SlideShare a Scribd company logo
SESSION ID:
#RSAC
Dr. Alon Kaufman
Data Science Transforming
Security Operations
STR-R02
Director of Data Science &
Innovation, RSA
#RSAC
Data Science & Security Operation?
2
Who uses data science in their security practice?
In what processes throughout your security operations do you use data science?
Have you seen a significant value come out of your data science solutions?
Do you see data science playing in role in the Cybersecurity market shift: “By 2020,
60% of enterprise information security budgets will be allocated for rapid detection
and response approaches, up from less than 20% in 2015 (Gartner) ”
Data Science has way more to offer than prevention & detection... It
can and should be used as a key methodology and technology
spanning all processes in security operations….
#RSAC
Agenda
3
What is data science, and why in security?
You should know by now ;)
What's special about data science in security
5 Maturity levels of data science in security operations
Data science goes way beyond the prevention & detection in the entry level…
DS maturity survey
Where is your organization/product in terms of DS maturity?
Building a security data science practice in house, Yes or No?
Summary
#RSAC
What is Data Science – in 1 Sentence
Making sense out of big data…
Getting the data we collect to work for us!
4
The demand is
just growing…
Ratio
#RSAC
Why Data Science in Security?
5
We have all (most) of the data already….. Yet still being breached… while the attacks are
hidden in our data
Security operations are getting too complex for humans alone… and we are facing a huge
staffing gap…
Other industries demonstrated huge value with DS, given a hard problem and the relevant
data at hand:
Retail recommendation systems, up-sells, cross-sell
Bio-informatics
Image object recognition
Voice recognition
Self driving cars
…
#RSAC
What's Special About Data Science in Security?
6
Dealing with a hostile dynamic world!
Human/Machine synergy
High price of False-Negative errors
Gathering/Sharing data
Lack of labeled attacks for training and learning
In security detection is just the beginning….
#RSAC
5 Levels of Data Science Maturity
7
•Known bad
•Adaptive learning
•Integrated scoring
•Aggregate
•Prioritize
•Automate &
Recommend
•Basic feedback
•Derived feedback
•Learning from
analyst actions
•IoCs
•Global learning
•Policies
Key message: Data science is a key methodology and technology, not a plug-in feature…
•Limit
•Block
•User-support
#RSAC
Detection: The Holy Grail of Data Science….
8
The data exists, and so also endless point
solutions for detection
The key to success is:
Risk
Known
Bad
Patterns
Behavior
Anomaly
Entity
Anomaly
Compressive Risk Scoring Integrated Approach
#RSAC
Comprehensive Risk Score - Example
Suspicious User Login Detection
Multivariate Machine Learning algorithm to detect login
impersonation
Multiple inputs from multiple sources:
Hostname, location, server, duration, auth, time of day, data tx/rx,….
Model output
Risk score (combined measure of how risky the behavior is)
Modeling concept:
Known bad: blocked users, unrealistic ground-speed, authentication
User anomaly: base line per feature and detect deviation from norm
Peer group anomaly: Prior knowledge, new user, acceptable
behavior changes
#RSAC
Integrating Different Approaches - Example
Endpoint Malware Detection
The market is highly fragmented with endless point
solutions
Each vendor/solution takes a different valid
approach with pros and cons
Combining them provides enhanced performance:
Human
Static analysis
Dynamic analysis
Community reputation
10
#RSAC
Augmented Investigation
11
The goal is not replace the analysts but augment them and simplify
their work:
Shortage of cybersecurity skills continues to grow
Most of analysts’ time goes on selecting what alerts to investigate
Attacks typically trigger multiple alerts throughout the different
attack phases
70% of the procedures done by analysts are repeatable
The Key to success:
Prioritize
Aggregate
Automate & Recommendation
23% 25% 28%
46%
2013 2014 2015 2016
Shortage in
CyberSecurity Skills
(ESG, 2016)
#RSAC
Augmented Investigation - Example
Top-down Hierarchical approach
Pre-fetch all supporting data
Risk scoring prioritization
Aggregate across entities (user,
