180 likes | 190 Views
Explore the incident analysis with artificial intelligence at CEPS Brussels on 29 May 2018. Learn about the evolution of security technology, goals of security operations teams, and the challenges faced in cybersecurity today. Discover how artificial intelligence can bridge the gap between security analysts and technology. Dive into the role of AI in cognitive security and security analytics for faster response and improved threat management. Find out how Cybercriminals are collaborating and growing in sophistication, posing new challenges in the digital landscape.
E N D
AI and Cyber Security Friends or Foes? incident analysis with artificial intelligence CEPS Brussels 29 May 2018 Jonathan Sage Government and Regulatory Affairs, Cyber Security Policy lead, Europe May 2018
Evolution of security technology - three waves CLOUD, AI and ORCHESTRATION, COLLABORATION INTELLIGENCEandINTEGRATION LAYERED DEFENSES
Goals of a security operations team are core to business and important for compliance – for instance NIS and GDPR in the EU Protect critical systems & data Respond to incidents accurately and quickly Outthink cyber criminals
But the pressures today make them hard to keep up with Data Overload Unaddressed Threats Skills Shortage “ “ “ My workload is overwhelming and repetitive. I don’t know where to focus my time for the quickest response. There is so much information out there, it’s impossible to find what’s useful. “ “ “
Results of the Cognitive Security Study Accuracy gap Intelligence gap Speed gap #2 most challenging area today is optimizing accuracy alerts (too many false positives) #3 most challenging area due to insufficient resources is threat identification, monitoring and escalating potential incidents (61% selecting) #1 most challenging area due to insufficient resources is threat research (65% selecting) #3 highest cybersecurity challenge today is keeping current on new threats and vulnerabilities (40% selecting) The top cybersecurity challenge today and tomorrow is reducing average incident response and resolution time This is despite the fact that 80% said their incident response speed is much faster than two years ago Addressing gaps while managing cost and ROI pressures
A universe of security knowledge Dark to your defenses • Security events and alerts • Logs and configuration data • User and network activity • Threat and vulnerability feeds TraditionalSecurity Data Human Generated Knowledge • Research documents • Industry publications • Forensic information • Threat intelligence commentary • Conference presentations • Analyst reports • Webpages • Wikis • Blogs • News sources • Newsletters • Tweets
What role does Artificial intelligence play? Bridging this gap / new partnership between security analysts and their technology Human Expertise • Common sense • Morals • Compassion • Abstraction • Dilemmas • Generalization AI: Cognitive Security Security Analytics • Unstructured analysis • Natural language • Question and answer • Machine learning • Bias elimination • Tradeoff analytics • Data correlation • Pattern identification • Anomaly detection • Prioritization • Data visualization • Workflow UNDERSTAND | REASON | LEARN
How it works – Building the knowledge with QRadar Watson Advisor 5 Minutes 1 Hour 1-3 Day StructuredSecurity Data Crawl of CriticalUnstructured Security Data Massive Crawl of all SecurityRelated Data on Web 5-10 updates / hour! 100K updates / week! X-Force Exchange Trusted partner data Open source Paid data Blogs Websites News, … Breach replies Attack write-ups Best practices Billions ofData Elements Millions of Documents - New actors - Campaigns - Malware outbreaks - Indicators, … - Course of action - Actors - Trends - Indicators, … - Indicators - Vulnerabilities - Malware names, … Filtering + Machine LearningRemoves Unnecessary Information 3:1 Reduction Machine Learning / Natural Language ProcessingExtracts and Annotates Collected Data Billions of Nodes / Edges Massive Security Knowledge Graph
QRadar Advisor for Watson enables Accelerated Analysis Intelligent Investigation Faster Response • Uses AI to analyze real-time incidents for triage • Gathers external and internal threat indicators from alert • Performs external (threat intelligence research) and internal research on indicators and entities (hash, domain, IP, users, filename etc.) • Highlights the existence and identity of threat or outliers • Offers natural language search • Identifies if communication with threat has occurred or was blocked • Highlights if malware has executed • Identifies criticality of systems impacted in • Gives visibility to higher priority risks and threats from insiders • Connects other threat entities from original offense to show relationship • Provides input for ad-hoc investigation • Provides pertinent information to escalate • Automatic hunting for indicators • Exports threat and indicators to IR process for remediation and/or blocking • Automatically adds additional discovered threat indicators to watch lists to reduce risk of missing threats
Cybercriminals becoming increasingly sophisticated and collaborative • . • Crime rings collaborate in the dark web - sharing techniques, launching attacks through popular social media, email, etc. • Level of organization and productivity that would be the envy of most businesses – offering customer support and money-back guarantees if their tools don't result in successful hack • Stay a step ahead of the attackers, which is why IBM has white hat security researchers trolling the dark web every day to monitor latest on cyberattack strategies
Friend or Foe? • It is an arms race, and some are more advanced than others. • Technology is the battlefield and we have to recognize the well-equipped adversary we are fighting against. • Proof point: IBM's Security Services teams monitor billions of events across the globe and last year, more than 2.9 bn records were reported breached • Protecting citizens, consumers and employees is a proactive/ongoing journey. • Governments and industry can never rest on their laurels.
How it works – Cognitive applied for cybersecurity Ingest mass amounts of data Classify, select, and normalize data Natural language processing for security context Training and learning with feedback Relational analysis visualized through knowledge graphs
Friend or Foe? • Both
How it works – Use cases further defined Utilize locally gathered and Watson external threat intelligence to gain broader context within your investigations Understand and quickly assess threats to know if they bypassedyour layered defenses or if they were stopped dead in their tracks Realize reach of threats and its effects on other users and systemsin your ecosystem Identify users and critical assets when they involved in an incident and quickly pivot to gain details on user behavior activity and asset metadata Understand malware and ransomware sources, delivery methods and related components to help quickly determine your impact and next courses of action
Resources • Knowledge Center – latest with what’s new, support, etc. Upcoming Events – webinars, local events, etc. • Links to Short How-to Videos: • QRadar Watson Advisor Trial Request, Download, and Installation • QRadar Watson Advisor Configuration • QRadar Watson Advisor Incident Overview and Analysis • Links to informational and demo videos: • Taking SIEM Cognitive In 3 minutes (Jose Bravo and Chris Hankins) • Poison Ivy Malware Video • Suspicious Activity (CozyDuke) Video • Link to Self-Help Support Forum • AppExchange • On-demand webinar – Rock your SOC (Security Operations Center) with Watson for Cyber Security • Solution brief
Contacts OFFERING MANAGEMENT SALES & TECHNICAL SALES Jim Gottardi(Jim.Gottardi@us.ibm.com) Worldwide Client Success – Security Intelligence SaaS Lead Uwe Hofmann (uwe.hofmann@de.ibm.com) Worldwide Tech Lead – Security Intelligence Carma Austin (caaustin@us.ibm.com) NA Program Lead – Cognitive Security Adam Lyons (adamlyon@us.ibm.com) NA Sales Leader – Cognitive Security Gerd Rademann(gerd.rademann@de.ibm.com) Europe Program Lead – Cognitive Security Chris Hankins (cmhankins@us.ibm.com) Offering Manager – Cognitive Security