logrhythm cyber security event slides
TRANSCRIPT
![Page 1: LogRhythm Cyber Security Event Slides](https://reader031.vdocuments.net/reader031/viewer/2022021417/589fc66e1a28ab91398b5dc1/html5/thumbnails/1.jpg)
SIEM – Threat Lifecycle Management
![Page 2: LogRhythm Cyber Security Event Slides](https://reader031.vdocuments.net/reader031/viewer/2022021417/589fc66e1a28ab91398b5dc1/html5/thumbnails/2.jpg)
PoliticalIdeologicalCriminal
![Page 3: LogRhythm Cyber Security Event Slides](https://reader031.vdocuments.net/reader031/viewer/2022021417/589fc66e1a28ab91398b5dc1/html5/thumbnails/3.jpg)
Ever Increasing Cyber Risk
2009 2010 2011 2012 2013 20140
5
10
15
20
25
30
35
40
45
Mill
ion
NUMBER OF DETECTED CYBER INCIDENTS
Source: PwC, The Global State of Information Security Survey 2015
![Page 4: LogRhythm Cyber Security Event Slides](https://reader031.vdocuments.net/reader031/viewer/2022021417/589fc66e1a28ab91398b5dc1/html5/thumbnails/4.jpg)
“84% of a breaches evidence resided in the log data.”
2015 Verizon Data Breach Investigation Report
![Page 5: LogRhythm Cyber Security Event Slides](https://reader031.vdocuments.net/reader031/viewer/2022021417/589fc66e1a28ab91398b5dc1/html5/thumbnails/5.jpg)
Holistic Attack SurfaceUser
Endpoint
Network
Endpoint
Network
User
Endpoint
Network
User
Endpoint
Network
User
Endpoint
Network
Endpoint
User
Network
User
Endpoint
Network
User
Endpoint
Network
Endpoint
Endpoint
User
User
Network
User
![Page 6: LogRhythm Cyber Security Event Slides](https://reader031.vdocuments.net/reader031/viewer/2022021417/589fc66e1a28ab91398b5dc1/html5/thumbnails/6.jpg)
“By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches up from less than 10% in 2013.”
- Neil MacDonald, Gartner
![Page 7: LogRhythm Cyber Security Event Slides](https://reader031.vdocuments.net/reader031/viewer/2022021417/589fc66e1a28ab91398b5dc1/html5/thumbnails/7.jpg)
Initial Compromise
Command & Control
Lateral Movement
Target Attainment
ExfiltrationCommand & Control
Lateral Movement
Target Attainment
Exfiltration
By reducing MTTD and MTTR LogRhythm’s Security Intelligence Platform helps break the kill chain.
Early neutralisation equals no damaging cyber incident or data breach.
Reconnaissance
![Page 8: LogRhythm Cyber Security Event Slides](https://reader031.vdocuments.net/reader031/viewer/2022021417/589fc66e1a28ab91398b5dc1/html5/thumbnails/8.jpg)
Faster Detection & Response Reduces Risk
Months Weeks Days Hours Minutes
High
Low
MTTD & MTTR
Chance of Damaging Cyber Incident or Data Breach
![Page 9: LogRhythm Cyber Security Event Slides](https://reader031.vdocuments.net/reader031/viewer/2022021417/589fc66e1a28ab91398b5dc1/html5/thumbnails/9.jpg)
TIME TO DETECT
Eradicate
Cleanup
Report
Review
Adapt
Threat Lifecycle Management™
TIME TO RESPOND
SecurityEvent Data
Log &Machine Data
Forensic Sensor Data
Forensic Data
Machine Analytics
Discover Qualify
Analyze the threat and
associated risk, determine if an
incident has or is occurring
Investigate Mitigate Recover
Implement counter-
measures and controls that mitigate risk presented by
the threat
Assess threat and determine if it poses risk and whether a full investigation is required
User Analytics
![Page 10: LogRhythm Cyber Security Event Slides](https://reader031.vdocuments.net/reader031/viewer/2022021417/589fc66e1a28ab91398b5dc1/html5/thumbnails/10.jpg)
Largest, Fastest GrowingIndependent SIEM Provider
Global Operation
Focus on Customer Success
Demonstrated Leader
![Page 11: LogRhythm Cyber Security Event Slides](https://reader031.vdocuments.net/reader031/viewer/2022021417/589fc66e1a28ab91398b5dc1/html5/thumbnails/11.jpg)
Thank You