SlideShare a Scribd company logo
Gianluca Gaias
Security, Risk & Compliance Director
YOOX NET-A-PORTER Group
Giovanni Curatola
Building an Enterprise-grade Security
Intelligence Platform at YOOX NET-A-PORTER
Group
(Gain the Big Picture)
Personal introduction
Gianluca Gaias, YOOX NET-A-PORTER Group
Security, Risk & Compliance Director
YOOX NET-A-PORTER Group is the global Internet retailing partner
for leading fashion and luxury brands
2
Key Takeaways
From a technology oriented approach to an info-centric approach.
From log correlation to pattern recognition.
From a passive/display platform to a proactive/executive platform.
From standard dashboards to real-time dynamic dashboards.
From a security event to an context-aware security information.
3
Agenda
4
Yoox Group: business and challenges.
Security evolution overview
From Tech Oriented approach to Information Oriented approach
– Deep Investigation
– Proactive Dashboard: IP Blacklist
– Real-time Dynamic Dashboard: Attack Map
Risk Management and Pattern Recognition
– Use Case: Attackers Activity
Reconsidering dashboard design
Next Steps
YOOX NET-A-PORTER GROUP
Over 180 countries served
DCs
US, UK, Italy, China, Hong Kong, Japan
Customer care covering all time zones
Local Offices:
New York, London, Milan, Bologna, Paris,
Hong Kong, Shanghai, Tokyo
Same-Day Delivery in London, Manhattan, Connecticut
and Hong Kong
Digital production facilities
US, UK, Italy, China, Hong Kong, Japan
Butler service and authenticity RFid seal
1 order processed every 4 seconds 1.7 billion revenues
27.1 million active customers
PRO-FORMA 2015 FY
7.1 million orders
27.1 million active customers
Rest of Europe
48.8%
 Global premier online luxury
fashion destination for content
and commerce for the season’s
must-have womenswear
collections
 Unparalleled editorial content,
including its weekly online
magazine THE EDIT and bi-
monthly print magazine PORTER
 Global destination for men’s style
with unparalleled offering from
the season of the leading
menswear, watchmakers and
specialist grooming brands
 Rich editorial content through the
weekly online magazine The
Journal and bi-monthly
newspaper The MR PORTER Post
MULTI-BRAND IN-SEASON MULTI-BRAND OFF-SEASON
Rest of Europe
48.8% The world’s leading online
lifestyle store for fashion, design
and art
 Broad offering of off-season
premium apparel and accessories,
exclusive collections, home &
design and artworks
 The online destination for women
dedicated entirely to in-season
high-end shoes
 Exclusive shoe-related services
and editorial component
Rest of Europe
48.8%
 Go-to destination for previous-
season designer fashion for the
global style-conscious woman
looking for the best designer
products at great prices
 In-house label of styling
essentials “Iris and Ink”
 The luxury online boutique
devoted to creating distinctive
style through an eclectic and
selective in-season assortment of
high fashion and directional
designers for men and women
 Dedicated mini-stores
ONLINE FLAGSHIP STORES
 Official Online Flagship Stores of leading fashion and
luxury brands for which YNAP is the exclusive partner
 Long-term partnerships
and many more …
JVCo with Kering
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
.com
 Proprietary business where YNAP operates as an
e-tailer for the season’s luxury fashion collections under
its four own brand names
 Proprietary business where YNAP operates as an
e-tailer mainly for the previous-season designer fashion
under its two own brand names
