Catch the Bad Guys Red Handed!
Adam Gassensmith
Manager of Client Engagement
Catch the Bad Adam Gassensmith Manager of Client Guys Red - - PowerPoint PPT Presentation
Catch the Bad Adam Gassensmith Manager of Client Guys Red Engagement Handed! Poll Question Are you using a Security Information and Event Management (SIEM) solution today? Agenda A Framework for Cyber Security Detecting Suspicious
Adam Gassensmith
Manager of Client Engagement
A Framework for Cyber Security Detecting Suspicious Activity Simplifying Security Management
The 5 Stages of the NIST Cyber Security Framework Which Stage is Most Important? How Are you Detecting Suspicious Activity Today?
Reconnaissance Weaponization Delivery Exploitation Installation Command & Control Actions on Objectives
Further Exploitation
Dwell Time: The amount of time it takes for an
threat in their environment and remove it.
Sun Mon Tue Wed Thu Fri Sat 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 1 Sun Mon Tue Wed Thu Fri Sat 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Breach
Average Dwell Time for Ransomware Attacks: 43 Days Average Dwell Time for Non- Ransomware Attacks: 798-869 Days
Why didn’t my traditional AV Solution stop this?! What about this Next-Gen AV Solution? But what about my other protection measures?
A Framework for Cyber Security Detecting Suspicious Activity Simplifying Security Management
Detecting Suspicious Behaviors
How do you sort out normal activity from authentic activity? How do you collect information? How is information correlated?
OR
Security Information and Event Management (SIEM) technology supports threat detection, compliance and security incident management through the collection and analysis (both near real time and historical) of security events, as well as a wide variety of other event and contextual data sources. How does a SIEM work?
What about ransomware?
Mass File Deletion Traffic to Known Bad IPs
Will a SIEM Make Me Compliant?
SIEMs help to achieve the following compliance and regulatory standards:
A Framework for Cyber Security Detecting Suspicious Activity Simplifying Security Management
Simplifying Security Management
Responding to Threats Managing the SIEM Platform Completing the Security Picture
Responding to Threats
PU PULSE LSE Alarm rm
24x7 Se Security urity Monitorin itoring, Aler erting ting, and Response nse …
Managing the SIEM Platform
Updates
PU PULSE LSE Alarm rm
24x7 Se Security urity Monitorin itoring, Aler erting ting, and Response nse Weekl kly y Report t Analysis lysis for Su Suspicious icious Activity tivity …
Completing the Security Picture
PU PULSE LSE Alarm rm
24x7 Se Security urity Monitorin itoring, Aler erting ting, and Response nse Weekl kly y Report t Analysis lysis for Su Suspicious icious Activity tivity Quarterl terly y External nal Vuln lner erab abil ility ity Sc Scan
Schedule a Free External Vulnerability Scan Schedule a Security One-Day Get Started with PULSE Alarm
Email us at: info@peters.com Call us at: 630.832.0075 Chat with us over coffee