activated charcoal
play

Activated Charcoal Making Sense of Endpoint Data Company - PowerPoint PPT Presentation

Powered by Activated Charcoal Making Sense of Endpoint Data Company Confidential Greg Foss Sarah Miller Head of Global Security Operations Threat Intelligence Analyst LogRhythm Carbon Black The Endpoint is the new Perimeter The easiest


  1. Powered by Activated Charcoal Making Sense of Endpoint Data Company Confidential

  2. Greg Foss Sarah Miller Head of Global Security Operations Threat Intelligence Analyst LogRhythm Carbon Black

  3. The Endpoint is the new Perimeter

  4. The easiest path into any network… Company Confidential

  5. Social Engineering Nothing like a little pretext to get people to click on your links… Company Confidential

  6. Phishing • 91% of ‘advanced’ attacks began with a phishing email • or similar social engineering tactics. http://www.infosecurity-magazine.com/view/29562/91-of- • apt-attacks-start-with-a-spearphishing-email/ 2014 Metrics • Average cost per breach => $3.5 million • 15% Higher than the previous year • http://www.ponemon.org/blog/ponemon-institute- • releases-2014-cost-of-data-breach-global-analysis Company Confidential

  7. Drive By Downloads, Malvertizing, and Watering Hole Attacks Image Source: Company Confidential https://blog.kaspersky.com/what-is-malvertising/5928/

  8. Company Confidential

  9. Training is Critical to Success

  10. Key Focus Areas: • Employees Image Source: http://www.cloudpro.co.uk/hr/5803/gov-offers-hr-workers-free-cyber-security-training Company Confidential

  11. End User Tips - Phishing Company Confidential

  12. All You Need is + Company Confidential

  13. Shortened URL Tracking Company Confidential

  14. Feedback Loop Company Confidential

  15. Testing and Validation

  16. Rogue Wi-Fi Network – Threat Simulation Company Confidential

  17. USB Drop – Training Exercise : Case Study Company Confidential

  18. Building a Believable Campaign Use realistic files with somewhat realistic data Staged approach to track file access and exploitation Company Confidential

  19. “Nobody’s going to an an exe from some random USB” - Greg Yep… They ran it... Company Confidential

  20. Now we have our foothold… Fortunately they didn’t run this as an admin Company Confidential

  21. Company Confidential

  22. Key Focus Areas: • Employees • IT Staff • Roles and Responsibilities • Incident Response Duties • Configuration Monitoring • Malware Removal • Security Infrastructure Company Confidential

  23. Key Focus Areas: • Employees • IT Staff • Security Staff • Table Top and Red vs Blue Exercises • Threat Simulation Leads to Process Improvement • Announced vs Unannounced Simulations or Penetration Testing Company Confidential

  24. Purple Team FTW! • Employees • IT Staff • Security Staff • Table Top and Red vs Blue Exercises • Threat Simulation Leads to Process Improvement • Announced vs Unannounced Simulations or Penetration Testing Company Confidential

  25. Key Focus Areas: • Employees • IT Staff • Security Staff • Leadership Company Confidential

  26. Key Focus Areas: • Employees • IT Staff • Security Staff • Leadership • Processes and Procedures Company Confidential

  27. Continuous Monitoring and Detection

  28. Automating OSINT and Response API Integration SecOps Infrastructure Domain Tools Netflow / IDS Passive Total Firewalls VirusTotal Proxy / DNS SIEM Cisco AMP ThreatGRID Endpoint Company Confidential

  29. Company Confidential

  30. Malware Beaconing Company Confidential

  31. Company Confidential

  32. Malware Beaconing Company Confidential

  33. Correlate Network / Log Activity with Endpoint Data Company Confidential

  34. Macro Phishing Attacks • Common • Bypasses Most AV • Heavily Obfuscated • Newer attacks targeting Office 365 Company Confidential

  35. Macro Attack Detection Company Confidential

  36. Full Command Line Details Company Confidential

  37. Full Command Line Details Company Confidential

  38. Be Careful – Don’t Jump To Conclusions… Company Confidential

  39. Centralized Logging and Event Management

  40. Company Confidential

  41. Threat Feed Configuration Company Confidential

  42. Full Event Alerting Company Confidential

  43. Syslog Only Company Confidential

  44. Tuning Feeds Company Confidential

  45. Watchlist Configuration Company Confidential

  46. Carbon Black Event Forwarder LogRhythm => Use LEEF Format https://github.com/carbonblack/cb-event-forwarder Company Confidential

  47. Dashboards and Investigations

  48. Company Confidential

  49. Company Confidential

  50. Company Confidential

  51. Company Confidential

  52. Company Confidential

  53. Company Confidential

  54. Long Tail Analysis Strange activity can bubble to the surface when viewing the whole picture Company Confidential

  55. Company Confidential

  56. Company Confidential

  57. Taking it a Step Further…

  58. Additional Integration Alarming Trigger on Specific Watch List Hits Company Confidential

  59. Additional Integration Alarming Admin Tracking Company Confidential

  60. Additional Integration Alarming Admin Tracking Reporting Company Confidential

  61. Additional Integration Alarming Admin Tracking Reporting Automation Perform Actions Based on Alarms Observed Company Confidential

  62. Thank You! QUESTIONS? Greg Foss Sarah Miller Greg . Foss [at] LogRhythm . com SMiller [at] CarbonBlack . com @heinzarelli @beyazfar3 Company Confidential

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend