked• Compromised Credentials

Remediated• Impostor and New Domains

Identified

Result: Actionable Intelligence

Summary• 25% of Threat Intelligence data feeds are actionable• 90% of infections are blocked, most malware alerts “eliminated” with no impact to use• Found compromised accounts/activity

Page 13: Infosecurity Europe 2016: Operationalizing Threat Intelligence

Threat Data Sources • 50+ Pre-packaged free feeds• Own content

Customer Success #2

13

Splunk ES Threat

Intelligence Framework

Automated IoC blocking

Summary• Automated detection and block of indicators of compromise• Improved efficiency• Reduced time to remediation

Other 3rd party feeds

Facebook Threat Exchange

Page 14: Infosecurity Europe 2016: Operationalizing Threat Intelligence

Splunk helps you to Operationalize Threat Intel

Automatically collect, aggregate and de-duplicate threat feeds from a broad set of sources. Integrated support for standards such as STIX/TAXII and OpenIOCBuild your own data to create your own Threat IntelligenceOut of the box Activity and Artifact dashboardsPrioritize, contextualize and analyze threats and remediate faster

14

Page 15: Infosecurity Europe 2016: Operationalizing Threat Intelligence

MBDA Germany Drives Security Intelligence With Splunk Enterprise Security

Enabling the security operations center (SOC) team to work very efficientlySince deploying ES, the average time to analyze a CERT message has been reduced from an average of 372 minutes to just 15. Real-time alerts identify attacks that would previously have gone undetectedAnalysis of historical data informs future security measures, resulting in a more resilient security posture overall

““Splunk dramatically reduces security risks at MBDA Germany. The software helps us to work much more

efficiently, gain visibility across our entire network, react more quickly to security breaches and use insights

from our data analysis to inform our future security strategy.”.”

— Head of IT and Project Manager Information Technology, MBDA Germany

Page 16: Infosecurity Europe 2016: Operationalizing Threat Intelligence

Hands-on: Try the Online Sandobx7 Day personal environment

www.splunk.com

16

Page 17: Infosecurity Europe 2016: Operationalizing Threat Intelligence

Fill out the Postcard and win a SONOS Play:1 today

"currentTrack":{ "artist":"College", "title":"Teenage Color - Anoraak Remix", "album":"Nightdrive With You", "albumArtURI":"/getaa?s=1&u=x-sonos-spotify%3aspotify%253atrack%253a3DjBDQs8ebkxMBo2V8V3SH%3fsid%3d9%26flags%3d32", "duration":347, "uri":"x-sonos-spotify:spotify%3atrack%3a3DjBDQs8ebkxMBo2V8V3SH?sid=9&flags=32" },

Page 18: Infosecurity Europe 2016: Operationalizing Threat Intelligence

Copyright © 2016 Splunk, Inc.

Thank you