“Powered by YOOX NET-A-PORTER GROUP”
YOOX NET-A-PORTER Group: Challenges
7
Keep the trust
– Data Confidentiality
– Data Integrity and Completeness
– Data Processing Transparency
High Availability in hostile enviroment
Gain the big picture:
– Challenge and Enabler
 Shareholders
 Customers
 Stakeholders
Security Evolution Overview
8
0
1
2
3
4
5
6
7
8
9
Data Leakage Prevention
Information Security
Compliance
IPS & Anomaly Detection
Administrative Access
Control
PCI-DSS Compliance
Sites Vulnerability Checks
Code Review
Logical Access
Governance
Security Intelligence
Platform
Online Brand Protection
Privacy Compliance
Information Process
Analysis
2011 2013 2015
Security Evolution – Tech vs Info
Technology Oriented:
– Info confined to technology
– Partial identity definition
– No covered gaps
Information Oriented - Splunk:
– Enrichement of tech logs
– Event correlation
– Clear identity definition
9
From Tech to Info
“From a technology oriented approach to an info-centric approach.”
1
Investigation
1
Investigation: show details
1
Advanced Dashboard: IP Blacklist
• Proactive Dashboard
• One-click blacklist on
Akamai WAF through
Akamai API calls
• Splunk is able to run
a command on input
source
Drilldown
«From a passive/display platform to a
proactive/executive platform»
WAF activity rapresentation: standard dashboard
• Statistical evidences by:
– Source IP
– Attack type
– WAF Action
• Event distribution over the time
• Spike visibility depends from the scale
• Is not evident:
– Attack frequency
– Relation between Source IP, Attack type and
WAF action
Pros Cons
“From standard dashboards to real-time dynamic dashboards”
Real-time Dynamic Dashboard: Attack Map
Security Evolution – Risk Mgmt & Pattern Rec.
Risk Management:
– Correlation of Tech Elements and Business Elements
– Support to quantitative risk analysis
– Assigning Risk value to alerts
Pattern Recognition:
– Different levels of correlation
– Pattern as result of several high-level events from different systems by identity
– Knowledge from historical incidents and analysts experience
– Goal: detect user behavior and recurrent attack patterns
Pattern Recognition
Single security events may be part of a more complex action.
Correlation
Brute Force
Exce. Out Data
High Conn.
Correlation
Level 1
Correlation
Level 2
Correlation
Level n
Data Exfiltration
«From log correlation to pattern recognition»
Sequence
Introduced by high level analyst
Pattern Consolidation
Analyst
Risk Management
“From a security event to
an context-aware security
information”
Risk
Static
Assign.
(Lookup)
N level
correlation
Content
Eval
Usually single security event has a static risk
We need risk value based on content and other events correlated.
Use Case: Attackers Activity
Detect sequence of relevant event by identity
Activity Score: vertical axes, max of the same alert type
Activity Frequency: ball diameter
Pattern Recognition
Risk Value
Reconsidering dashboard design
Native Log Collection
Splunk Log Collection
Standard Dashboards
Advanced
Dashboards
Pattern
Recognition
Splunk
Engineers
NOC
SOC
Security Analyst
Head of Security
Knowledge
Data Meaning
The Big Picture
Key Takeaways
From a technology oriented approach to an info-centric approach.
From log correlation to pattern recognition.
From a passive/display platform to a proactive/executive platform.
From standard dashboards to real-time dynamic dashboards.
From a security event to an context-aware security information.
Questions?
Grazie

