SlideShare a Scribd company logo
1 | © 2018 Interset Software
How to
Operationalize
Big Data Security
Analytics
Roy Wilds
Field Data Scientist
Interset.AI
2 | © 2018 Interset Software
Welcome
About Interset
• 75 employees & growing
• 450% ARR growth
• Data science & analytics focused on cybersecurity
• 100 person-years of Anomaly Detection R&D
• Offices in Ottawa, Canada & Newport Beach,
California
Partners
About Me
• Data miner scientist since 2006
• 4+ years building machine
learning systems for threat
hunting
• 8 years experience using
Hadoop for large scale
advanced analytics
Field Data Scientist
• Identify valuable data feeds
• Optimize system for use cases
We uncover the threats that matter!
3 | © 2018 Interset Software
3 | © 2018 Interset Software
What is AI-Based Security Analytics About?
Advanced analytics to help you catch the bad guys
4 | © 2018 Interset Software
4 | © 2018 Interset Software
zz
Increasing Threat Hunting Efficiency
Low Success Rate SOC Cycle Generate Highly Anomalous Threat Leads
5 | © 2018 Interset Software
5 | © 2018 Interset Software
Increasing Visibility by Augmenting Existing Tools
SECURITY ANALYTICS
SIEM
IAMENDPOINT
BUSINESS
APPLICATIONS
CUSTOM
DATA
NETWORK DLP
SIEM
IAMENDPOINT NETWORK DLP
6 | © 2018 Interset Software
6 | © 2018 Interset Software
Case Study #1: Every SOC
Billions of events
analyzed with
machine learning
Anomalies
discovered by
data science
High quality
“most wanted”
list
Data, Data, Data!
Users, machines, files, projects, servers, sharing behavior, resource,
websites, IP Addresses and more
5,210,465,083
7 | © 2018 Interset Software
7 | © 2018 Interset Software
z
Lesson #1: Less Alerts, Not More
 Solution should help you deal
with less alerts, not more alerts
 Solution should leverage sound
statistical methods to reduce
false positives and noise
 Should allow you to do more
with the limited resources you
have
Recommendations
Measure and quantify the amount of work effort involved with and without the
Security Analytics system
8 | © 2018 Interset Software
Telecom
• Potential Data Staging/Theft
• Account Compromise
• Lateral Movement Indicators
Healthcare
• Data Theft
Defense
• Incident Response
Field Examples
9 | © 2018 Interset Software
9 | © 2018 Interset Software
Case Study #2: Large Telco
The Situation
• Highly secure & diverse environment – protected by multiple security products
The Challenge
• Large rule/policy set developed
• Too many indicators to optimize threat leads
• Inefficient SOC cycle
The Solution
• Surface mathematically valid leads – ”legit anomalies”
• Unique normal baselines – removes threshold/rule limitations
Google Drive
• Permissive controls
• Personal/external sharing
Authentication
• Sudden change in workstation access
• Odd working hours
USB
• Sudden increase in file
copy volumes
10 | © 2018 Interset Software
10 | © 2018 Interset Software
z
Lesson #2: The Math Matters – Test It
Recommendations
• Agree on the use cases in advance
• Use a proof-of-concept with historical/existing data to test the SA’s math
• Engage red team or pen testing if available
• Evaluate the results: Do they support the use cases?
Google Drive
• Permissive controls
• Personal/external sharing
USB
• Sudden increase in
file copy volumes
Authentication
• Sudden change in
workstation access
• Odd working hours
• Data Theft
• Data
Staging
• Lateral
Movement
• Account
Compromise
11 | © 2018 Interset Software
11 | © 2018 Interset Software
Case Study #3: Healthcare Records & Payments
 Profile: 6.5 billion transactions annually, 750+
customers, 500+ employees
 Team of 7: CISO, 1 security architect, 3 security
analysts, 2 network security
 Analytics surfaced (for example) an employee who
attempted to move “sensitive data” from endpoint to
personal Dropbox
 Employee was arrested and prosecuted using
incident data
Focus and prioritized incident responses
Incident alert accuracy increased from 28% to 92%
Incident mitigation coverage doubled from 70 per week to 140
12 | © 2018 Interset Software
12 | © 2018 Interset Software
Lesson #3: Meaningful Metrics
Hawthorne Effect: Whatever gets measured,
gets optimized
Recommendations
 Define meaningful operational metrics (not just
“false positives”)
 Build a process for measuring and quantifying over
time, not just during a pilot
 Ensure the Security Analytics system supports a
feedback process to adjust the analytics to support
your target metrics
13 | © 2018 Interset Software
13 | © 2018 Interset Software
What Have We Learned?
Lessons Learned
 The Math Matters – Test It
 Less Alerts, Not More
 Automated, Measured Responses
 Meaningful Metrics
Recommendations
 Agree on the use cases in advance
 Evaluate results with and without security
analytics system
 Assess risk level, not binary alert
 Ensure integrated feedback and
automated response
14 | © 2018 Interset Software
14 | © 2018 Interset Software
QUESTIONS?
Roy Wilds – Field Data Scientist
@roywilds
Learn more at Interset.AI
15 | © 2018 Interset Software
How Millions of Events Become Qualified Threats
Leads
ACQUIRE
DATA
CREATE UNIQUE
BASELINES
DETECT,
MEASURE AND
SCORE
ANOMALIES
HIGH QUALITY
THREAT
LEADS
INTERNAL RECON
INFECTED HOST
DATA STAGING
& THEFT
COMPROMISED
ACCOUNT
LATERAL
MOVEMENT
ACCOUNT MISUSE
CUSTOM
FRAUD
Contextual views.
Drill-down and
cyber-hunting.
Broad data
collection
DLP
ENDPOINT
Buz Apps
CUSTOM
DATA
NETWORK
IAM
Determine what is
normal
Gather the
raw
materials
Find the behavior
that matters
W orkflow engine
for incident
response.
16 | © 2018 Interset Software
16 | © 2018 Interset Software
About Interset.AI
SECURITY ANALYTICS LEADER PARTNERSABOUT US
Data science & analytics
focused on cybersecurity
100 person-years of security
analytics and anomaly
detection R&D
Offices in Ottawa, Canada;
Newport Beach, CA
Interset.AI

