SlideShare a Scribd company logo
Automation and open source   turning the tide on the attackers
Automation and open source   turning the tide on the attackers
Automation and open source   turning the tide on the attackers
Automation and open source   turning the tide on the attackers
Ingest Data Investigate
Develop
Tools
Stay Safe
• SIEM
• Packets
• Logs
• Endpoint
• EDR
• EPP (AV)
• Firewall
• UEBA
• Identity Management
• Security Management
• Web Security
• Mobile Security
• Cloud Security
• And the list goes on and on and on…
Many simply
do not
integrate
well
• Organizations are not reacting fast enough to incidents
• Lack of skilled resources
• Challenges retaining skilled resources
• Too much time spent on manual research
• Overwhelmed by what’s needed for every incident
• Do things faster by streamlining processes by using workflows and
leveraging automation
• Complaints about the ever growing number of security tools being used
• Each product provides it’s own value to the analyst
• How can we properly integrate them so we can maximize the ROI for
each
• Instead of going from product to product, we need orchestration
Ingest Data Investigate
Develop
Tools
Stay Safe
Buy?
Develop?
Research
Demo
POC
Procure
Install
Fix
Wait, ingest what?
Don’t know if it’s malicious….
…or totally benign
At least it’s a
strong job
market
If you care about results then you should care
Automation and open source   turning the tide on the attackers
Automation and open source   turning the tide on the attackers
Automation and open source   turning the tide on the attackers
Ingest
Data
Invest in
people
Stay Safer…
…than
everyone
elseDetermine
weakness
Define
End state
Create
Toolset
Investigate
Remediate
Something
tangible
Red Team Stuff
ATTRIBUTION
Automation and open source   turning the tide on the attackers
it requires maintenance, configuration, and ongoing support
COMMUNITY
CROWD-SOURCED
TRANSPARENCY
RELIABILITY
Automation and open source   turning the tide on the attackers
SOA, SAO, SOAR, SAOR……..
NextGen Automation?
Automation and open source   turning the tide on the attackers
Automation and open source   turning the tide on the attackers
Automation and open source   turning the tide on the attackers
Automation and open source   turning the tide on the attackers
SIEM
Endpoint
Automation
Enrichment
Automation and open source   turning the tide on the attackers
Automation and open source   turning the tide on the attackers
Emails
Emma.Furtado@swimlane.com
James.Cerone@swimlane.com
Twitter
@secopshub
Community
Secopshub.com
CONTACT INFO

More Related Content

What's hot (20)

PDF
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon
 
PDF
2012 12-04 --ncc_group_-_mobile_threat_war_room
NCC Group
 
PPTX
Security and Mobility Co Create Week Jakarta
Stefan Streichsbier
 
PPTX
Software Security Initiative Capabilities: Where Do I Begin?
Cigital
 
PPTX
451 and Cylance - The Roadmap To Better Endpoint Security
Adrian Sanabria
 
PPTX
Improve Security through Continuous Testing
TechWell
 
PDF
Managing Next Generation Threats to Cyber Security
Priyanka Aash
 
PPTX
When Architecture Meets Data
Eoin Woods
 
PPTX
INTRUSION DETECTION SYSTEM
Isra Abdul Razack
 
PDF
CSA Raleigh application security and deception in the cloud
Phillip Maddux
 
PPTX
Can You Really Automate Yourself Secure
Cigital
 
PDF
Secure software chapman
AdaCore
 
PDF
System Security Beyond the Libraries
Eoin Woods
 
PPTX
451 AppSense Webinar - Why blame the user?
Adrian Sanabria
 
PPTX
DevSecCon Asia 2017 Arun N: Securing chatops
DevSecCon
 
PPTX
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon
 
PPTX
RSAC 2016: CISO's guide to Startups
Adrian Sanabria
 
PPTX
DevOps Security Coffee - Lazy hackers who think out of the box, but stay in t...
Freek Kauffmann
 