More Related Content

PPTX
SplunkLive! Milano 2016 - customer presentation - Saipem
Splunk
 
PPTX
SplunkLive! Milano 2016 - customer presentation - Unicredit
Splunk
 
PPTX
Enterprise Sec + User Bahavior Analytics
Splunk
 
PDF
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
Anton Goncharov
 
PPTX
Swascan Cyber Security Testing Platform
Pierguido Iezzi
 
PPTX
Brochure SWASCAN-ENG On Premise
SWASCAN
 
PPTX
Swascan brochure-eng
SWASCAN
 
PPTX
IBM QRadar Xforce
sreenivas1591
 
SplunkLive! Milano 2016 - customer presentation - Saipem
Splunk
 
SplunkLive! Milano 2016 - customer presentation - Unicredit
Splunk
 
Enterprise Sec + User Bahavior Analytics
Splunk
 
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
Anton Goncharov
 
Swascan Cyber Security Testing Platform
Pierguido Iezzi
 
Brochure SWASCAN-ENG On Premise
SWASCAN
 
Swascan brochure-eng
SWASCAN
 
IBM QRadar Xforce
sreenivas1591
 

What's hot (20)

PDF
Splunk for Security
Gabrielle Knowles
 
PPTX
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk
 
PPTX
Information Security: Advanced SIEM Techniques
ReliaQuest
 
PPTX
Gov & Education Day 2015 - User Behavior Analytics
Splunk
 
PPSX
HP ArcSight
Mohamed Zohair
 
PPTX
Hp arcsight services 2014 ewb
rty_ngtglobal
 
PPTX
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
OWASP Russia
 
PPTX
Splunk for Security: Background & Customer Case Study
Andrew Gerber
 
PPTX
Security Information and Event Management (SIEM)
k33a
 
PPTX
SIEM Primer:
Anton Chuvakin
 
PDF
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Imperva
 
PDF
ExpertsLiveNL - Post Breach Security with ATA or ATP
Tim De Keukelaere
 
PDF
LogSentinel Next-Gen SIEM
Denitsa Dimova
 
PDF
Cloud Breach – Preparation and Response
Priyanka Aash
 
PPTX
Softcat Splunk Discovery Day Manchester, March 2017
Splunk
 
PPTX
SplunkLive! Utrecht - Splunk for Security - Monzy Merza
Splunk
 
PPTX
QRadar, ArcSight and Splunk
M sharifi
 
PPTX
Splunk Enterprise Security
Splunk
 
PPTX
Big Data Security with HP ArcSight
Sridhar Karnam
 
PDF
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Erin Sweeney
 
Splunk for Security
Gabrielle Knowles
 
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk
 
Information Security: Advanced SIEM Techniques
ReliaQuest
 
Gov & Education Day 2015 - User Behavior Analytics
Splunk
 
HP ArcSight
Mohamed Zohair
 
Hp arcsight services 2014 ewb
rty_ngtglobal
 
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
OWASP Russia
 
Splunk for Security: Background & Customer Case Study
Andrew Gerber
 
Security Information and Event Management (SIEM)
k33a
 
SIEM Primer:
Anton Chuvakin
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Imperva
 
ExpertsLiveNL - Post Breach Security with ATA or ATP
Tim De Keukelaere
 
LogSentinel Next-Gen SIEM
Denitsa Dimova
 
Cloud Breach – Preparation and Response
Priyanka Aash
 
Softcat Splunk Discovery Day Manchester, March 2017
Splunk
 
SplunkLive! Utrecht - Splunk for Security - Monzy Merza
Splunk
 
QRadar, ArcSight and Splunk
M sharifi
 
Splunk Enterprise Security
Splunk
 
Big Data Security with HP ArcSight
Sridhar Karnam
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Erin Sweeney
 
Ad

Similar to SplunkLive! Milano 2016 - customer presentation - Yoox - Net a porter (20)

PDF
Splunk in Yoox: Security and Compliance
Timur Bagirov
 
PPTX
Social Media in a Corporate Context 2010 - Leesa Fogarty, Augure
Communicate Magazine
 
PPTX
SMICC Manchester
Leesa Fogarty
 
PPTX
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Nordic APIs
 
PPTX
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
SurfWatch Labs
 
PDF
Scalar Security Roadshow April 2015
Scalar Decisions
 
PPT
Quividi in retail
Lazar Demisulam (@lazardemisulam)
 
PDF
Maximizing the Value of Event-Driven Architecture.pdf
apidays
 
PDF
2022 apidays LIVE Helsinki & North_Event API Products – Maximizing the Value ...
apidays
 
PDF
Monitoring and Analysis of Web Information for Various Business Contexts : Co...
Dr. Haxel Consult
 
PDF
Smau Milano 2015 - Cisco
SMAU
 
PDF
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j
 
PDF
Avira - NOAH17 Berlin
NOAH Advisors
 
PDF
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
apidays
 
PPTX
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
WhiteSource
 
PPTX
Using Threat Intelligence to Address Your Growing Digital Risk
SurfWatch Labs
 
PDF
Investing.com - NOAH17 Berlin
NOAH Advisors
 
PPTX
Malware Analysis
Ramin Farajpour Cami
 
PDF
Applications of Network Theory in Finance
Kimmo Soramaki
 
PPTX
Enterprise under attack dealing with security threats and compliance
SPAN Infotech (India) Pvt Ltd
 
Splunk in Yoox: Security and Compliance
Timur Bagirov
 
Social Media in a Corporate Context 2010 - Leesa Fogarty, Augure
Communicate Magazine
 
SMICC Manchester
Leesa Fogarty
 
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Nordic APIs
 
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
SurfWatch Labs
 
Scalar Security Roadshow April 2015
Scalar Decisions
 
Maximizing the Value of Event-Driven Architecture.pdf
apidays
 
2022 apidays LIVE Helsinki & North_Event API Products – Maximizing the Value ...
apidays
 
Monitoring and Analysis of Web Information for Various Business Contexts : Co...
Dr. Haxel Consult
 
Smau Milano 2015 - Cisco
SMAU
 
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j
 
Avira - NOAH17 Berlin
NOAH Advisors
 
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
apidays
 
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
WhiteSource
 
Using Threat Intelligence to Address Your Growing Digital Risk
SurfWatch Labs
 
Investing.com - NOAH17 Berlin
NOAH Advisors
 
Malware Analysis
Ramin Farajpour Cami
 
Applications of Network Theory in Finance
Kimmo Soramaki
 
Enterprise under attack dealing with security threats and compliance
SPAN Infotech (India) Pvt Ltd
 