devices, application, …)
Moving from alerts to attack
vectors
Guide the analyst with
recommendations
12
#RSAC
Continuous Learning
13
As in any learning “teachers” are beneficial –
supervised learning
Feeding back results to the learning engine
When direct feedback is lacking it can be
derived
Learning from analyst behavior and actions
#RSAC
Leaning and Self-Improving Detection - Example
Ongoing, automatic self-learning fraud detection model
Risk Engine
Case
Mgmt
Activity details
Policy
Mgr.
Device Payee
Authenticate Continue
Step-up AuthenticationFeedback
Feedback
Challenge
Out-of-band
Others
Knowledge
271937
Deny
User
Data Science based Risk
Engine
Account
#RSAC
Intelligence Sharing
15
Tiny part of the road from
each
Analytics
Map + prediction + navigation
instruction
Waze. Outsmarting traffic, Together.
Crowdsourced security intel’
Security map + predictions +
mitigation instructions
To date the industry state of the art
sharing is around IoCs, next phase is
to share, learn and crowdsource
policies, procedures & mitigations
#RSAC
Fighting Back Together - Example
#RSAC
Response
17
Taking automatic actions based on insights:
Limit access / Require additional input
Risk based authentication
Partial blocking
Automatic blocking
Guide the analyst through investigation
Pre-fetch all required data
Recommend next action
#RSAC
5 Levels of Data Science Maturity
18
•Known bad
•Adaptive learning
•Integrated scoring
•Aggregate
•Prioritize
•Automate &
Recommend
•Basic feedback
•Derived feedback
•Learning from
analyst actions
•IoCs
•Global learning
•Policies
Key message: Data science is a key methodology and technology, not a plug-in feature…
•Limit
•Block
•User-support
#RSAC
Survey: How DS-Mature Are Your Operations?
(How many fields? (5), Overall score? (22 points) )
19
Detection Augmented
Investigation
Continuous
Learning
Intelligence
Sharing
 Do you use
advanced,
adaptive, analytics
for detection?
 Can you bake into
the analytics
engines your
human insights?
 Do you have your
various products
integrated at the
analytics level?
Response
 Can you combine
multiple alerts
into some attack
description?
 Do you have one
integrated priority
queue?
 Do you utilize
automatic
enrichments,
hints, guidance or
recommendation
to assist analysts?
 Do you leverage
analysts decision
for operations
improvement?
 Do you have any
level of automatic,
self learning from
feedback?
 Do your overall
operations
improve based on
your analysts
work?
 Do you utilize
community data
to improve
operations?
 Do your systems
“learn” from data
outside of your
system?
 Do you have a
mechanism to
improve human
actions based on
the community?
 Do you use
automatic
response based
on analytics?
 Are any
decisions or
actions fed back
to analysts as a
results of the
risk?
#RSAC
Building a Security Data Science Practice in
House, Yes or No?
20
Applying Data Science requires joint effort between data
scientists, security experts and the business owners
To date hiring people with a data science background is hard,
nevertheless with security domain knowledge
From research to an operational process/product – long
journey from the proof-of-signal to an operational system
Data, Data, Data….
You don’t want data science… you actually want data science
backed into your solution in an intuitive, easy to use manner
Alignment from
stakeholders
Invest in staffing and
diverse backgrounds
Organization &
operational breadth
Collaborate / share
Integrated home
grown solution
#RSAC
Applying What You Have Learned Today
21
Take the survey and assess how advanced is your DS strategy
Identify gaps, and in what area focus is needed
Work up the DS stairs:
Detection -> Investigation -> continuous learning -> Intl Sharing -> Automatic response
(Risk based response)
Data Science in house:
Alignment cross-org
Staff wisely
Be prepared for a long (and expensive) journey
Constantly strive to see how DS augments your analysts, and not try replace them!
#RSAC
Summary
22
Data Science has way more to offer than prevention & detection ...
It can and should be used as a key methodology and technology
spanning all processes in security operations…
SESSION ID:
#RSAC
Dr. Alon Kaufman
Data Science Transforming
Security Operations
STR-R02
Director of Data Science &
Innovation, RSA
Alon.Kaufman@rsa.com

