how to tune your cybersecurity radar(2) with security ... · #analyticsx c o p y r ig ht © 201 6,...

23
#AnalyticsX Copyright © 2016, SAS Institute Inc. All rights reserved. How to Tune Your Cybersecurity RADAR 2 With Security Analytics Mark Dobeck Professor Cleveland State University Stu Bradley Vice President, Cybersecurity Solutions SAS

Upload: others

Post on 21-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

#AnalyticsXC o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

How to Tune Your Cybersecurity RADAR2 With Security Analytics

Mark DobeckProfessorCleveland State University

Stu BradleyVice President, Cybersecurity SolutionsSAS

Page 2: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

200% Increase

in Cost

59% Detected by

3rd Party

$450B Lost

$154 per Record

80.5 Days

Billions of Events

$170B Annual

Spend

Page 3: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Security Analytics: The Buzz Is Not Enough

Rules/Thresholds

B e h a v i o r a l A n a l y t i c s

Data Visualization

Security Analytics

In-Stream

Machine Learning

Statistical Modeling

In-Memory A n omalous B e havio r

Page 4: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Analytic Maturity Curve

Search, Query & Response

Predictive Analytics

Behavioral Anomalies

Rules & Signatures

Page 5: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

What’s Being Overlooked?

Value of Results

Data TimeAnalytic

Approach

Page 6: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

There is Hope for Security Analytics

• Can provide network visibility

• You should understand impact of scale

• You should investigate data, timing & analytic approaches used

Page 7: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Cybersecurity Is Strategic Long-term & operational considerations

Expand & elevate CISO/CDO role

Cybersecurity must be adaptive

Technology trends

Artificial intelligence

Machine learning

Behavioral analytics

Predictive analytics

Page 8: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

RADAR2 Methodology for Cybersecurity

Readiness1

Awareness2

Detection3

Action4

Remediation5

Recovery6

Page 9: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Readiness Enterprise cybersecurity risk management plan

Planning & preparation

Formal policies & procedures

Documentation

Implementation

Cybersecurity Readiness Team

Testing

Monitoring

1

Page 10: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Data Governance Compliance

Legal obligations

Regulatory requirements

Fiduciary responsibility

Data is an asset class

1

Page 11: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Threat Intelligence Internal analysis

External information ISAC (Information Sharing & Analysis Center)

External feeds

Threat intelligence must be: Accessible Intelligible Timely Actionable

Reliable Relevant

1

Page 12: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Awareness Analytics/cybersecurity culture

Mandatory education & training

Change management plan

Commitment

Communication

2

Page 13: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Detection Threat recognition & forecasting

Predictive analytic tools

Behavioral analytic tools

Anomalies/suspicious activity

Rapid Response Team notification

3

Page 14: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Machine Learning Artificial intelligence

Data-intensive

Autonomous learning

Structured & unstructured data

Supervised & unsupervised learning

Automation

3

Page 15: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Behavioral Analysis Email

Social media

Unauthorized access

Pattern & trend recognition

Anomaly detection

Data leaks

3

Page 16: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Predictive Analytics Data-driven

Near real-time

Machine learning

Multiple information sources

Internal & external

Improves response capabilities

3

Page 17: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Action Rapid Response Team assessment

Corrective action determination & damage control

Legal evaluation & review

Initial communications (internal & external)

Investigation (internal & external)

Law enforcement

4

Page 18: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Remediation Correct problems & issues

Formal enterprise security audit

Update/upgrade vulnerability detection & response technology

5

Page 19: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Recovery Conduct formal post-mortem (lessons learned)

Revise cybersecurity policies & procedures

Change implementation & testing

Accurate & timely communications

Normal operations

6

Page 20: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

#AnalyticsX

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Summary Cybersecurity is strategic

RADAR2 is an ongoing process

Awareness, communication & coordination are key to an effective cybersecurity culture

Security analytics enables data-driven decision-making throughout the cycle

Page 21: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Q & A

Page 22: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

Speakers:

Stu Bradley

VP, Cybersecurity Solutions

SAS

[email protected]

Mark Dobeck, Ph.D.

Cleveland State University

[email protected]

Visit the Innovation Hub to learn about SAS & security analytics

Research briefs on the RADAR2 method available at iianalytics.com

Page 23: How to Tune Your Cybersecurity RADAR(2) With Security ... · #AnalyticsX C o p y r ig ht © 201 6, SAS In stitute In c. All r ig hts r ese rve d. 200% Increase in Cost 59% Detected

C o p y r ig ht © 201 6, SAS In st i tute In c. A l l r ig hts r ese rve d.

#AnalyticsX