Ad

More from Splunk (20)

PDF
Splunk Leadership Forum Wien - 20.05.2025
Splunk
 
PDF
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
PDF
Building Resilience with Energy Management for the Public Sector
Splunk
 
PDF
IT-Lagebild: Observability for Resilience (SVA)
Splunk
 
PDF
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Splunk
 
PDF
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Splunk
 
PDF
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Splunk
 
PDF
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Splunk
 
PDF
Security - Mit Sicherheit zum Erfolg (Telekom)
Splunk
 
PDF
One Cisco - Splunk Public Sector Summit Germany April 2025
Splunk
 
PDF
.conf Go 2023 - Data analysis as a routine
Splunk
 
PDF
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
Splunk
 
PDF
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
Splunk
 
PDF
.conf Go 2023 - Raiffeisen Bank International
Splunk
 
PDF
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
Splunk
 
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
Splunk
 
PDF
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
Splunk
 
PDF
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
Splunk
 
PDF
.conf go 2023 - De NOC a CSIRT (Cellnex)
Splunk
 
PDF
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk
 
Splunk Leadership Forum Wien - 20.05.2025
Splunk
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Building Resilience with Energy Management for the Public Sector
Splunk
 
IT-Lagebild: Observability for Resilience (SVA)
Splunk
 
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Splunk
 
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Splunk
 
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Splunk
 
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Splunk
 
Security - Mit Sicherheit zum Erfolg (Telekom)
Splunk
 
One Cisco - Splunk Public Sector Summit Germany April 2025
Splunk
 
.conf Go 2023 - Data analysis as a routine
Splunk
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
Splunk
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
Splunk
 
.conf Go 2023 - Raiffeisen Bank International
Splunk
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
Splunk
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
Splunk
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
Splunk
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
Splunk
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
Splunk
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk
 

Recently uploaded (20)

PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Software Development Methodologies in 2025
KodekX
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
The Future of Artificial Intelligence (AI)
Mukul
 