More Related Content

Viewers also liked (10)

PDF
Jim Geovedi - Machine Learning for Cybersecurity
idsecconf
 
PDF
Data Science ATL Meetup - Risk I/O Security Data Science
Michael Roytman
 
PPTX
Machine Learning for Threat Detection
Napier University
 
PDF
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Alex Pinto
 
PDF
Computer security - A machine learning approach
Sandeep Sabnani
 
PPTX
When Cyber Security Meets Machine Learning
Lior Rokach
 
PDF
Risk Analysis using open FAIR and Adoption of right Security Controls
Priyanka Aash
 
PDF
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Cybereason
 
PDF
Network Forensics and Practical Packet Analysis
Priyanka Aash
 
PPTX
Practical Applications of Block Chain Technologies
Priyanka Aash
 
Jim Geovedi - Machine Learning for Cybersecurity
idsecconf
 
Data Science ATL Meetup - Risk I/O Security Data Science
Michael Roytman
 
Machine Learning for Threat Detection
Napier University
 
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Alex Pinto
 
Computer security - A machine learning approach
Sandeep Sabnani
 
When Cyber Security Meets Machine Learning
Lior Rokach
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Priyanka Aash
 
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Cybereason
 
Network Forensics and Practical Packet Analysis
Priyanka Aash
 
Practical Applications of Block Chain Technologies
Priyanka Aash
 

Similar to Data Science Transforming Security Operations (20)

PPTX
RSA 2016 Security Analytics Presentation
Anton Chuvakin
 
PDF
Demystifying Security Analytics: Data, Methods, Use Cases
Priyanka Aash
 
PDF
Creating Order from Chaos: Metrics That Matter
Priyanka Aash
 
PDF
Demystifying Data Science
Jonathan Sedar
 
PPTX
Data Science in Cybersecurity effectiveness
cherryblossomm567
 
PDF
Data Science for Cyber Risk
Scott Allen Mongeau
 
PDF
Realizing Software Security Maturity: The Growing Pains and Gains
Priyanka Aash
 
PDF
Data and data scientists are not equal to money david hoyle
Institute of Contemporary Sciences
 
PPTX
Leveraging Data Science for Improved Cybersecurity Measures_PPT_07_08.pptx
suravatsingh
 
PDF
The Impact of Data Science on Business Strategy | IABAC
IABAC
 
PDF
Realities of Data Security
Priyanka Aash
 
PDF
RSA 2016 Realities of Data Security
Scott Carlson
 
PDF
Applied cognitive security complementing the security analyst
Priyanka Aash
 
PDF
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
Priyanka Aash
 
PDF
Top 5 secrets to successfully jumpstarting your cyber-risk program
Priyanka Aash
 
PDF
Yhat - Applied Data Science - Feb 2016
Austin Ogilvie
 
PDF
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
awish11
 
PDF
Understanding Data Science: Concepts, Techniques, and Applications | IABAC
IABAC
 
PDF
Data Science Introduction - Data Science: What Art Thou?
Gregg Barrett
 
PDF
Applying Auto-Data Classification Techniques for Large Data Sets
Priyanka Aash
 
