SlideShare a Scribd company logo
Incident response live demo slides final
Agenda
Investigations
• What are they?
• What questions can they answer?
• Is the number 42 always relevant?
Investigation Walk-Throughs
• This won’t be all slides…we promise..
Recap
What is an Investigation?
An Investigation is the act of ascertaining facts
A careful examination
Or simply it answers: “What do I do?”
And there is a result……..sometimes
What Initiates an Investigation?
Someone asks you
• Hey I think PlayStation network is down?
You see something unusual
• Ever get that feeling someone is watching you?
• Certain patterns of logs
• New Assets
Alarms!
• More..
..but what does it all mean?
What is an Alarm?
An alarm is a pattern of activity that should be investigated
• The logic that creates an alarm is customizable
Inside a SIEM an alarm could be
• A single event
• A series of events
• Event quantity
• ..and more
Process of an Investigation
Gather Information
Follow the trail
Look for Clues
Determine severity
Am I Finished?
Do you know what to do?
What does the IRP say?
Hint: no you aren’t
Document it!
If it’s not in a Ticket– it didn’t happen!
Why is Documentation Important?
Avoid Repetition
Avoid Repetition (yes we repeated this)
Share Information
Liability
Find patterns
Find anomalies or outliers
Find misconfigurations or unapproved changes
Demo Time
Show me the packets!
ASSET DISCOVERY
• Active Network Scanning
• Passive Network Scanning
• Asset Inventory
VULNERABILITY ASSESSMENT
• Continuous
Vulnerability Monitoring
• Authenticated / Unauthenticated
Active Scanning
BEHAVIORAL MONITORING
• Log Collection
• Netflow Analysis
• Service Availability Monitoring
SECURITY INTELLIGENCE/SIEM
• SIEM Event Correlation
• Incident Response
THREAT DETECTION
• Network IDS
• Host IDS
• File Integrity Monitoring
USM Platform
Integrated, Essential Security Controls
Unified Security Management Platform
A single platform for simplified, accelerated threat detection, incident response
& policy compliance
AlienVault Labs Threat Intelligence
Correlation rules and directives written by our
AlienVault Labs team and displayed through
the USM interface
Open Threat Exchange
The world’s largest repository of
crowd-sourced threat data providing a
continuous view of real time threats that may
have penetrated the company’s defenses.
Unified Security Management
Demo Time
Show me the packets!
Recap
It’s important to know what the alarm is
Use search filters to help you prioritize investigations
Use policy to filter alarms you don’t need to re-investigate
Even though it’s familiar you still need to investigate
Have a plan for what you could find (IRP)
Write stuff down….
888.613.6023
ALIENVAULT.COM
CONTACT US
HELLO@ALIENVAULT.COM
Now for some Questions..
Questions? Hello@AlienVault.com
Twitter : @alienvault
Test Drive AlienVault USM
Download a Free 30-Day Trial
http://www.alienvault.com/free-trial
Check out our 15-Day Trial of USM for AWS
https://www.alienvault.com/free-trial/usm-for-aws
Try our Interactive Demo Site
http://www.alienvault.com/live-demo-site

More Related Content

What's hot (20)

PPTX
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
AlienVault
 
PPTX
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
AlienVault
 
PDF
Open Source IDS Tools: A Beginner's Guide
AlienVault
 
PPTX
How Malware Works
AlienVault
 
PPTX
How to Solve Your Top IT Security Reporting Challenges with AlienVault
AlienVault
 
PPTX
AWS Security Best Practices for Effective Threat Detection & Response
AlienVault
 
PPTX
Otx introduction sw
AlienVault
 
PPTX
Beginner's Guide to SIEM
AlienVault
 
PPTX
Creating Correlation Rules in AlienVault
AlienVault
 
PPTX
How to Detect System Compromise & Data Exfiltration with AlienVault USM
AlienVault
 
PPTX
Improve Threat Detection with OSSEC and AlienVault USM
AlienVault
 
PPTX
Six Steps to SIEM Success
AlienVault
 
PPTX
How to Detect SQL Injections & XSS Attacks with AlienVault USM
AlienVault
 
PPTX
How to Simplify Audit Compliance with Unified Security Management
AlienVault
 
PDF
Modern vs. Traditional SIEM
Alert Logic
 
PDF
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Risk Analysis Consultants, s.r.o.
 