SplunkLive! Milano 2016 - customer presentation - Yoox - Net a porter

  • 1. Gianluca Gaias Security, Risk & Compliance Director YOOX NET-A-PORTER Group Giovanni Curatola Building an Enterprise-grade Security Intelligence Platform at YOOX NET-A-PORTER Group (Gain the Big Picture)
  • 2. Personal introduction Gianluca Gaias, YOOX NET-A-PORTER Group Security, Risk & Compliance Director YOOX NET-A-PORTER Group is the global Internet retailing partner for leading fashion and luxury brands 2
  • 3. Key Takeaways From a technology oriented approach to an info-centric approach. From log correlation to pattern recognition. From a passive/display platform to a proactive/executive platform. From standard dashboards to real-time dynamic dashboards. From a security event to an context-aware security information. 3
  • 4. Agenda 4 Yoox Group: business and challenges. Security evolution overview From Tech Oriented approach to Information Oriented approach – Deep Investigation – Proactive Dashboard: IP Blacklist – Real-time Dynamic Dashboard: Attack Map Risk Management and Pattern Recognition – Use Case: Attackers Activity Reconsidering dashboard design Next Steps
  • 5. YOOX NET-A-PORTER GROUP Over 180 countries served DCs US, UK, Italy, China, Hong Kong, Japan Customer care covering all time zones Local Offices: New York, London, Milan, Bologna, Paris, Hong Kong, Shanghai, Tokyo Same-Day Delivery in London, Manhattan, Connecticut and Hong Kong Digital production facilities US, UK, Italy, China, Hong Kong, Japan Butler service and authenticity RFid seal 1 order processed every 4 seconds 1.7 billion revenues 27.1 million active customers PRO-FORMA 2015 FY 7.1 million orders 27.1 million active customers
  • 6. Rest of Europe 48.8%  Global premier online luxury fashion destination for content and commerce for the season’s must-have womenswear collections  Unparalleled editorial content, including its weekly online magazine THE EDIT and bi- monthly print magazine PORTER  Global destination for men’s style with unparalleled offering from the season of the leading menswear, watchmakers and specialist grooming brands  Rich editorial content through the weekly online magazine The Journal and bi-monthly newspaper The MR PORTER Post MULTI-BRAND IN-SEASON MULTI-BRAND OFF-SEASON Rest of Europe 48.8% The world’s leading online lifestyle store for fashion, design and art  Broad offering of off-season premium apparel and accessories, exclusive collections, home & design and artworks  The online destination for women dedicated entirely to in-season high-end shoes  Exclusive shoe-related services and editorial component Rest of Europe 48.8%  Go-to destination for previous- season designer fashion for the global style-conscious woman looking for the best designer products at great prices  In-house label of styling essentials “Iris and Ink”  The luxury online boutique devoted to creating distinctive style through an eclectic and selective in-season assortment of high fashion and directional designers for men and women  Dedicated mini-stores ONLINE FLAGSHIP STORES  Official Online Flagship Stores of leading fashion and luxury brands for which YNAP is the exclusive partner  Long-term partnerships and many more … JVCo with Kering .com .com .com .com .com .com .com .com .com .com .com .com .com .com .com .com .com .com  Proprietary business where YNAP operates as an e-tailer for the season’s luxury fashion collections under its four own brand names  Proprietary business where YNAP operates as an e-tailer mainly for the previous-season designer fashion under its two own brand names “Powered by YOOX NET-A-PORTER GROUP”
  • 7. YOOX NET-A-PORTER Group: Challenges 7 Keep the trust – Data Confidentiality – Data Integrity and Completeness – Data Processing Transparency High Availability in hostile enviroment Gain the big picture: – Challenge and Enabler  Shareholders  Customers  Stakeholders
  • 8. Security Evolution Overview 8 0 1 2 3 4 5 6 7 8 9 Data Leakage Prevention Information Security Compliance IPS & Anomaly Detection Administrative Access Control PCI-DSS Compliance Sites Vulnerability Checks Code Review Logical Access Governance Security Intelligence Platform Online Brand Protection Privacy Compliance Information Process Analysis 2011 2013 2015
  • 9. Security Evolution – Tech vs Info Technology Oriented: – Info confined to technology – Partial identity definition – No covered gaps Information Oriented - Splunk: – Enrichement of tech logs – Event correlation – Clear identity definition 9
  • 10. From Tech to Info “From a technology oriented approach to an info-centric approach.” 1
  • 13. Advanced Dashboard: IP Blacklist • Proactive Dashboard • One-click blacklist on Akamai WAF through Akamai API calls • Splunk is able to run a command on input source Drilldown «From a passive/display platform to a proactive/executive platform»
  • 14. WAF activity rapresentation: standard dashboard • Statistical evidences by: – Source IP – Attack type – WAF Action • Event distribution over the time • Spike visibility depends from the scale • Is not evident: – Attack frequency – Relation between Source IP, Attack type and WAF action Pros Cons
  • 15. “From standard dashboards to real-time dynamic dashboards” Real-time Dynamic Dashboard: Attack Map
  • 16. Security Evolution – Risk Mgmt & Pattern Rec. Risk Management: – Correlation of Tech Elements and Business Elements – Support to quantitative risk analysis – Assigning Risk value to alerts Pattern Recognition: – Different levels of correlation – Pattern as result of several high-level events from different systems by identity – Knowledge from historical incidents and analysts experience – Goal: detect user behavior and recurrent attack patterns
  • 17. Pattern Recognition Single security events may be part of a more complex action. Correlation Brute Force Exce. Out Data High Conn. Correlation Level 1 Correlation Level 2 Correlation Level n Data Exfiltration «From log correlation to pattern recognition» Sequence Introduced by high level analyst Pattern Consolidation Analyst
  • 18. Risk Management “From a security event to an context-aware security information” Risk Static Assign. (Lookup) N level correlation Content Eval Usually single security event has a static risk We need risk value based on content and other events correlated.
  • 19. Use Case: Attackers Activity Detect sequence of relevant event by identity Activity Score: vertical axes, max of the same alert type Activity Frequency: ball diameter Pattern Recognition Risk Value
  • 20. Reconsidering dashboard design Native Log Collection Splunk Log Collection Standard Dashboards Advanced Dashboards Pattern Recognition Splunk Engineers NOC SOC Security Analyst Head of Security Knowledge Data Meaning The Big Picture
  • 21. Key Takeaways From a technology oriented approach to an info-centric approach. From log correlation to pattern recognition. From a passive/display platform to a proactive/executive platform. From standard dashboards to real-time dynamic dashboards. From a security event to an context-aware security information.