RSA 2016 Security Analytics Presentation
Anton Chuvakin
 
Demystifying Security Analytics: Data, Methods, Use Cases
Priyanka Aash
 
Creating Order from Chaos: Metrics That Matter
Priyanka Aash
 
Demystifying Data Science
Jonathan Sedar
 
Data Science in Cybersecurity effectiveness
cherryblossomm567
 
Data Science for Cyber Risk
Scott Allen Mongeau
 
Realizing Software Security Maturity: The Growing Pains and Gains
Priyanka Aash
 
Data and data scientists are not equal to money david hoyle
Institute of Contemporary Sciences
 
Leveraging Data Science for Improved Cybersecurity Measures_PPT_07_08.pptx
suravatsingh
 
The Impact of Data Science on Business Strategy | IABAC
IABAC
 
Realities of Data Security
Priyanka Aash
 
RSA 2016 Realities of Data Security
Scott Carlson
 
Applied cognitive security complementing the security analyst
Priyanka Aash
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
Priyanka Aash
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Priyanka Aash
 
Yhat - Applied Data Science - Feb 2016
Austin Ogilvie
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
awish11
 
Understanding Data Science: Concepts, Techniques, and Applications | IABAC
IABAC
 
Data Science Introduction - Data Science: What Art Thou?
Gregg Barrett
 
Applying Auto-Data Classification Techniques for Large Data Sets
Priyanka Aash
 
Ad

More from Priyanka Aash (20)

PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Priyanka Aash
 
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
PDF
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
PDF
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
PDF
Keynote : Presentation on SASE Technology
Priyanka Aash
 
PDF
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 
PDF
Redefining Cybersecurity with AI Capabilities
Priyanka Aash
 
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
Priyanka Aash
 
PDF
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
Priyanka Aash
 
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Priyanka Aash
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
Keynote : Presentation on SASE Technology
Priyanka Aash
 
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 
Redefining Cybersecurity with AI Capabilities
Priyanka Aash
 
Demystifying Neural Networks And Building Cybersecurity Applications
Priyanka Aash
 
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
Priyanka Aash
 
Ad

Recently uploaded (20)

PDF
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
PDF
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
PDF
Future-Proof or Fall Behind? 10 Tech Trends You Can’t Afford to Ignore in 2025
DIGITALCONFEX
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
Automating Feature Enrichment and Station Creation in Natural Gas Utility Net...
Safe Software
 
PDF
Kit-Works Team Study_20250627_한달만에만든사내서비스키링(양다윗).pdf
Wonjun Hwang
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
“Computer Vision at Sea: Automated Fish Tracking for Sustainable Fishing,” a ...
Edge AI and Vision Alliance
 
PPTX
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
PDF
“Voice Interfaces on a Budget: Building Real-time Speech Recognition on Low-c...
Edge AI and Vision Alliance
 
PDF
Staying Human in a Machine- Accelerated World
Catalin Jora
 
PDF
NLJUG Speaker academy 2025 - first session
Bert Jan Schrijver
 
PDF
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
PDF
How do you fast track Agentic automation use cases discovery?
DianaGray10
 
PDF
“Squinting Vision Pipelines: Detecting and Correcting Errors in Vision Models...
Edge AI and Vision Alliance
 
PDF
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
Mark Simos
 
PPTX
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
PDF
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
Future-Proof or Fall Behind? 10 Tech Trends You Can’t Afford to Ignore in 2025
DIGITALCONFEX
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
Automating Feature Enrichment and Station Creation in Natural Gas Utility Net...
Safe Software
 
Kit-Works Team Study_20250627_한달만에만든사내서비스키링(양다윗).pdf
Wonjun Hwang
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
“Computer Vision at Sea: Automated Fish Tracking for Sustainable Fishing,” a ...
Edge AI and Vision Alliance
 
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
“Voice Interfaces on a Budget: Building Real-time Speech Recognition on Low-c...
Edge AI and Vision Alliance
 
Staying Human in a Machine- Accelerated World
Catalin Jora
 
NLJUG Speaker academy 2025 - first session
Bert Jan Schrijver
 
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
How do you fast track Agentic automation use cases discovery?
DianaGray10
 