PPTX
Stalled at the intersection of dev ops and security v2
matthewabq
 
PDF
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon
 
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon
 
2012 12-04 --ncc_group_-_mobile_threat_war_room
NCC Group
 
Security and Mobility Co Create Week Jakarta
Stefan Streichsbier
 
Software Security Initiative Capabilities: Where Do I Begin?
Cigital
 
451 and Cylance - The Roadmap To Better Endpoint Security
Adrian Sanabria
 
Improve Security through Continuous Testing
TechWell
 
Managing Next Generation Threats to Cyber Security
Priyanka Aash
 
When Architecture Meets Data
Eoin Woods
 
INTRUSION DETECTION SYSTEM
Isra Abdul Razack
 
CSA Raleigh application security and deception in the cloud
Phillip Maddux
 
Can You Really Automate Yourself Secure
Cigital
 
Secure software chapman
AdaCore
 
System Security Beyond the Libraries
Eoin Woods
 
451 AppSense Webinar - Why blame the user?
Adrian Sanabria
 
DevSecCon Asia 2017 Arun N: Securing chatops
DevSecCon
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon
 
RSAC 2016: CISO's guide to Startups
Adrian Sanabria
 
DevOps Security Coffee - Lazy hackers who think out of the box, but stay in t...
Freek Kauffmann
 
Stalled at the intersection of dev ops and security v2
matthewabq
 
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon
 

Similar to Automation and open source turning the tide on the attackers (20)

PPTX
Optimizing Security Operations: 5 Keys to Success
Sirius
 
PDF
The SIEM Buyer Guide the siem buyer guide
roongrus
 
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
PPTX
SIEM - Your Complete IT Security Arsenal
ManageEngine EventLog Analyzer
 
PPTX
Operationalizing Security Intelligence
Splunk
 
PDF
SIEM Buyer's Guide
Joseph DeFever
 
PPTX
Generic siem how_2017
Anton Chuvakin
 
PPTX
Enterprise Security and User Behavior Analytics
Splunk
 
PPTX
Is SIEM really Dead ? OR Can it evolve into a Platform ?
Aujas
 
PPTX
Customer Presentation - Financial Services Organization
Splunk
 
PDF
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
CODE BLUE
 
PPTX
SplunkLive! - Splunk for Security
Splunk
 
PPTX
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Andris Soroka
 
PPTX
McAfee SIEM solution
hashnees
 
PPTX
Splunk for Security Breakout Session
Splunk
 
PDF
From SIEM to SA: The Path Forward
EMC
 
PPTX
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk
 
PPTX
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
hforhassan101
 
PPTX
Introduction to SIEM.pptx
neoalt
 
PDF
SIEM evaluator guide for soc analyst
InfosecTrain
 
Optimizing Security Operations: 5 Keys to Success
Sirius
 
The SIEM Buyer Guide the siem buyer guide
roongrus
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
SIEM - Your Complete IT Security Arsenal
ManageEngine EventLog Analyzer
 
Operationalizing Security Intelligence
Splunk
 
SIEM Buyer's Guide
Joseph DeFever
 
Generic siem how_2017
Anton Chuvakin
 
Enterprise Security and User Behavior Analytics
Splunk
 
Is SIEM really Dead ? OR Can it evolve into a Platform ?
Aujas
 
Customer Presentation - Financial Services Organization
Splunk
 
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
CODE BLUE
 
SplunkLive! - Splunk for Security
Splunk
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Andris Soroka
 
McAfee SIEM solution
hashnees
 
Splunk for Security Breakout Session
Splunk
 
From SIEM to SA: The Path Forward
EMC
 
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk
 
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
hforhassan101
 
Introduction to SIEM.pptx
neoalt
 
SIEM evaluator guide for soc analyst
InfosecTrain
 
Ad

More from Frank Victory (12)

PPTX
Container security Familiar problems in new technology
Frank Victory
 
PDF
Kealy OWASP interactive_artifacts
Frank Victory
 
PPTX
CNG 256 cloud computing
Frank Victory
 
PPTX
CNG 256 wireless wi-fi and bluetooth
Frank Victory
 
PDF
Differential learning SnowFROC 2017
Frank Victory
 
POTX
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Frank Victory
 
PPTX
Active defensecombo clean
Frank Victory
 
PPTX
Dns security threats and solutions
Frank Victory
 
PPTX
Cng 125 – chapter 12 network policies
Frank Victory
 
PPTX
Authentication vs authorization
Frank Victory
 
PPTX
9.0 security (2)
Frank Victory
 
PPTX
Lesson 6 web based attacks
Frank Victory
 
Container security Familiar problems in new technology
Frank Victory
 
Kealy OWASP interactive_artifacts
Frank Victory
 
CNG 256 cloud computing
Frank Victory
 
CNG 256 wireless wi-fi and bluetooth
Frank Victory
 
Differential learning SnowFROC 2017
Frank Victory
 
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Frank Victory
 
Active defensecombo clean
Frank Victory
 
Dns security threats and solutions
Frank Victory
 
Cng 125 – chapter 12 network policies
Frank Victory
 
Authentication vs authorization
Frank Victory
 
9.0 security (2)
Frank Victory
 
Lesson 6 web based attacks
Frank Victory
 
Ad

Recently uploaded (20)