More Related Content

PDF
The Myths + Realities of Machine-Learning Cybersecurity
PDF
User and Entity Behavioral Analytics
PPTX
A New Approach to Threat Detection: Big Data Security Analytics
PDF
Machine Learning + AI for Accelerated Threat-Hunting
PDF
WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
PPTX
Operationalizing Big Data Security Analytics - IANS Forum Dallas
PPTX
IANS Forum Dallas - Technology Spotlight Session
PPTX
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
The Myths + Realities of Machine-Learning Cybersecurity
User and Entity Behavioral Analytics
A New Approach to Threat Detection: Big Data Security Analytics
Machine Learning + AI for Accelerated Threat-Hunting
WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
Operationalizing Big Data Security Analytics - IANS Forum Dallas
IANS Forum Dallas - Technology Spotlight Session
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote

What's hot (17)

PPTX
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
PPTX
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
PDF
DataWorks 2018: How Big Data and AI Saved the Day
PDF
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
PDF
How to Operationalize Big Data Security Analytics
PDF
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
ODP
Active Network Monitoring brings Peace of Mind
PDF
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
PPTX
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
PDF
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
PPTX
[Webinar] Supercharging Security with Behavioral Analytics
PDF
Leverage Big Data for Security Intelligence
PDF
CISSP Preview - For the next generation of Security Leaders
PDF
Threat Life Cycle Management
PPTX
Data Privacy, Security, and Sovereignty in a Cloudy World
PDF
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
PPTX
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
DataWorks 2018: How Big Data and AI Saved the Day
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
How to Operationalize Big Data Security Analytics
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
Active Network Monitoring brings Peace of Mind
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
[Webinar] Supercharging Security with Behavioral Analytics
Leverage Big Data for Security Intelligence
CISSP Preview - For the next generation of Security Leaders
Threat Life Cycle Management
Data Privacy, Security, and Sovereignty in a Cloudy World
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
Ad

Similar to Data Connectors San Antonio Cybersecurity Conference 2018 (20)