“Squinting Vision Pipelines: Detecting and Correcting Errors in Vision Models...
Edge AI and Vision Alliance
 
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
Mark Simos
 
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 

Data Science Transforming Security Operations

  • 1. SESSION ID: #RSAC Dr. Alon Kaufman Data Science Transforming Security Operations STR-R02 Director of Data Science & Innovation, RSA
  • 2. #RSAC Data Science & Security Operation? 2 Who uses data science in their security practice? In what processes throughout your security operations do you use data science? Have you seen a significant value come out of your data science solutions? Do you see data science playing in role in the Cybersecurity market shift: “By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, up from less than 20% in 2015 (Gartner) ” Data Science has way more to offer than prevention & detection... It can and should be used as a key methodology and technology spanning all processes in security operations….
  • 3. #RSAC Agenda 3 What is data science, and why in security? You should know by now ;) What's special about data science in security 5 Maturity levels of data science in security operations Data science goes way beyond the prevention & detection in the entry level… DS maturity survey Where is your organization/product in terms of DS maturity? Building a security data science practice in house, Yes or No? Summary
  • 4. #RSAC What is Data Science – in 1 Sentence Making sense out of big data… Getting the data we collect to work for us! 4 The demand is just growing… Ratio
  • 5. #RSAC Why Data Science in Security? 5 We have all (most) of the data already….. Yet still being breached… while the attacks are hidden in our data Security operations are getting too complex for humans alone… and we are facing a huge staffing gap… Other industries demonstrated huge value with DS, given a hard problem and the relevant data at hand: Retail recommendation systems, up-sells, cross-sell Bio-informatics Image object recognition Voice recognition Self driving cars …
  • 6. #RSAC What's Special About Data Science in Security? 6 Dealing with a hostile dynamic world! Human/Machine synergy High price of False-Negative errors Gathering/Sharing data Lack of labeled attacks for training and learning In security detection is just the beginning….
  • 7. #RSAC 5 Levels of Data Science Maturity 7 •Known bad •Adaptive learning •Integrated scoring •Aggregate •Prioritize •Automate & Recommend •Basic feedback •Derived feedback •Learning from analyst actions •IoCs •Global learning •Policies Key message: Data science is a key methodology and technology, not a plug-in feature… •Limit •Block •User-support
  • 8. #RSAC Detection: The Holy Grail of Data Science…. 8 The data exists, and so also endless point solutions for detection The key to success is: Risk Known Bad Patterns Behavior Anomaly Entity Anomaly Compressive Risk Scoring Integrated Approach
  • 9. #RSAC Comprehensive Risk Score - Example Suspicious User Login Detection Multivariate Machine Learning algorithm to detect login impersonation Multiple inputs from multiple sources: Hostname, location, server, duration, auth, time of day, data tx/rx,…. Model output Risk score (combined measure of how risky the behavior is) Modeling concept: Known bad: blocked users, unrealistic ground-speed, authentication User anomaly: base line per feature and detect deviation from norm Peer group anomaly: Prior knowledge, new user, acceptable behavior changes
  • 10. #RSAC Integrating Different Approaches - Example Endpoint Malware Detection The market is highly fragmented with endless point solutions Each vendor/solution takes a different valid approach with pros and cons Combining them provides enhanced performance: Human Static analysis Dynamic analysis Community reputation 10
  • 11. #RSAC Augmented Investigation 11 The goal is not replace the analysts but augment them and simplify their work: Shortage of cybersecurity skills continues to grow Most of analysts’ time goes on selecting what alerts to investigate Attacks typically trigger multiple alerts throughout the different attack phases 70% of the procedures done by analysts are repeatable The Key to success: Prioritize Aggregate Automate & Recommendation 23% 25% 28% 46% 2013 2014 2015 2016 Shortage in CyberSecurity Skills (ESG, 2016)