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
AlienVault
 
PPTX
Improve Security Visibility with AlienVault USM Correlation Directives
AlienVault
 
PPTX
Automating Critical Security Controls for Threat Remediation and Compliance
Qualys
 
PDF
20 Security Controls for the Cloud
NetStandard
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
AlienVault
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
AlienVault
 
Open Source IDS Tools: A Beginner's Guide
AlienVault
 
How Malware Works
AlienVault
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
AlienVault
 
AWS Security Best Practices for Effective Threat Detection & Response
AlienVault
 
Otx introduction sw
AlienVault
 
Beginner's Guide to SIEM
AlienVault
 
Creating Correlation Rules in AlienVault
AlienVault
 
How to Detect System Compromise & Data Exfiltration with AlienVault USM
AlienVault
 
Improve Threat Detection with OSSEC and AlienVault USM
AlienVault
 
Six Steps to SIEM Success
AlienVault
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
AlienVault
 
How to Simplify Audit Compliance with Unified Security Management
AlienVault
 
Modern vs. Traditional SIEM
Alert Logic
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Risk Analysis Consultants, s.r.o.
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
AlienVault
 
Improve Security Visibility with AlienVault USM Correlation Directives
AlienVault
 
Automating Critical Security Controls for Threat Remediation and Compliance
Qualys
 
20 Security Controls for the Cloud
NetStandard
 

Viewers also liked (7)

PDF
Alien vault sans cyber threat intelligence
AlienVault
 
PDF
The State of Incident Response - INFOGRAPHIC
AlienVault
 
PDF
PCI DSS Implementation: A Five Step Guide
AlienVault
 
PPTX
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
AlienVault
 
PDF
Security operations center 5 security controls
AlienVault
 
PDF
Insider Threat Detection Recommendations
AlienVault
 
PPSX
HP ArcSight
Mohamed Zohair
 
Alien vault sans cyber threat intelligence
AlienVault
 
The State of Incident Response - INFOGRAPHIC
AlienVault
 
PCI DSS Implementation: A Five Step Guide
AlienVault
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
AlienVault
 
Security operations center 5 security controls
AlienVault
 
Insider Threat Detection Recommendations
AlienVault
 
HP ArcSight
Mohamed Zohair
 
Ad

Similar to Incident response live demo slides final (20)

PPTX
Automation and open source turning the tide on the attackers
Frank Victory
 
PDF
Incident response, Hacker Techniques and Countermeasures
Jose L. Quiñones-Borrero
 
PPTX
Vulnerability Management: What You Need to Know to Prioritize Risk
AlienVault
 
PDF
Loggin alerting and hunting technology hub 2016
Scot Berner
 
PPTX
Quick & Dirty Dozen: PCI Compliance Simplified
AlienVault
 
PPTX
How to Leverage Log Data for Effective Threat Detection
AlienVault
 
PDF
Managing Next Generation Threats to Cyber Security
Priyanka Aash
 
PDF
Open Source Incident Management - BSides DC 2017 Presentation
Christopher Ensey
 
PDF
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
Felipe Prado
 
PDF
Sexy defense
Iftach Ian Amit
 
PPTX
PCI DSS Simplified: What You Need to Know
AlienVault
 
PDF
Cybersecurity Basics - Aravindr.com
Aravind R
 
PPT
Big Data, Security Intelligence, (And Why I Hate This Title)
Coastal Pet Products, Inc.
 
PPT
Forensics for the defense
William Mathews
 
PPT
Forensics for the Defense
Coastal Pet Products, Inc.
 
PDF
Windows Incident Response is hard, but doesn't have to be
Michael Gough
 
PPT
Log Forensics from CEIC 2007
Anton Chuvakin
 
PPTX
Jason Kent - AppSec Without Additional Tools
centralohioissa
 
PPTX
Threat hunting foundations: People, process and technology.pptx
Infosec
 
PDF
Memory forensics and incident response
London School of Cyber Security
 
Automation and open source turning the tide on the attackers
Frank Victory
 
Incident response, Hacker Techniques and Countermeasures
Jose L. Quiñones-Borrero
 
Vulnerability Management: What You Need to Know to Prioritize Risk
AlienVault
 
Loggin alerting and hunting technology hub 2016
Scot Berner
 
Quick & Dirty Dozen: PCI Compliance Simplified
AlienVault
 
How to Leverage Log Data for Effective Threat Detection
AlienVault
 
Managing Next Generation Threats to Cyber Security
Priyanka Aash
 
Open Source Incident Management - BSides DC 2017 Presentation
Christopher Ensey
 
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
Felipe Prado
 
Sexy defense
Iftach Ian Amit
 
PCI DSS Simplified: What You Need to Know
AlienVault
 
Cybersecurity Basics - Aravindr.com
Aravind R
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Coastal Pet Products, Inc.
 
Forensics for the defense
William Mathews
 
Forensics for the Defense
Coastal Pet Products, Inc.
 
