Q1. Haiyan, describe for us your vision of the SOC five years from now. What would the biggest change be and what, if anything, would likely be the same?
The security industry is going through a transformation unlike anything we've never seen before. As categories like SIEM and UBA continue to get redefined, security analysts are looking for solutions that can help them not only investigate and respond to threats, but take action on them as well. After spending a year on the road listening to our security customers, we've built out a vision at Splunk that we call SOC2020, which details how the SOC should look in 2020 and beyond. New solutions that can help automate and orchestrate security action, predict threats and improve collaboration across the business are readily available and paramount for organizations that are seeking to modernize their SOC. Our vision of SOC2020 helps guide the cyber community across that process, no matter where they are in their security journey.
Furthermore, as cybercrime becomes increasingly sophisticated, the SOC must deftly adjust and adapt to these changes in order to protect valuable data. The biggest change I anticipate when looking ahead at the future of the SOC is the widespread implementation of AI and machine learning to automate data and security analytics. Hackers are already embracing AI and machine learning to steal money and data, but by and large, the broader cybersecurity industry hasn't adopted these technologies at the same rate.
As far as what will remain the same, data will continue to be the SOC's most valuable resource. The organizations that manage to automate the security analytics process will see the most success when fighting cyber crime. There's no simple solution or silver bullet for cyber threats, but by weaving together the power of data and automation, SOCs can evolve.
Q2. Oliver, what are some primary use cases for SOAR in mitigating cyberthreats? Where can organizations gain the quickest wins from using the technology?
Security Orchestration, Automation and Response, primarily functions to help security teams orchestrate and automate workflows, as well as integrate teams, processes, and existing tools to better support SOC functions. The big promise of SOAR is of course the ability for an organization to punch above their weight class and easily scale their security operations.
With the help of a SOAR platform like Splunk Phantom, security teams that are already strapped for resources can work smarter by executing a series of actions — from detonating files to quarantining devices — across security infrastructure in seconds, versus hours or more if performed manually. This level of automation helps teams detect, investigate and — most importantly — respond to threats faster and more effectively.
Organizations can get the quickest wins by integrating SOAR into the daily process of security teams. SOAR platforms make valuable data available to SOC managers and even C-level executives so they can easily monitor the health of the organization's security practice. From my perspective, there are three numbers you should pay attention to in SOC2020: 90/50/1. By using a SOAR platform, teams can reduce 90 percent of Tier-1 alerts through automation, freeing up over 50% of their analyst's time to focus on higher order activities such as tuning detection and response logic. This allows SOC teams to run data analysis in one single nerve center, parsing signal from noise and making faster decisions to protect their networks. Data is digital gold for every security team, but if you really want to lead with an analytics-driven approach to security, it's essential that you can take action on the data you are ingesting.
Q3. Haiyan, can you give any specific examples on how data analytics are impacting today's SOC?
There are a few key components of a data-fueled SOC. One is the operational element, which is about giving analysts better tools and data to be more effective in their jobs. The other element is truly analytics-based, allowing teams to learn from new attacks and techniques, and then apply their learning in the organization's automated security defenses.
Getting access to the data, leveraging the data and using human intelligence to discover the relationships among dynamic data sources and activities can have clear and immediate ROI. For example, Splunk customer Aflac previously faced a huge increase in the number of security threats targeting its network. The company implemented Splunk as the core of their custom-built Threat Intelligence Center (TIS), which allowed security analysts to compile and analyze data across 20 different threat intelligence platforms. Since implementing Splunk, Aflac has blocked over two million security threats, orchestrated threat intelligence across 20 security technologies sitting within TIS and given security analysts more than 30 hours a month back to focus on proactive security, instead of manual data collection and reporting.
Another key example: data analytics allowed Heartland Jiffy Lube, or HJL, to develop a proactive approach to security, versus playing a reactive game of whack-a-mole. HJL now uses Splunk Enterprise Security (ES) and Splunk User Behavior Analytics (UBA) to protect valuable customer data for over 5 million customers each year. By using data science that produces actionable results with risk ratings and supporting evidence, HJL was able to reduce the risk of insider threats, eliminate the manual processes that often slow response time and improve mean-time-to-resolution of security incidents by over 60 percent.
It's well known that automation can help security analysts do more with less, but in order to fully realize that value and immediately respond and begin investigations, organizations need a solid understanding of their data.
Q4. Oliver, what is Splunk's main messaging and focus going to be at Black Hat USA 2019?
We're excited to be back in Las Vegas for Black Hat, which is one of the biggest events of the year for Splunk. We'll have more than 100 Splunkers and even more customers on-site. One of our own, Ryan Kovar, will be speaking. Make sure to check out his talk with MITRE, which will detail how security pros can implement MITRE ATT&CK in their own security environment.
As for our biggest focus at Black Hat this year- we're looking forward to unveiling the latest updates to Splunk's Security Operations Suite, which combines the power of our security platform - Splunk ES, Splunk UBA and Splunk Phantom. While our customers have used Splunk ES for years to monitor and detect, this trinity of technologies provide the unmatched ability to detect, predict, and also to respond to cyber threats, all at machine speed. This is best demonstrated by a real world use case on how customers can benefit from the delivery of protection and response content as a single package across these three technologies—versus the disparate content packs that we normally provide. Not only can we deliver correlation rules and detection content, but also a response playbook to take action.
Lastly, we're excited to show off some of the work we're continuing to do with Splunk ES Content Updates. A lot of security vendors at Black Hat will be there to talk about research- which is hugely important for organizations to leverage as they defend their systems from nation states, rogue hacking groups and more. We look at research a bit differently at Splunk, with a firm belief that research must be actionable to make a difference within the SOC. ES Content Update provides pre-packaged security research directly to our customers, allowing them to identify immediately whether or not they are at risk to the latest security threats - with data that's already at their fingertips.