Beruflich Dokumente
Kultur Dokumente
2
© Next Peak Holdings, LLC 2020
Increasing Security Operations Challenges
On-going technological changes, accelerated by remote work
Security devices
3
© Next Peak Holdings, LLC 2020
Security Data Discipline Overview
Data Sources
Syslog
5
© Next Peak Holdings, LLC 2020
How Security Data Discipline Can Help
• Filter events and parse unnecessary and useless
Reduce data volume fields, while retaining high quality data
through filtering • Reduces overall number of events and size of
events, reducing storage costs
• Decrease time and switching costs of new tech Reduce data storage costs
Makes new tech adoption, increase security
adoption easier • Data discipline creates a consistent vendor
neutral pipeline and uniform source on-boarding
6
© Next Peak Holdings, LLC 2020
Implementation and Findings
15%
Data reduction with no
lost information, meaning
no tradeoffs
40-60%
Possible data reduction
with minor tradeoffs
~$1 MM
Cost reduction per
petabyte of data
Disciplining data saves costs and analyst time, processed annually
8
© Next Peak Holdings, LLC 2020
Where we are today
Approach developed as part of Completed pilot project with Build an open source
Columbia University’s partner MSSP: community effort to develop
CyberNYC Investors to concept further
Founders Program • Successfully completed
proof-of-concept and • Looking to partner with
implementation plan security operations centers,
• Collected tangible data on MSSPs & security device
Partnered with technology efficiencies created providers
providers for proof-of-concepts • Conducting post-mortem
and creating final Build data sources into MITRE
assessment ATT@CK framework with
community
Initiating second wave of
analysis on standard Window
Active Directory and logs
9
© Next Peak Holdings, LLC 2020
Questions?
greg.rattray@nextpeak.net