PPTX
How big data and AI saved the day: critical IP almost walked out the door
PDF
2016 09-19 - stephan jou - machine learning meetup v1
PDF
How to Operationalize Big Data Security Analytics
PDF
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
PDF
Lead On: When More Data Becomes Less Work
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PDF
Technical track chris calvert-1 30 pm-issa conference-calvert
PDF
Infographic: Inside Data Breaches
PPTX
Operational Security Intelligence
PDF
Demonstrating Information Security Program Effectiveness
PPTX
325838924-Splunk-Use-Case-Framework-Introduction-Session
PPTX
A Framework for Developing and Operationalizing Security Use Cases
PPTX
RSA 2016 Security Analytics Presentation
PPTX
Automation: Embracing the Future of SecOps
PDF
Emerging Trends in Information Privacy and Security
PDF
Emerging Trends in Information Privacy and Security
PDF
Journey to the Center of Security Operations
PPTX
Security Analytics Beyond Cyber
PDF
Implementing AppSec Policies with TeamMentor
PDF
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
How big data and AI saved the day: critical IP almost walked out the door
2016 09-19 - stephan jou - machine learning meetup v1
How to Operationalize Big Data Security Analytics
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
Lead On: When More Data Becomes Less Work
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Technical track chris calvert-1 30 pm-issa conference-calvert
Infographic: Inside Data Breaches
Operational Security Intelligence
Demonstrating Information Security Program Effectiveness
325838924-Splunk-Use-Case-Framework-Introduction-Session
A Framework for Developing and Operationalizing Security Use Cases
RSA 2016 Security Analytics Presentation
Automation: Embracing the Future of SecOps
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
Journey to the Center of Security Operations
Security Analytics Beyond Cyber
Implementing AppSec Policies with TeamMentor
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Ad

Recently uploaded (20)

PDF
NewMind AI Monthly Chronicles - July 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Sensors and Actuators in IoT Systems using pdf
PPTX
Belt and Road Supply Chain Finance Blockchain Solution
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
PPTX
ABU RAUP TUGAS TIK kelas 8 hjhgjhgg.pptx
PPTX
CroxyProxy Instagram Access id login.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Google’s NotebookLM Unveils Video Overviews
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
NewMind AI Monthly Chronicles - July 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
GamePlan Trading System Review: Professional Trader's Honest Take
Sensors and Actuators in IoT Systems using pdf
Belt and Road Supply Chain Finance Blockchain Solution
Chapter 3 Spatial Domain Image Processing.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
madgavkar20181017ppt McKinsey Presentation.pdf
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
ABU RAUP TUGAS TIK kelas 8 hjhgjhgg.pptx
CroxyProxy Instagram Access id login.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Google’s NotebookLM Unveils Video Overviews
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Enable Enterprise-Ready Security on IBM i Systems.pdf

