© 2018 SPLUNK INC.© 2018 SPLUNK INC.
A Day in the Life
of a Breach
Greg Wiley
April 2018
Name
Title
© 2018 SPLUNK INC.
▶ The information in this presentation was compiled from sources
believed to be reliable for informational and discussion
purposes only.
▶ The information contained herein is not intended to constitute
legal advice. You should consult with your own legal teams
when developing programs and policies. You should not take, or
refrain from taking, action based on its content. We do not
guarantee the accuracy of this information and assume no
liability in connection with therewith.
Legal Disclaimer
© 2018 SPLUNK INC.
What is
the GDPR?
A Day
in the Life
of a
GDPR
Breach
Why Splunk?
& further
resources
Agenda
© 2017 SPLUNK INC.
Remember
this?
© 2017 SPLUNK INC.
Anyone been
getting these?
© 2018 SPLUNK INC.
GDPR Timelines
▶ The regulation is binding across all EU members states
January, 2012
Commissioner Proposed
reform to Data Protection
regulation
May, 2018
Effective Data Protection
Framework comes into
force (25th May, 2018)
April, 2016
EU Council adopted new
regulation
December, 2015
EU agreement on
regulation
including the UK after Brexit
You Are
Here!
© 2018 SPLUNK INC.
Key Features of GDPR
Applicable to any company doing business in the European Union
European Data
Protection
Harmonization
Fines up to
€20m or 4%
of turnover
Mandatory
Privacy Impact
Assessments
Privacy by
Design &
Default
72 Hour
Breach
Notification
Mandatory
Data Erasure
& Portability
Consent for
Personal Data
Profiling
© 2018 SPLUNK INC.
A Day in the Life
of a Breach
© 2017 SPLUNK INC.
Imagine
you are
responsible
for your
organisation’s
security
© 2017 SPLUNK INC.
Imagine today
is
May
© 2017 SPLUNK INC.
What if…
May
© 2017 SPLUNK INC.
…it’s The Day
After
Tomorrow
© 2017 SPLUNK INC.
…and you’re
rudely woken
early in the
morning
© 2017 SPLUNK INC.
Your friendly
Data Privacy
Officer is on
the phone
Blah, blah
blah
BREACH
© 2017 SPLUNK INC.
Someone is
selling
personal data
you hold
© 2017 SPLUNK INC.
How does the DPO
know?
Your Threat
Intelligence
provider
informed you
and provided
you samples
© 2017 SPLUNK INC.
There is data in the
deep web
It may be your
data!
© 2017 SPLUNK INC.
She hangs up!
Now what?
© 2017 SPLUNK INC.
Your incident
investigation
plan kicks in
© 2017 SPLUNK INC.
DPO
IT
PR/Media Team
Legal
(CEO)
Coordination
© 2017 SPLUNK INC.
Emergency
call
Emergency
chatroom
© 2017 SPLUNK INC.
In case of fire
press here
© 2017 SPLUNK INC.
72
hours
© 2017 SPLUNK INC.
Internal Leak
External Leak
Incident
commander
© 2017 SPLUNK INC.
“We need to
investigate!!!”
Reaching out
to your
security
operations
team
© 2017 SPLUNK INC.
People and
Processes
© 2017 SPLUNK INC.
Where is that
data stored in
your
environment?
© 2017 SPLUNK INC.
First Action
Is data still
leaking?
© 2017 SPLUNK INC.
How will you
monitor them?
© 2017 SPLUNK INC.
Nice,
structured,
tidy data?
© 2017 SPLUNK INC.
Diving deep into
the infrastructure
© 2017 SPLUNK INC.
time series, in motion,
unstructured
Machine data
32
© 2018 SPLUNK INC.
