11
SIEM – Threat Lifecycle Management

LogRhythm Cyber Security Event Slides

Embed Size (px)

Citation preview

Page 1: LogRhythm Cyber Security Event Slides

SIEM – Threat Lifecycle Management

Page 2: LogRhythm Cyber Security Event Slides

PoliticalIdeologicalCriminal

Page 3: LogRhythm Cyber Security Event Slides

Ever Increasing Cyber Risk

2009 2010 2011 2012 2013 20140

5

10

15

20

25

30

35

40

45

Mill

ion

NUMBER OF DETECTED CYBER INCIDENTS

Source: PwC, The Global State of Information Security Survey 2015

Page 4: LogRhythm Cyber Security Event Slides

“84% of a breaches evidence resided in the log data.”

2015 Verizon Data Breach Investigation Report

Page 5: LogRhythm Cyber Security Event Slides

Holistic Attack SurfaceUser

Endpoint

Network

Endpoint

Network

User

Endpoint

Network

User

Endpoint

Network

User

Endpoint

Network

Endpoint

User

Network

User

Endpoint

Network

User

Endpoint

Network

Endpoint

Endpoint

User

User

Network

User

Page 6: LogRhythm Cyber Security Event Slides

“By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches up from less than 10% in 2013.”

- Neil MacDonald, Gartner

Page 7: LogRhythm Cyber Security Event Slides

Initial Compromise

Command & Control

Lateral Movement

Target Attainment

ExfiltrationCommand & Control

Lateral Movement

Target Attainment

Exfiltration

By reducing MTTD and MTTR LogRhythm’s Security Intelligence Platform helps break the kill chain.

Early neutralisation equals no damaging cyber incident or data breach.

Reconnaissance

Page 8: LogRhythm Cyber Security Event Slides

Faster Detection & Response Reduces Risk

Months Weeks Days Hours Minutes

High

Low

MTTD & MTTR

Chance of Damaging Cyber Incident or Data Breach

Page 9: LogRhythm Cyber Security Event Slides

TIME TO DETECT

Eradicate

Cleanup

Report

Review

Adapt

Threat Lifecycle Management™

TIME TO RESPOND

SecurityEvent Data

Log &Machine Data

Forensic Sensor Data

Forensic Data

Machine Analytics

Discover Qualify

Analyze the threat and

associated risk, determine if an

incident has or is occurring

Investigate Mitigate Recover

Implement counter-

measures and controls that mitigate risk presented by

the threat

Assess threat and determine if it poses risk and whether a full investigation is required

User Analytics

Page 10: LogRhythm Cyber Security Event Slides

Largest, Fastest GrowingIndependent SIEM Provider

Global Operation

Focus on Customer Success

Demonstrated Leader

Page 11: LogRhythm Cyber Security Event Slides

Thank You