Time
45 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:01
Let's imagine we started a new company called Acme, and we want to start adding some cyber security elements to their network infrastructure.
00:10
Acne is a small company with just a couple of desktop users on a laptop user. The first layer of security is already in place. A network firewall.
00:20
This firewall will allow Acme tow have a layer of separation between their corporate devices on the Internet, assuming they're not yet using cloud more on that later.
00:30
Some firewalls also have intrusion prevention capabilities and can protect at me from intrusions by preventing access to the corporate network from outside or by preventing the corporate users from accessing things they don't want them to.
00:45
Some firewalls also protect against other kinds of tres.
00:49
They're used as choke points on there, a single point of access from and to the corporate network, which allows the firewall to inspect the traffic on look for suspicious events that could constitute a threat.
01:02
Usually in such an environment, everything behind the firewall is trusted. The firewall has a trust port for things inside the network on an intro sport for things outside of the network.
01:15
For a second layer of protection, we make sure that each user has an antivirus program installed. Agnes. Maintaining all current definition updates on one scans regularly.
01:26
Great. Now we're starting to protect the users and the end points. The anti virus software will protect each individual from the following
01:36
viruses. Trojans, worms, adware and spyware.
01:42
Anti virus software has evolved from a type of utility used for scanning and removing viruses from your computer to a set of endpoint protection solutions.
01:53
Anti virus programs include both automatic and manual scanning capabilities.
01:59
Very exciting times are coming.
02:01
Acme expands and adds a technician that travels to customer sites.
02:07
But because our technician is mobile and outside of the office, they can't benefit from the protection of the office. Firewall.
02:15
Criminals are scouring the Web looking for victims with specific vulnerabilities, and they get hit with intrusion attempts.
02:23
The Attackers will attempt to compromise and use the own protected host as a slingshot to access corporate network resources. Or they could be looking to intercept interesting data like passwords or credit card information.
02:38
The host becomes compromised outside of the central protection of the office.
02:43
Next time the technician returns to the office there, infection spreads to other users because of the lack of segregation within the network behind the firewall.
02:53
The same can happen if the user is on an open VPN.
02:58
Many organizations will try to get around the problem we described by installing a VPN to ensure that everyone is behind the corporate firewall. But remember,
03:07
even though their traffic maybe going through the same choke point, they're still not physically located behind that firewall. So their devices still exposed to the same risks.
03:19
Using perimeter based offenses is no longer viable in a world where devices are mobile and data is accessed through the cloud.
03:29
So that's now envision that all remote users are following the company's cyber safety rules.
03:37
We have a firewall and anti virus on we're Feeling Pretty Good are anti virus is very good at detection of the things that they already know about. That's known as known knowns.
03:49
But what about attacks that are new that nobody knows about yet?
03:52
What about unknown unknowns?
03:55
Anti virus detection is signature based. Thes signatures, which are like fingerprints or known patterns of behavior, are usually available to your anti virus product by means of regular updates,
04:06
but they're created only after someone has already been harmed by it on after the antivirus company know about it and have determined how to re mediate it.
04:15
The responsibility then fold on the user's toe, have to update their definitions and run regular scans.
04:24
Criminals don't always use malware,
04:27
just like burglars who choose the easiest way into your home or business, maybe through the open front door. Or maybe by smashing a window.
04:34
Online criminals find the path of least resistance into your network on anti virus is usually only good at detecting known malware.
04:44
Now it seems unfortunate,
04:46
but Acme has been compromised.
04:48
The criminal had free reign over the network once they could get onto a trusted system, which allowed them to bypass critical controls on the firewall.
04:58
Anti virus didn't detect the attack because there was no malware used. The criminal got in by exploiting a vulnerability in the roaming laptop. And then, when that user came back into the office, the criminal was able to move laterally toe other systems within the trusted zone.
05:14
Now the company realizes that they need to take the next step to improve their cyber security.
05:19
They decided to install a security information and event management solution also called seem, which is going to be the subject of our first module.
05:30
Hey, and welcome to the first module. Understanding Security information on event Management's role in security
05:40
in this module will be discussing why a company would implement a seam solution, the principal functions of a seam on how it works
05:47
after we'll also dive into some of its limitations on the challenges it faces.
05:54
Acme. Our Example. Company decides to install a scene.
05:59
A seam works as a focal point where old devices sent information and events once they're the traffic is analyzed. To determine if something is suspicious,
06:10
seems could be deployed two ways
06:13
on premises or cloud. Based
06:15
in our example, Acme chooses Cloud based because it's the most scalable solution.
06:20
Now they have to collect telemetry data from all across their network and then points
06:26
they need to install and configure agents and set up our sir's within their scene.
06:33