Aug 08 06:09:13 acmesep01.acmetech.com Aug 09 06:17:24 SymantecServer acmesep01: Virus found,Computer
name: ACME-002,Source: Real Time Scan,Risk name: Hackertool.rootkit,Occurrences: 1,C:/Documents and
Settings/smithe/Local Settings/Temp/evil.tmp,"""",Actual action: Quarantined,Requested action: Cleaned, time:
2009-01-23 03:19:12,Inserted: 2009-01-23 03:20:12,End: 2009-01-23 03:19:12,Domain: Default,Group: My
CompanyACME Remote,Server: acmesep01,User: smithe,Source computer: ,Source IP: 10.11.36.20
Aug 08 08:26:54 snort.acmetech.com {TCP} 10.11.36.20:5072 -> 10.11.36.26:443 itsec snort[18774]:
[1:100000:3] [Classification: Potential Corporate Privacy Violation] Credit Card Number Detected in Clear Text
[Priority: 2]:
20130806041221.000000Caption=ACME-2975EBAdministrator Description=Built-in account for administering the
computer/domainDomain=ACME-2975EB InstallDate=NULLLocalAccount = IP: 10.11.36.20
TrueName=Administrator SID =S-1-5-21-1715567821-926492609-725345543 500SIDType=1
Status=Degradedwmi_ type=UserAccounts
All three occurring within a 24-hour period
Example Correlation – Data Loss
What Does Machine Data Look Like?
© 2018 SPLUNK INC.
Aug 08 06:09:13 acmesep01.acmetech.com Aug 09 06:17:24 SymantecServer acmesep01: Virus found,Computer
name: ACME-002,Source: Real Time Scan,Risk name: Hackertool.rootkit,Occurrences: 1,C:/Documents and
Settings/smithe/Local Settings/Temp/evil.tmp,"""",Actual action: Quarantined,Requested action: Cleaned, time:
2009-01-23 03:19:12,Inserted: 2009-01-23 03:20:12,End: 2009-01-23 03:19:12,Domain: Default,Group: My
CompanyACME Remote,Server: acmesep01,User: smithe,Source computer: ,Source IP: 10.11.36.20
Aug 08 08:26:54 snort.acmetech.com {TCP} 10.11.36.20:5072 -> 10.11.36.26:443 itsec snort[18774]:
[1:100000:3] [Classification: Potential Corporate Privacy Violation] Credit Card Number Detected in Clear Text
[Priority: 2]:
20130806041221.000000Caption=ACME-2975EBAdministrator Description=Built-in account for administering the
computer/domainDomain=ACME-2975EB InstallDate=NULLLocalAccount = IP: 10.11.36.20
TrueName=Administrator SID =S-1-5-21-1715567821-926492609-725345543 500SIDType=1
Status=Degradedwmi_ type=UserAccounts
Sources
All three occurring within a 24-hour period
Example Correlation – Data Loss
Windows
Authentication
Time Range
Intrusion
Detection
Endpoint
Security
What Does Machine Data Look Like?
© 2018 SPLUNK INC.
Aug 08 06:09:13 acmesep01.acmetech.com Aug 09 06:17:24 SymantecServer acmesep01: Virus found,Computer
name: ACME-002,Source: Real Time Scan,Risk name: Hackertool.rootkit,Occurrences: 1,C:/Documents and
Settings/smithe/Local Settings/Temp/evil.tmp,"""",Actual action: Quarantined,Requested action: Cleaned, time:
2009-01-23 03:19:12,Inserted: 2009-01-23 03:20:12,End: 2009-01-23 03:19:12,Domain: Default,Group: My
CompanyACME Remote,Server: acmesep01,User: smithe,Source computer: ,Source IP: 10.11.36.20
Aug 08 08:26:54 snort.acmetech.com {TCP} 10.11.36.20:5072 -> 10.11.36.26:443 itsec snort[18774]:
[1:100000:3] [Classification: Potential Corporate Privacy Violation] Credit Card Number Detected in Clear Text
[Priority: 2]:
20130806041221.000000Caption=ACME-2975EBAdministrator Description=Built-in account for administering the
computer/domainDomain=ACME-2975EB InstallDate=NULLLocalAccount = IP: 10.11.36.20
TrueName=Administrator SID =S-1-5-21-1715567821-926492609-725345543 500SIDType=1
Status=Degradedwmi_ type=UserAccounts
Sources
All three occurring within a 24-hour period
Example Correlation – Data Loss
Source IP
Source IP
Source IP
Data Loss
Default Admin Account
Malware Found
Windows
Authentication
Time Range
Intrusion
Detection
Endpoint
Security
What Does Machine Data Look Like?
© 2018 SPLUNK INC.