Data Connectors San Antonio Cybersecurity Conference 2018

  • 1. 1 | © 2018 Interset Software How to Operationalize Big Data Security Analytics Roy Wilds Field Data Scientist Interset.AI
  • 2. 2 | © 2018 Interset Software Welcome About Interset • 75 employees & growing • 450% ARR growth • Data science & analytics focused on cybersecurity • 100 person-years of Anomaly Detection R&D • Offices in Ottawa, Canada & Newport Beach, California Partners About Me • Data miner scientist since 2006 • 4+ years building machine learning systems for threat hunting • 8 years experience using Hadoop for large scale advanced analytics Field Data Scientist • Identify valuable data feeds • Optimize system for use cases We uncover the threats that matter!
  • 3. 3 | © 2018 Interset Software 3 | © 2018 Interset Software What is AI-Based Security Analytics About? Advanced analytics to help you catch the bad guys
  • 4. 4 | © 2018 Interset Software 4 | © 2018 Interset Software zz Increasing Threat Hunting Efficiency Low Success Rate SOC Cycle Generate Highly Anomalous Threat Leads
  • 5. 5 | © 2018 Interset Software 5 | © 2018 Interset Software Increasing Visibility by Augmenting Existing Tools SECURITY ANALYTICS SIEM IAMENDPOINT BUSINESS APPLICATIONS CUSTOM DATA NETWORK DLP SIEM IAMENDPOINT NETWORK DLP
  • 6. 6 | © 2018 Interset Software 6 | © 2018 Interset Software Case Study #1: Every SOC Billions of events analyzed with machine learning Anomalies discovered by data science High quality “most wanted” list Data, Data, Data! Users, machines, files, projects, servers, sharing behavior, resource, websites, IP Addresses and more 5,210,465,083
  • 7. 7 | © 2018 Interset Software 7 | © 2018 Interset Software z Lesson #1: Less Alerts, Not More  Solution should help you deal with less alerts, not more alerts  Solution should leverage sound statistical methods to reduce false positives and noise  Should allow you to do more with the limited resources you have Recommendations Measure and quantify the amount of work effort involved with and without the Security Analytics system
  • 8. 8 | © 2018 Interset Software Telecom • Potential Data Staging/Theft • Account Compromise • Lateral Movement Indicators Healthcare • Data Theft Defense • Incident Response Field Examples
  • 9. 9 | © 2018 Interset Software 9 | © 2018 Interset Software Case Study #2: Large Telco The Situation • Highly secure & diverse environment – protected by multiple security products The Challenge • Large rule/policy set developed • Too many indicators to optimize threat leads • Inefficient SOC cycle The Solution • Surface mathematically valid leads – ”legit anomalies” • Unique normal baselines – removes threshold/rule limitations Google Drive • Permissive controls • Personal/external sharing Authentication • Sudden change in workstation access • Odd working hours USB • Sudden increase in file copy volumes
  • 10. 10 | © 2018 Interset Software 10 | © 2018 Interset Software z Lesson #2: The Math Matters – Test It Recommendations • Agree on the use cases in advance • Use a proof-of-concept with historical/existing data to test the SA’s math • Engage red team or pen testing if available • Evaluate the results: Do they support the use cases? Google Drive • Permissive controls • Personal/external sharing USB • Sudden increase in file copy volumes Authentication • Sudden change in workstation access • Odd working hours • Data Theft • Data Staging • Lateral Movement • Account Compromise
  • 11. 11 | © 2018 Interset Software 11 | © 2018 Interset Software Case Study #3: Healthcare Records & Payments  Profile: 6.5 billion transactions annually, 750+ customers, 500+ employees  Team of 7: CISO, 1 security architect, 3 security analysts, 2 network security  Analytics surfaced (for example) an employee who attempted to move “sensitive data” from endpoint to personal Dropbox  Employee was arrested and prosecuted using incident data Focus and prioritized incident responses Incident alert accuracy increased from 28% to 92% Incident mitigation coverage doubled from 70 per week to 140
  • 12. 12 | © 2018 Interset Software 12 | © 2018 Interset Software Lesson #3: Meaningful Metrics Hawthorne Effect: Whatever gets measured, gets optimized Recommendations  Define meaningful operational metrics (not just “false positives”)  Build a process for measuring and quantifying over time, not just during a pilot  Ensure the Security Analytics system supports a feedback process to adjust the analytics to support your target metrics
  • 13. 13 | © 2018 Interset Software 13 | © 2018 Interset Software What Have We Learned? Lessons Learned  The Math Matters – Test It  Less Alerts, Not More  Automated, Measured Responses  Meaningful Metrics Recommendations  Agree on the use cases in advance  Evaluate results with and without security analytics system  Assess risk level, not binary alert  Ensure integrated feedback and automated response
  • 14. 14 | © 2018 Interset Software 14 | © 2018 Interset Software QUESTIONS? Roy Wilds – Field Data Scientist @roywilds Learn more at Interset.AI
  • 15. 15 | © 2018 Interset Software How Millions of Events Become Qualified Threats Leads ACQUIRE DATA CREATE UNIQUE BASELINES DETECT, MEASURE AND SCORE ANOMALIES HIGH QUALITY THREAT LEADS INTERNAL RECON INFECTED HOST DATA STAGING & THEFT COMPROMISED ACCOUNT LATERAL MOVEMENT ACCOUNT MISUSE CUSTOM FRAUD Contextual views. Drill-down and cyber-hunting. Broad data collection DLP ENDPOINT Buz Apps CUSTOM DATA NETWORK IAM Determine what is normal Gather the raw materials Find the behavior that matters W orkflow engine for incident response.
  • 16. 16 | © 2018 Interset Software 16 | © 2018 Interset Software About Interset.AI SECURITY ANALYTICS LEADER PARTNERSABOUT US Data science & analytics focused on cybersecurity 100 person-years of security analytics and anomaly detection R&D Offices in Ottawa, Canada; Newport Beach, CA Interset.AI

Editor's Notes

  • #16: 4 key components you need for an effective security analytics solution -You need to compute unique normal -You need unsupervised machine learning – making no assumptions as to behavior or distribution of data. In fact, these types of datasets involved in insider attacks rarely have much meta-data that describes the data itself. -You need a Big Data infrastructure – need the ability to compute at scale in a cost effective manner -You need a mathematical framework – to ingest billions of events every day and reduce it down to a handful of real threat leads. -Also, the ability to integrate into your security eco-system is critical so the solution is completely API driven