Usually, cos implement the same solution for one or more off the following reasons to protect the company by monitoring activity over the network in real time. The processing speed is crucial in cyber security. The quicker you process events the sooner the review process starts on, the sooner you confined risks or threats
06:55
to ensure audit success by demonstrating compliance with data security standards. A seam solution is a common requirement for several data security standards
07:05
to understand incidents by performing forensic analysis.
07:10
This way, you can dissect an event and understand what happened.
07:15
Toe Have access to threat intelligence feeds for supporting the security awareness function
07:20
threat. Intelligence feeds are repositories where cyber security information is stored and consumed
07:28
to make sure security incidents are being addressed by supporting the incident response process.
07:34
This will allow the company to respond to threats on breaches in a more effective way
07:40
and to perform security analytics in order to support a threat. Hunting protests
07:46
Determining the suspicious traffic is essential to the threat hunting process on dhe incident response.
07:53
When the average time to detective reaches 191 day's time is critical. Rial time monitoring lets you see alerts on defined filters for the events and logs at high speed so that you could react to them in a timely manner.
08:09
The weight of an agent and the capacity for transmitting telemetry data to the seam are essential to the monitoring process. A good agent leads to getting information into the seam at a faster rate on with more relevant data.
08:24
Also, a quicker processing time for the information can lead to a faster response to threats.
08:31
Many different types of seeing implementations lead to an increase of alerts.
08:35
This causes what we have no Jin called council burning.
08:41
It's where there are so many events that you either cannot humanly deal with them or where you see them so often that you begin to ignore them.
08:50
Some vendors recommend that customers tuned the scene on ignore information that they consider irrelevant. But in reality, ignoring this information could lead to important information getting lost.
09:01
What may currently be irrelevant may become relevant in the future.
09:07
Some data security standards, such as socks PC i HIPAA on fisma, among others, require the use of a scene tool for order trails, privacy and security.
09:18
For some businesses, not complying with specific types of standards can mean that they lose customers and b to B
09:26
or can't take credit card payments and B to C, for instance,
09:28
by not being in compliance, companies could expose themselves to unnecessary attacks on risk on lose trust in the marketplace.
09:37
Several seems solutions already have built in compliance standards in place,
09:43
but it's not always assumed.
09:46
Some scenes require a little more customization and tweaking based on the company's needs and priorities. So it's important to be aware of this when picking the right tool for your needs.
09:56
A seam tool supports the forensics function by providing a single repositories for logs alert on events. This is the foundation of a seam solution.
10:07
When incidents happen, The forensic function serves as an information gathering tool to determine what events such as source destination activity, ports, protocols, et cetera were used during the incident.
10:22
Based on the information gathered. You can use that information to begin with the investigation process to determine what happened on what caused it.
10:31
A scene solution needs Advanced Threat intelligence in order to correlate events and raise the alarm.
10:41
Better threat Intelligence means better resources to determine if a certain event may constitute a risk or a threat to the environment.
10:48
Seems solutions help you to perform threat hunting and analytical duties.
10:52
Some solutions need lots of tuning and customization. Others, such as cyber easy, provide more focused types of monitoring and automation, which require less tuning.
11:05
Another key element of a seam solution is its capacity to support incident response activities.
11:13
The ideal team is capable of detecting anomalies and creating alerts in near real time.
11:18
It also provides the ability to track and follow up of those incidents. By doing so, the incident response processes traced, tracked and documented.
11:28
There are several different seems solutions for different sized businesses. Many require full 24 7 capable teams to manage. Some, like Cyber Easy, are focused more toward ease of use. On others are fully managed by the vendor
11:46
and finally, the last main function of a seam. The Security Analytics
11:52
Security Analytics includes quantitative methods such as descriptive on predictive statistical methods, machine learning on data mining in order to model behaviors and establish patterns. Those patterns and behaviors help security analysts to determine if a series of events constitutes a threat or not.
12:11
Module two of this course will explain the processes involved in security analytics.
12:18
So now it's time for some questions.
12:20
Is the current seem out of the box approach enough to protect a company?
12:37
How does it seem help with the security process for companies.
12:52
This first module recovered the six main functions of a seam on how they can help to solve specific security issues for your company. To recap, the six functions are really time monitoring activity.
13:07
Complaints with data security standards,
13:09
forensic analysis,
13:11
threat intelligence feeds supporting the incident response process on dhe Security Analytics.
13:20
Thanks very much for your attention,
13:22
and I'll see you in the next module, where we discuss the process of Security analytics.

Up Next

Getting Started in Security Analytics with CyberEASY

This course focuses on the current perspective of cybersecurity analytics contrasted with the emerging trends over threat hunting and threat intelligence. The course will show the role of CyberEASY on threat intelligence and threat hunting and how CyberEASY can help the organization to better understand their cyber risks environment.

Instructed By

Instructor Profile Image
Ken Gilmour
CEO and Co-founder of Knogin
Instructor