Aug 08 06:09:13 acmesep01.acmetech.com Aug 09 06:17:24 SymantecServer acmesep01: Virus found,Computer
name: ACME-002,Source: Real Time Scan,Risk name: Hackertool.rootkit,Occurrences: 1,C:/Documents and
Settings/smithe/Local Settings/Temp/evil.tmp,"""",Actual action: Quarantined,Requested action: Cleaned, time:
2009-01-23 03:19:12,Inserted: 2009-01-23 03:20:12,End: 2009-01-23 03:19:12,Domain: Default,Group: My
CompanyACME Remote,Server: acmesep01,User: smithe,Source computer: ,Source IP: 10.11.36.20
Aug 08 08:26:54 snort.acmetech.com {TCP} 10.11.36.20:5072 -> 10.11.36.26:443 itsec snort[18774]:
[1:100000:3] [Classification: Potential Corporate Privacy Violation] Credit Card Number Detected in Clear Text
[Priority: 2]:
20130806041221.000000Caption=ACME-2975EBAdministrator Description=Built-in account for administering the
computer/domainDomain=ACME-2975EB InstallDate=NULLLocalAccount = IP: 10.11.36.20
TrueName=Administrator SID =S-1-5-21-1715567821-926492609-725345543 500SIDType=1
Status=Degradedwmi_ type=UserAccounts
Sources
All three occurring within a 24-hour period
Example Correlation – Data Loss
Source IP
Source IP
Source IP
Data Loss
Default Admin Account
Malware Found
Windows
Authentication
Time Range
Intrusion
Detection
Endpoint
Security
What Does Machine Data Look Like?
© 2017 SPLUNK INC.
It’s big data…
© 2017 SPLUNK INC.
Worst Case
External
authorities
might come in
to your
organization
and say:
“Don’t stop it”
© 2017 SPLUNK INC.
Take response
actions to stop
data leakage
© 2017 SPLUNK INC.
Understand
© 2017 SPLUNK INC.
How much
data will be
needed for
this?
© 2017 SPLUNK INC.
Who
processed
your
information?
© 2017 SPLUNK INC.
You know what you
know
You know what you
don’t know
Painting the
picture
© 2017 SPLUNK INC.
Do individuals need to
be informed
additionally?
How sensitive
was the data?
© 2017 SPLUNK INC.
Maybe resulting in a
non event?
Are the data
subjects truly at
risk?
© 2017 SPLUNK INC.
before [social] media
chatter explodes
• Inform Authority
• Inform affected
Individuals
• (Inform Public)
As an
organization
you want to
control the
story
© 2017 SPLUNK INC.
Worst
Practice:
German
Bundestag
"The Trojans are still active," confirmed SPIEGEL ONLINE. According to
data from several sources familiar with the case, Bundestag data from
the ”Parliament" network continue to flow in an unknown direction.
© 2017 SPLUNK INC.
Best Practice:
ABTA Breach
© 2017 SPLUNK INC.
Best Practice:
ABTA Breach
© 2017 SPLUNK INC.
2+ weeks later out of
the news
Example
ABTA Breach
51
© 2018 SPLUNK INC.
© 2017 SPLUNK INC.
Someone
knocks on
your door
© 2017 SPLUNK INC.
Massive Fines
© 2017 SPLUNK INC.
Have you deployed
“countermeasures
appropriate to the risk”?
Have you used “state
of the art” best
practices?
Data Privacy
Audits
© 2017 SPLUNK INC.
What did you know?
When did you know?
How did you know
about it?
Prove
© 2017 SPLUNK INC.
Logs become
your digital
fingerprints
© 2018 SPLUNK INC.
What Next?
Splunk can help
© 2018 SPLUNK INC.
Security Analysis &
Response
ComplianceRisk mitigation
How Does Splunk Help with Security?
© 2017 SPLUNK INC.
Three Use Cases that bring
different person’s on the
same level and speak the
same language, each:
▶ Real World Scenario
(IT-Manager)
▶ Relevant GDPR Articles
and what they mean
(Data Privacy Officer)
▶ How machine data
helps with (Splunk
Champion)
How Machine Data Supports GDPR Compliance
Available at the Splunk stand R566
© 2018 SPLUNK INC.
