18
Threat Lifecycle Management

LogRhythm Cyber Security in Enterprise Presentation

Embed Size (px)

Citation preview

Page 1: LogRhythm Cyber Security in Enterprise Presentation

Threat Lifecycle Management

Page 2: LogRhythm Cyber Security in Enterprise Presentation

Why?

Page 3: LogRhythm Cyber Security in Enterprise Presentation

2009 2010 2011 2012 2013 2014

cyber incidents

Source: PwC, The Global State of Information Security Survey 2015

2017?2016?2015?

detected 42.8 million

Page 4: LogRhythm Cyber Security in Enterprise Presentation

“84% of breach evidence resided in the log data.”

Verizon Data Breach Investigation Report

“By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches up from less than 10% in 2013.”

- Neil MacDonald, Gartner

Page 5: LogRhythm Cyber Security in Enterprise Presentation

Why?Faster Detection & Response Reduces Risk

Page 6: LogRhythm Cyber Security in Enterprise Presentation

Mean Time To Detect

Page 7: LogRhythm Cyber Security in Enterprise Presentation

Mean Time To Respond

Page 8: LogRhythm Cyber Security in Enterprise Presentation

Months Weeks Days Hours Minutes

High

Low

MTTD & MTTR

Chance ofSignificant Breach

Page 9: LogRhythm Cyber Security in Enterprise Presentation

Reconnaissan

ceInitial

CompromiseCommand & Control

Lateral Movement

Target Attainment ExfiltrationCommand

& ControlLateral

MovementTarget

Attainment Exfiltration

By reducing MTTD and MTTR LogRhythm’s Security Intelligence Platform helps break the kill chain.

Early neutralisation equals no damaging cyber incident or data breach.

Page 10: LogRhythm Cyber Security in Enterprise Presentation

Anatomy Of An Attack

Page 11: LogRhythm Cyber Security in Enterprise Presentation
Page 12: LogRhythm Cyber Security in Enterprise Presentation
Page 13: LogRhythm Cyber Security in Enterprise Presentation
Page 14: LogRhythm Cyber Security in Enterprise Presentation

XM

SmartResponseTM

Page 15: LogRhythm Cyber Security in Enterprise Presentation

Spear-phishing

Attack email received

Threat Intelligence

Malware Installed

(malicious PDF)

User & Endpoint Analytics

Network reconnaissanc

e(port scan)

Network Analytics

Threat Intelligence

Brute Force Attack

User Analytics

LogRhythm SmartResponse

Incident Management

Holistic Analytics

People & Process

00:09.07 00:09.40 00:09.52 00:10.02 00:10.12

Page 16: LogRhythm Cyber Security in Enterprise Presentation

Threat Lifecycle Management™TIME TO

RESPOND

SecurityEvent Data

Log &Machine Data

Forensic Sensor Data

Forensic Data

Analyze the threat

and associated

risk, determine

if an incident has or is occurring

Investigate Mitigate

Implement counter-

measures and

controls that

mitigate the risk

presented by

the threat

Qualify

Assess threat,

determine if it poses risk and

whether a full

investigation

is required

Machine Analytics

DiscoverUser

Analytics

TIME TO DETECT

Recover

Eradicate Cleanup ReportReview Adapt

Page 17: LogRhythm Cyber Security in Enterprise Presentation
Page 18: LogRhythm Cyber Security in Enterprise Presentation

Thank You