Windows Incident Response is hard, but doesn't have to be
Michael Gough
 
Log Forensics from CEIC 2007
Anton Chuvakin
 
Jason Kent - AppSec Without Additional Tools
centralohioissa
 
Threat hunting foundations: People, process and technology.pptx
Infosec
 
Memory forensics and incident response
London School of Cyber Security
 
Ad

More from AlienVault (6)

PDF
Malware Invaders - Is Your OS at Risk?
AlienVault
 
PPTX
Best Practices for Configuring Your OSSIM Installation
AlienVault
 
PPTX
Security by Collaboration: Rethinking Red Teams versus Blue Teams
AlienVault
 
PPTX
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
AlienVault
 
PPTX
Spice world 2014 hacker smackdown
AlienVault
 
PPTX
Demo how to detect ransomware with alien vault usm_gg
AlienVault
 
Malware Invaders - Is Your OS at Risk?
AlienVault
 
Best Practices for Configuring Your OSSIM Installation
AlienVault
 
Security by Collaboration: Rethinking Red Teams versus Blue Teams
AlienVault
 
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
AlienVault
 
Spice world 2014 hacker smackdown
AlienVault
 
Demo how to detect ransomware with alien vault usm_gg
AlienVault
 

Recently uploaded (20)

PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
PDF
Market Insight : ETH Dominance Returns
CIFDAQ
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PPTX
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
introduction to computer hardware and sofeware
chauhanshraddha2007
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
Market Insight : ETH Dominance Returns
CIFDAQ
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
The Future of Artificial Intelligence (AI)
Mukul
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
introduction to computer hardware and sofeware
chauhanshraddha2007
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 

Incident response live demo slides final

  • 2. Agenda Investigations • What are they? • What questions can they answer? • Is the number 42 always relevant? Investigation Walk-Throughs • This won’t be all slides…we promise.. Recap
  • 3. What is an Investigation? An Investigation is the act of ascertaining facts A careful examination Or simply it answers: “What do I do?” And there is a result……..sometimes
  • 4. What Initiates an Investigation? Someone asks you • Hey I think PlayStation network is down? You see something unusual • Ever get that feeling someone is watching you? • Certain patterns of logs • New Assets Alarms! • More..
  • 5. ..but what does it all mean?
  • 6. What is an Alarm? An alarm is a pattern of activity that should be investigated • The logic that creates an alarm is customizable Inside a SIEM an alarm could be • A single event • A series of events • Event quantity • ..and more
  • 7. Process of an Investigation Gather Information Follow the trail Look for Clues Determine severity
  • 8. Am I Finished? Do you know what to do? What does the IRP say? Hint: no you aren’t
  • 9. Document it! If it’s not in a Ticket– it didn’t happen!
  • 10. Why is Documentation Important? Avoid Repetition Avoid Repetition (yes we repeated this) Share Information Liability Find patterns Find anomalies or outliers Find misconfigurations or unapproved changes
  • 11. Demo Time Show me the packets!
  • 12. ASSET DISCOVERY • Active Network Scanning • Passive Network Scanning • Asset Inventory VULNERABILITY ASSESSMENT • Continuous Vulnerability Monitoring • Authenticated / Unauthenticated Active Scanning BEHAVIORAL MONITORING • Log Collection • Netflow Analysis • Service Availability Monitoring SECURITY INTELLIGENCE/SIEM • SIEM Event Correlation • Incident Response THREAT DETECTION • Network IDS • Host IDS • File Integrity Monitoring USM Platform Integrated, Essential Security Controls
  • 13. Unified Security Management Platform A single platform for simplified, accelerated threat detection, incident response & policy compliance AlienVault Labs Threat Intelligence Correlation rules and directives written by our AlienVault Labs team and displayed through the USM interface Open Threat Exchange The world’s largest repository of crowd-sourced threat data providing a continuous view of real time threats that may have penetrated the company’s defenses. Unified Security Management
  • 14. Demo Time Show me the packets!
  • 15. Recap It’s important to know what the alarm is Use search filters to help you prioritize investigations Use policy to filter alarms you don’t need to re-investigate Even though it’s familiar you still need to investigate Have a plan for what you could find (IRP) Write stuff down….
  • 16. 888.613.6023 ALIENVAULT.COM CONTACT US [email protected] Now for some Questions.. Questions? [email protected] Twitter : @alienvault Test Drive AlienVault USM Download a Free 30-Day Trial http://www.alienvault.com/free-trial Check out our 15-Day Trial of USM for AWS https://www.alienvault.com/free-trial/usm-for-aws Try our Interactive Demo Site http://www.alienvault.com/live-demo-site