Machine Data is Crucial for Breach Response
Detection, Investigation, Response & Remediation
Custom
dashboards
Report and
analyze
Monitor
and alert
Developer
Platform
Ad hoc
searchOn-Premises
Private Cloud
Public
Cloud
Storage
Online
Shopping Cart
Telecoms
Desktops
Security
Web
Services
Networks
Containers
Web
Clickstreams
RFID
Smartphones
and Devices
Servers
Messaging
GPS
Location
Packaged
Applications
Custom
Applications
Online
Services
DatabasesCall Detail
Records
Energy MetersFirewall
Intrusion
Prevention
Platform Support (Apps / API / SDKs)
Enterprise Scalability
Universal Indexing
Machine Data: Any Location, Type, Volume Answer Any Question
© 2018 SPLUNK INC.
Visit the Splunk
stand for a demo of
Security Essentials
or Enterprise
Security
Ask for a Security
Use Case
Workshop
Try it for FREE:
online security
investigation demo
Next Steps
© 2018 SPLUNK INC.© 2017 SPLUNK INC.
Thank You for attending
▶ Questions?

More Related Content

PDF
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
PDF
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT2
PDF
Keep Calm and GDPR
PDF
GPDR_Get-Data-Protection-Right
PDF
Convince your board - cyber attack prevention is better than cure
PDF
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
PPTX
GDPR, Data Privacy and Cybersecurity - MIT Symposium
PDF
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT2
Keep Calm and GDPR
GPDR_Get-Data-Protection-Right
Convince your board - cyber attack prevention is better than cure
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar

What's hot (18)

PDF
11 pp-cybersecurity-revised2 a
PDF
Getting Started with GDPR Compliance
PPT
Boards' Eye View of Digital Risk & GDPR v2
PPTX
Defensible cybersecurity-jan-25th-
PDF
Good-cyber-hygiene-at-scale-and-speed
PPTX
GDPR Complaince: Don't Let SIEM BE Your Downfall
PPTX
GDPR How to get started?
PDF
VMTN6642E - GDPR Slide Deck
PPTX
GDPR & digital strategy
PDF
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
PPTX
Watchful-Corporate-Overview-Q1-16
PDF
The Evolution of Data Privacy: 3 things you didn’t know
PPTX
How to get your business GDPR ready
PPTX
Data breach presentation
PDF
Beginning your General Data Protection Regulation (GDPR) Journey
PDF
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
PDF
Cloud Identity
PDF
Infographic: 5 Tips for Approaching Customers About Cloud Security
11 pp-cybersecurity-revised2 a
Getting Started with GDPR Compliance
Boards' Eye View of Digital Risk & GDPR v2
Defensible cybersecurity-jan-25th-
Good-cyber-hygiene-at-scale-and-speed
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR How to get started?
VMTN6642E - GDPR Slide Deck
GDPR & digital strategy
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
Watchful-Corporate-Overview-Q1-16
The Evolution of Data Privacy: 3 things you didn’t know
How to get your business GDPR ready
Data breach presentation
Beginning your General Data Protection Regulation (GDPR) Journey
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Cloud Identity
Infographic: 5 Tips for Approaching Customers About Cloud Security
Ad

Similar to What you will take away from this session (20)

PPTX
A Day in the Life of a GDPR Breach - September 2017: France
PPTX
A Day in the Life of a GDPR Breach
PPTX
A Day in the Life of a GDPR Breach - September 2017: Germany
PPTX
SplunkLive! Splunk for Security
PPTX
Learn how to use an Analytics-Driven SIEM for your Security Operations
PPTX
Build a Security Portfolio That Strengthens Your Security Posture
PDF
Threat Hunting Workshop
PPTX
Threat Hunting with Splunk
PPTX
Threat Hunting with Splunk
PPTX
Splunk Enterpise for Information Security Hands-On
PPTX
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
PDF
SplunkLive! Stockholm 2015 breakout - Analytics based security
PPTX
Threat Hunting
PPTX
Security investigation hands-on workshop 2018
PPTX
Security investigation hands on workshop 2018-05
PPTX
Security crawl walk run presentation mckay v1 2017
PPTX
Threat Hunting with Splunk
PPTX
SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Re...