PPTX
Lecture 5 - Agentic AI and model context protocol.pptx
Dr. LAM Yat-fai (林日辉)
 
PDF
Trading Volume Explained by CIFDAQ- Secret Of Market Trends
CIFDAQ
 
PDF
Market Insight : ETH Dominance Returns
CIFDAQ
 
PDF
Shuen Mei Parth Sharma Boost Productivity, Innovation and Efficiency wit...
AWS Chicago
 
PDF
HR agent at Mediq: Lessons learned on Agent Builder & Maestro by Tacstone Tec...
UiPathCommunity
 
PDF
Lecture A - AI Workflows for Banking.pdf
Dr. LAM Yat-fai (林日辉)
 
PDF
Market Wrap for 18th July 2025 by CIFDAQ
CIFDAQ
 
PDF
CloudStack GPU Integration - Rohit Yadav
ShapeBlue
 
PPTX
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
PDF
Ampere Offers Energy-Efficient Future For AI And Cloud
ShapeBlue
 
PPTX
The Yotta x CloudStack Advantage: Scalable, India-First Cloud
ShapeBlue
 
PDF
Upskill to Agentic Automation 2025 - Kickoff Meeting
DianaGray10
 
PDF
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
PDF
"Effect, Fiber & Schema: tactical and technical characteristics of Effect.ts"...
Fwdays
 
PPTX
Building and Operating a Private Cloud with CloudStack and LINBIT CloudStack ...
ShapeBlue
 
PDF
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
PDF
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
PPTX
Earn Agentblazer Status with Slack Community Patna.pptx
SanjeetMishra29
 
PDF
How Current Advanced Cyber Threats Transform Business Operation
Eryk Budi Pratama
 
PPTX
Simplifying End-to-End Apache CloudStack Deployment with a Web-Based Automati...
ShapeBlue
 
Lecture 5 - Agentic AI and model context protocol.pptx
Dr. LAM Yat-fai (林日辉)
 
Trading Volume Explained by CIFDAQ- Secret Of Market Trends
CIFDAQ
 
Market Insight : ETH Dominance Returns
CIFDAQ
 
Shuen Mei Parth Sharma Boost Productivity, Innovation and Efficiency wit...
AWS Chicago
 
HR agent at Mediq: Lessons learned on Agent Builder & Maestro by Tacstone Tec...
UiPathCommunity
 
Lecture A - AI Workflows for Banking.pdf
Dr. LAM Yat-fai (林日辉)
 
Market Wrap for 18th July 2025 by CIFDAQ
CIFDAQ
 
CloudStack GPU Integration - Rohit Yadav
ShapeBlue
 
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
Ampere Offers Energy-Efficient Future For AI And Cloud
ShapeBlue
 
The Yotta x CloudStack Advantage: Scalable, India-First Cloud
ShapeBlue
 
Upskill to Agentic Automation 2025 - Kickoff Meeting
DianaGray10
 
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
"Effect, Fiber & Schema: tactical and technical characteristics of Effect.ts"...
Fwdays
 
Building and Operating a Private Cloud with CloudStack and LINBIT CloudStack ...
ShapeBlue
 
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
Earn Agentblazer Status with Slack Community Patna.pptx
SanjeetMishra29
 
How Current Advanced Cyber Threats Transform Business Operation
Eryk Budi Pratama
 
Simplifying End-to-End Apache CloudStack Deployment with a Web-Based Automati...
ShapeBlue
 