  • 12. #RSAC Augmented Investigation - Example Top-down Hierarchical approach Pre-fetch all supporting data Risk scoring prioritization Aggregate across entities (user, devices, application, …) Moving from alerts to attack vectors Guide the analyst with recommendations 12
  • 13. #RSAC Continuous Learning 13 As in any learning “teachers” are beneficial – supervised learning Feeding back results to the learning engine When direct feedback is lacking it can be derived Learning from analyst behavior and actions
  • 14. #RSAC Leaning and Self-Improving Detection - Example Ongoing, automatic self-learning fraud detection model Risk Engine Case Mgmt Activity details Policy Mgr. Device Payee Authenticate Continue Step-up AuthenticationFeedback Feedback Challenge Out-of-band Others Knowledge 271937 Deny User Data Science based Risk Engine Account
  • 15. #RSAC Intelligence Sharing 15 Tiny part of the road from each Analytics Map + prediction + navigation instruction Waze. Outsmarting traffic, Together. Crowdsourced security intel’ Security map + predictions + mitigation instructions To date the industry state of the art sharing is around IoCs, next phase is to share, learn and crowdsource policies, procedures & mitigations
  • 17. #RSAC Response 17 Taking automatic actions based on insights: Limit access / Require additional input Risk based authentication Partial blocking Automatic blocking Guide the analyst through investigation Pre-fetch all required data Recommend next action
  • 18. #RSAC 5 Levels of Data Science Maturity 18 •Known bad •Adaptive learning •Integrated scoring •Aggregate •Prioritize •Automate & Recommend •Basic feedback •Derived feedback •Learning from analyst actions •IoCs •Global learning •Policies Key message: Data science is a key methodology and technology, not a plug-in feature… •Limit •Block •User-support
  • 19. #RSAC Survey: How DS-Mature Are Your Operations? (How many fields? (5), Overall score? (22 points) ) 19 Detection Augmented Investigation Continuous Learning Intelligence Sharing  Do you use advanced, adaptive, analytics for detection?  Can you bake into the analytics engines your human insights?  Do you have your various products integrated at the analytics level? Response  Can you combine multiple alerts into some attack description?  Do you have one integrated priority queue?  Do you utilize automatic enrichments, hints, guidance or recommendation to assist analysts?  Do you leverage analysts decision for operations improvement?  Do you have any level of automatic, self learning from feedback?  Do your overall operations improve based on your analysts work?  Do you utilize community data to improve operations?  Do your systems “learn” from data outside of your system?  Do you have a mechanism to improve human actions based on the community?  Do you use automatic response based on analytics?  Are any decisions or actions fed back to analysts as a results of the risk?
  • 20. #RSAC Building a Security Data Science Practice in House, Yes or No? 20 Applying Data Science requires joint effort between data scientists, security experts and the business owners To date hiring people with a data science background is hard, nevertheless with security domain knowledge From research to an operational process/product – long journey from the proof-of-signal to an operational system Data, Data, Data…. You don’t want data science… you actually want data science backed into your solution in an intuitive, easy to use manner Alignment from stakeholders Invest in staffing and diverse backgrounds Organization & operational breadth Collaborate / share Integrated home grown solution
  • 21. #RSAC Applying What You Have Learned Today 21 Take the survey and assess how advanced is your DS strategy Identify gaps, and in what area focus is needed Work up the DS stairs: Detection -> Investigation -> continuous learning -> Intl Sharing -> Automatic response (Risk based response) Data Science in house: Alignment cross-org Staff wisely Be prepared for a long (and expensive) journey Constantly strive to see how DS augments your analysts, and not try replace them!
  • 22. #RSAC Summary 22 Data Science has way more to offer than prevention & detection ... It can and should be used as a key methodology and technology spanning all processes in security operations…
  • 23. SESSION ID: #RSAC Dr. Alon Kaufman Data Science Transforming Security Operations STR-R02 Director of Data Science & Innovation, RSA [email protected]