PDF
Splunk Threat Hunting Workshop
PDF
SplunkSummit 2015 - Splunk User Behavioral Analytics
A Day in the Life of a GDPR Breach - September 2017: France
A Day in the Life of a GDPR Breach
A Day in the Life of a GDPR Breach - September 2017: Germany
SplunkLive! Splunk for Security
Learn how to use an Analytics-Driven SIEM for your Security Operations
Build a Security Portfolio That Strengthens Your Security Posture
Threat Hunting Workshop
Threat Hunting with Splunk
Threat Hunting with Splunk
Splunk Enterpise for Information Security Hands-On
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
SplunkLive! Stockholm 2015 breakout - Analytics based security
Threat Hunting
Security investigation hands-on workshop 2018
Security investigation hands on workshop 2018-05
Security crawl walk run presentation mckay v1 2017
Threat Hunting with Splunk
SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Re...
Splunk Threat Hunting Workshop
SplunkSummit 2015 - Splunk User Behavioral Analytics
Ad

More from Digital Transformation EXPO Event Series (20)

PDF
Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
PDF
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
PDF
The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era
PDF
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
PDF
What happens if you’re not ready for the GDPR?
PDF
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
PDF
A modern approach to cloud computing
PDF
Citrix NetScaler SD-WAN - What’s New, What’s Hot?
PDF
Evolving the WAN for the Cloud, using SD-WAN & NFV
PDF
Splunk for AIOps: Reduce IT outages through prediction with machine learning
PDF
Lean Analytics: How to get more out of your data science team
PDF
Top 5 Lessons Learned in Deploying AI in the Real World
PDF
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
PDF
Data Science Is More Than Just Statistics
PDF
Breaking down the Microsoft AI Platform
PDF
The convergence of Data Science and Software Development
PDF
The future impact of AI in cybercrime
PDF
Digital Innovation in Medical Gases
PDF
AI is moving from its academic roots to the forefront of business and industry
PDF
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
What happens if you’re not ready for the GDPR?
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
A modern approach to cloud computing
Citrix NetScaler SD-WAN - What’s New, What’s Hot?
Evolving the WAN for the Cloud, using SD-WAN & NFV
Splunk for AIOps: Reduce IT outages through prediction with machine learning
Lean Analytics: How to get more out of your data science team
Top 5 Lessons Learned in Deploying AI in the Real World
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Data Science Is More Than Just Statistics
Breaking down the Microsoft AI Platform
The convergence of Data Science and Software Development
The future impact of AI in cybercrime
Digital Innovation in Medical Gases
AI is moving from its academic roots to the forefront of business and industry
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer

Recently uploaded (20)

PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
SaaS reusability assessment using machine learning techniques
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Statistics on Ai - sourced from AIPRM.pdf
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PPTX
Microsoft User Copilot Training Slide Deck
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
LMS bot: enhanced learning management systems for improved student learning e...
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
Convolutional neural network based encoder-decoder for efficient real-time ob...
Advancing precision in air quality forecasting through machine learning integ...
SaaS reusability assessment using machine learning techniques
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
SGT Report The Beast Plan and Cyberphysical Systems of Control
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Statistics on Ai - sourced from AIPRM.pdf
Lung cancer patients survival prediction using outlier detection and optimize...
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Module 1 Introduction to Web Programming .pptx
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Microsoft User Copilot Training Slide Deck
Comparative analysis of machine learning models for fake news detection in so...
giants, standing on the shoulders of - by Daniel Stenberg
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
LMS bot: enhanced learning management systems for improved student learning e...

What you will take away from this session

  • 1. © 2018 SPLUNK INC.© 2018 SPLUNK INC. A Day in the Life of a Breach Greg Wiley April 2018 Name Title
  • 2. © 2018 SPLUNK INC. ▶ The information in this presentation was compiled from sources believed to be reliable for informational and discussion purposes only. ▶ The information contained herein is not intended to constitute legal advice. You should consult with your own legal teams when developing programs and policies. You should not take, or refrain from taking, action based on its content. We do not guarantee the accuracy of this information and assume no liability in connection with therewith. Legal Disclaimer
  • 3. © 2018 SPLUNK INC. What is the GDPR? A Day in the Life of a GDPR Breach Why Splunk? & further resources Agenda
  • 4. © 2017 SPLUNK INC. Remember this?