Automation and open source turning the tide on the attackers

Editor's Notes

  • #5: We both work for swimlane. Niether of us are experts but we are very interested in the topic and supporting the community
  • #6: Jimmy’s
  • #7: Emma. So many tools, they don’t talk to each other. You have to hop between all these tools. Many do not integrate well. If they are not integrated you have to jump between tools to take actions. You may or may not manage all these tools, you may manage some. Jumping between each tool takes a lot of time
  • #8: You have so many options. By working with the open source community you can influence the outcome of your work and choose the option that makes the most sense to you.
  • #10: Emma. Who cares? Some people feel like they are already in water. If you care about delivering real value to your organization and doing more interesting work with the time you have during the workday, then you should care.
  • #12: Emma. Get the job you thought you got. Empathy, humor, high level slides. I can help with this one. With automation you can get to the tasks you thoguth you would be responsible for an dyou can take more responsibility and bring more value to your team. We all want the jobs that allow you to work in a fancy lab doing cool work catching the bad guys. Not running around chasing false positives.
  • #13: Quick transition, Jimmy
  • #14: Define a good end state. Figure out your weaknesses from there.
  • #15: Attribution doesn’t happen often because it’s the hardest and we usually don’t have time to do - more manual type work. Goal of Swimlane Is to get through normal SecOps so they have time to get to stuff like attribution
  • #16: Emma. Emma take over, gather the process and idea sharing you need to enchance your current toolset and do more with what you already have.. High lfevel overview talk about some capabilities out there.. Creating your tool set, you’re looking to create tool, set-free and open source Some clients we interact with…some clients buy every tool, no orchestration, no strategy, it’s time to orchestrate, until they buy or implement a solution, orchestrate a workflow with playbooks, realize and standardize the process on how to deal with threats, we . From email, extract, payloads, domains header, what do we do with this,
  • #17: New ideas, info sharing, using shareable content, scripts experts write to make life easier. You can rely on what the open source community builds. Eveyrone works together! Pros and cons.. Make your job more accurate You can find a lot of different tools, but they did take a little more maintenance and support.. Versus relying on the vendor. Do you have the team that has the capacity? Sometimes it makes sense to buy a product from a budgeting perspecint
  • #18: Emma. I need some help with the talking points here. Define it by what you can automate. Talk about what you want to be spending, time on. Hunting, attribution, to get there you need to automate stuff like triage alerts, do you want to manual jump through tools with an ip address.. Why did you get into this profession… free up your time to do those more important things make your team more effective
  • #19: Emma. Jargon is not imporntat to me. These acronyms come up a lot in the industry…
  • #20: Attribution doesn’t happen often because it’s the hardest and we usually don’t have time to do - more manual type work. Goal of Swimlane Is to get through normal SecOps so they have time to get to stuff like attribution
  • #21: More context and data. Any re lated
  • #22: Emma Starts Emma does Phishing Logarithm, Detection Jimmy does rest. I take Chris Long,s detection lab and phishing intelligence engine by greg foss Questions for the team: whats the talking point for this slide? It looks like its “this is what the open source community is sharing right now” Slide 21 DumpsterFire: A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations DetectionLab: This lab has been designed with defenders in mind. Its primary purpose is to allow the user to quickly build a Windows domain that comes pre-loaded with security tooling and some best practices when it comes to system logging configurations. PIE: The Phishing Intelligence Engine (PIE) is a framework that will assist with the detection and response to phishing attacks. An Active Defense framework built around Office 365, that continuously evaluates Message Trace logs for malicious contents, and dynamically responds as threats are identified or emails are reported. Red Baron: Automate creating resilient, disposable, secure and agile infrastructure for Red Teams Ansible and empire is kinda the same thing as ^^^
  • #23: Drill down what actions were part of an incident. Parsing out what’s relevant… gather real time for the endpoint. Get good understanding . Timesktetch (I’ll handle it)sorts through records to isolate which ones relate to a specific incident . If you have an enterprise security team, you’re getting millions of logs. There could be a hundred logs between logs. Sort through quickl.y Emma does time sketch, second. Emma does Time Sketch: Sorts through records to isolate which ones relate to a specific incident
  • #24: What if your stuff is time critical? Automation helps you integrate all disparate tools and get more value from them, exactl how you’ve specified. Use the tools in the middle to prevent yourself from having to log in to each tool. Saves a time a The main differentiator is that since they are free teams can focus on customizing them to their needs and not burn money on vendors and proserv unnecessarily. And also this slide shows that every "paid" tool has an open source counterpart Use tools in the middle to automate the stuff on the sides. Example: Elastic Stack, Powershell, VirusTotal
  • #25: By integrating your tools you can get richer threat intel out of them. The best part it. You can do whatever you want. Anything you can dream up, you can find a way to orchestrate it.