  • 5. © 2017 SPLUNK INC. Anyone been getting these?
  • 6. © 2018 SPLUNK INC. GDPR Timelines ▶ The regulation is binding across all EU members states January, 2012 Commissioner Proposed reform to Data Protection regulation May, 2018 Effective Data Protection Framework comes into force (25th May, 2018) April, 2016 EU Council adopted new regulation December, 2015 EU agreement on regulation including the UK after Brexit You Are Here!
  • 7. © 2018 SPLUNK INC. Key Features of GDPR Applicable to any company doing business in the European Union European Data Protection Harmonization Fines up to €20m or 4% of turnover Mandatory Privacy Impact Assessments Privacy by Design & Default 72 Hour Breach Notification Mandatory Data Erasure & Portability Consent for Personal Data Profiling
  • 8. © 2018 SPLUNK INC. A Day in the Life of a Breach
  • 9. © 2017 SPLUNK INC. Imagine you are responsible for your organisation’s security
  • 10. © 2017 SPLUNK INC. Imagine today is May
  • 11. © 2017 SPLUNK INC. What if… May
  • 12. © 2017 SPLUNK INC. …it’s The Day After Tomorrow
  • 13. © 2017 SPLUNK INC. …and you’re rudely woken early in the morning
  • 14. © 2017 SPLUNK INC. Your friendly Data Privacy Officer is on the phone Blah, blah blah BREACH
  • 15. © 2017 SPLUNK INC. Someone is selling personal data you hold
  • 16. © 2017 SPLUNK INC. How does the DPO know? Your Threat Intelligence provider informed you and provided you samples
  • 17. © 2017 SPLUNK INC. There is data in the deep web It may be your data!
  • 18. © 2017 SPLUNK INC. She hangs up! Now what?
  • 19. © 2017 SPLUNK INC. Your incident investigation plan kicks in
  • 20. © 2017 SPLUNK INC. DPO IT PR/Media Team Legal (CEO) Coordination
  • 21. © 2017 SPLUNK INC. Emergency call Emergency chatroom
  • 22. © 2017 SPLUNK INC. In case of fire press here
  • 23. © 2017 SPLUNK INC. 72 hours
  • 24. © 2017 SPLUNK INC. Internal Leak External Leak Incident commander
  • 25. © 2017 SPLUNK INC. “We need to investigate!!!” Reaching out to your security operations team
  • 26. © 2017 SPLUNK INC. People and Processes
  • 27. © 2017 SPLUNK INC. Where is that data stored in your environment?
  • 28. © 2017 SPLUNK INC. First Action Is data still leaking?
  • 29. © 2017 SPLUNK INC. How will you monitor them?
  • 30. © 2017 SPLUNK INC. Nice, structured, tidy data?
  • 31. © 2017 SPLUNK INC. Diving deep into the infrastructure
  • 32. © 2017 SPLUNK INC. time series, in motion, unstructured Machine data 32
  • 33. © 2018 SPLUNK INC. Aug 08 06:09:13 acmesep01.acmetech.com Aug 09 06:17:24 SymantecServer acmesep01: Virus found,Computer name: ACME-002,Source: Real Time Scan,Risk name: Hackertool.rootkit,Occurrences: 1,C:/Documents and Settings/smithe/Local Settings/Temp/evil.tmp,"""",Actual action: Quarantined,Requested action: Cleaned, time: 2009-01-23 03:19:12,Inserted: 2009-01-23 03:20:12,End: 2009-01-23 03:19:12,Domain: Default,Group: My CompanyACME Remote,Server: acmesep01,User: smithe,Source computer: ,Source IP: 10.11.36.20 Aug 08 08:26:54 snort.acmetech.com {TCP} 10.11.36.20:5072 -> 10.11.36.26:443 itsec snort[18774]: [1:100000:3] [Classification: Potential Corporate Privacy Violation] Credit Card Number Detected in Clear Text [Priority: 2]: 20130806041221.000000Caption=ACME-2975EBAdministrator Description=Built-in account for administering the computer/domainDomain=ACME-2975EB InstallDate=NULLLocalAccount = IP: 10.11.36.20 TrueName=Administrator SID =S-1-5-21-1715567821-926492609-725345543 500SIDType=1 Status=Degradedwmi_ type=UserAccounts All three occurring within a 24-hour period Example Correlation – Data Loss What Does Machine Data Look Like?
  • 34. © 2018 SPLUNK INC. Aug 08 06:09:13 acmesep01.acmetech.com Aug 09 06:17:24 SymantecServer acmesep01: Virus found,Computer name: ACME-002,Source: Real Time Scan,Risk name: Hackertool.rootkit,Occurrences: 1,C:/Documents and Settings/smithe/Local Settings/Temp/evil.tmp,"""",Actual action: Quarantined,Requested action: Cleaned, time: 2009-01-23 03:19:12,Inserted: 2009-01-23 03:20:12,End: 2009-01-23 03:19:12,Domain: Default,Group: My CompanyACME Remote,Server: acmesep01,User: smithe,Source computer: ,Source IP: 10.11.36.20 Aug 08 08:26:54 snort.acmetech.com {TCP} 10.11.36.20:5072 -> 10.11.36.26:443 itsec snort[18774]: [1:100000:3] [Classification: Potential Corporate Privacy Violation] Credit Card Number Detected in Clear Text [Priority: 2]: 20130806041221.000000Caption=ACME-2975EBAdministrator Description=Built-in account for administering the computer/domainDomain=ACME-2975EB InstallDate=NULLLocalAccount = IP: 10.11.36.20 TrueName=Administrator SID =S-1-5-21-1715567821-926492609-725345543 500SIDType=1 Status=Degradedwmi_ type=UserAccounts Sources All three occurring within a 24-hour period Example Correlation – Data Loss Windows Authentication Time Range Intrusion Detection Endpoint Security What Does Machine Data Look Like?
  • 35. © 2018 SPLUNK INC. Aug 08 06:09:13 acmesep01.acmetech.com Aug 09 06:17:24 SymantecServer acmesep01: Virus found,Computer name: ACME-002,Source: Real Time Scan,Risk name: Hackertool.rootkit,Occurrences: 1,C:/Documents and Settings/smithe/Local Settings/Temp/evil.tmp,"""",Actual action: Quarantined,Requested action: Cleaned, time: 2009-01-23 03:19:12,Inserted: 2009-01-23 03:20:12,End: 2009-01-23 03:19:12,Domain: Default,Group: My CompanyACME Remote,Server: acmesep01,User: smithe,Source computer: ,Source IP: 10.11.36.20 Aug 08 08:26:54 snort.acmetech.com {TCP} 10.11.36.20:5072 -> 10.11.36.26:443 itsec snort[18774]: [1:100000:3] [Classification: Potential Corporate Privacy Violation] Credit Card Number Detected in Clear Text [Priority: 2]: 20130806041221.000000Caption=ACME-2975EBAdministrator Description=Built-in account for administering the computer/domainDomain=ACME-2975EB InstallDate=NULLLocalAccount = IP: 10.11.36.20 TrueName=Administrator SID =S-1-5-21-1715567821-926492609-725345543 500SIDType=1 Status=Degradedwmi_ type=UserAccounts Sources All three occurring within a 24-hour period Example Correlation – Data Loss Source IP Source IP Source IP Data Loss Default Admin Account Malware Found Windows Authentication Time Range Intrusion Detection Endpoint Security What Does Machine Data Look Like?
  • 36. © 2018 SPLUNK INC. Aug 08 06:09:13 acmesep01.acmetech.com Aug 09 06:17:24 SymantecServer acmesep01: Virus found,Computer name: ACME-002,Source: Real Time Scan,Risk name: Hackertool.rootkit,Occurrences: 1,C:/Documents and Settings/smithe/Local Settings/Temp/evil.tmp,"""",Actual action: Quarantined,Requested action: Cleaned, time: 2009-01-23 03:19:12,Inserted: 2009-01-23 03:20:12,End: 2009-01-23 03:19:12,Domain: Default,Group: My CompanyACME Remote,Server: acmesep01,User: smithe,Source computer: ,Source IP: 10.11.36.20 Aug 08 08:26:54 snort.acmetech.com {TCP} 10.11.36.20:5072 -> 10.11.36.26:443 itsec snort[18774]: [1:100000:3] [Classification: Potential Corporate Privacy Violation] Credit Card Number Detected in Clear Text [Priority: 2]: 20130806041221.000000Caption=ACME-2975EBAdministrator Description=Built-in account for administering the computer/domainDomain=ACME-2975EB InstallDate=NULLLocalAccount = IP: 10.11.36.20 TrueName=Administrator SID =S-1-5-21-1715567821-926492609-725345543 500SIDType=1 Status=Degradedwmi_ type=UserAccounts Sources All three occurring within a 24-hour period Example Correlation – Data Loss Source IP Source IP Source IP Data Loss Default Admin Account Malware Found Windows Authentication Time Range Intrusion Detection Endpoint Security What Does Machine Data Look Like?
  • 37. © 2017 SPLUNK INC. It’s big data…
  • 38. © 2017 SPLUNK INC. Worst Case External authorities might come in to your organization and say: “Don’t stop it”
  • 39. © 2017 SPLUNK INC. Take response actions to stop data leakage
  • 40. © 2017 SPLUNK INC. Understand
  • 41. © 2017 SPLUNK INC. How much data will be needed for this?
  • 42. © 2017 SPLUNK INC. Who processed your information?
  • 43. © 2017 SPLUNK INC. You know what you know You know what you don’t know Painting the picture
  • 44. © 2017 SPLUNK INC. Do individuals need to be informed additionally? How sensitive was the data?
  • 45. © 2017 SPLUNK INC. Maybe resulting in a non event? Are the data subjects truly at risk?
  • 46. © 2017 SPLUNK INC. before [social] media chatter explodes • Inform Authority • Inform affected Individuals • (Inform Public) As an organization you want to control the story
  • 47. © 2017 SPLUNK INC. Worst Practice: German Bundestag "The Trojans are still active," confirmed SPIEGEL ONLINE. According to data from several sources familiar with the case, Bundestag data from the ”Parliament" network continue to flow in an unknown direction.
  • 48. © 2017 SPLUNK INC. Best Practice: ABTA Breach
  • 49. © 2017 SPLUNK INC. Best Practice: ABTA Breach
  • 50. © 2017 SPLUNK INC. 2+ weeks later out of the news Example ABTA Breach 51
  • 52. © 2017 SPLUNK INC. Someone knocks on your door
  • 53. © 2017 SPLUNK INC. Massive Fines
  • 54. © 2017 SPLUNK INC. Have you deployed “countermeasures appropriate to the risk”? Have you used “state of the art” best practices? Data Privacy Audits
  • 55. © 2017 SPLUNK INC. What did you know? When did you know? How did you know about it? Prove
  • 56. © 2017 SPLUNK INC. Logs become your digital fingerprints
  • 57. © 2018 SPLUNK INC. What Next? Splunk can help
  • 58. © 2018 SPLUNK INC. Security Analysis & Response ComplianceRisk mitigation How Does Splunk Help with Security?
  • 59. © 2017 SPLUNK INC. Three Use Cases that bring different person’s on the same level and speak the same language, each: ▶ Real World Scenario (IT-Manager) ▶ Relevant GDPR Articles and what they mean (Data Privacy Officer) ▶ How machine data helps with (Splunk Champion) How Machine Data Supports GDPR Compliance Available at the Splunk stand R566
  • 60. © 2018 SPLUNK INC. Machine Data is Crucial for Breach Response Detection, Investigation, Response & Remediation Custom dashboards Report and analyze Monitor and alert Developer Platform Ad hoc searchOn-Premises Private Cloud Public Cloud Storage Online Shopping Cart Telecoms Desktops Security Web Services Networks Containers Web Clickstreams RFID Smartphones and Devices Servers Messaging GPS Location Packaged Applications Custom Applications Online Services DatabasesCall Detail Records Energy MetersFirewall Intrusion Prevention Platform Support (Apps / API / SDKs) Enterprise Scalability Universal Indexing Machine Data: Any Location, Type, Volume Answer Any Question
  • 61. © 2018 SPLUNK INC. Visit the Splunk stand for a demo of Security Essentials or Enterprise Security Ask for a Security Use Case Workshop Try it for FREE: online security investigation demo Next Steps
  • 62. © 2018 SPLUNK INC.© 2017 SPLUNK INC. Thank You for attending ▶ Questions?