Most Recent Blogs

Security Analytics and Operations at RSA

Posted: February 06, 2017   /   By: Jon Oltsik   /   Tags: cybersecurity, SIEM, security analytics, security operations, SOAPA

analytics.jpgSo far, I’ve written two blogs about my expectations for the upcoming RSA Security Conference next week. The first blog was about my outlook for endpoint security while the second focused on network security

I am also in the middle of a big research project on security analytics and operations right now and believe that many independent technologies will be integrated into a comprehensive architecture that ESG calls SOAPA (i.e., security operations and analytics platform architecture). Here’s another blog where I define the SOAPA architecture and all the consolidating piece parts.

 With SOAPA in mind, here’s what I’m expecting to see at RSA:

  1. Cybersecurity data everywhere. Cybersecurity analytics and operations used to be based on a few primary data sources – log files and events. Application, database, network, security, and system logs are now supplemented by a plethora of other data sources – endpoint and network behavior data, threat intelligence data, malware analysis, social networking data, etc. In fact, one reason why I anticipate a security analytics and operations architecture is purely in response to massive growth in the amount of security data being captured, processed, and analyzed. While a lot of this data will remain distributed, security analytics and operations tools must have visibility, knowledge, and decision-making capabilities across all of it. This means that SOAPA will be an event-driven software architecture (think SOA 2.0) with a highly distributed data management infrastructure. I hope to hear vendors’ thoughts and plans for this type of architecture.     
  2. SIEM is still in. I’ve been hearing the “SIEM is dead” mantra for years and still don’t buy it. I’d say it’s more like SIEM is evolving. For example, AlienVault is a full operations and analytics platform. IBM has extended QRadar with AppExchange and Resilient for incident response. LogRhythm added its own host agent and network security analytics, and Splunk grabbed Caspida for UBA and has a big effort around adaptive response. While these vendors seek to increase their reach, what’s really happening here is that SIEM functionality is expanding into a series of interconnected functions, modules, and services. In other words, a software architecture. All leading SIEM vendors need to ensure that their products are built for openness and integration while pushing innovation and M&A activities as they try to remain SOAPA hubs with plenty of connection options for partner spokes.   
  3. Threat intelligence maturation. Threat intelligence was all the rage a few RSAs ago, but the focus was around the information itself rather than how to actually use and benefit from threat intelligence analysis. In 2017, it’s all about contextualizing, operationalizing, and synthesizing threat intelligence, leading to a group of innovative threat intelligence platforms and tools from the likes of Flashpoint, Lookingglass, Recorded Future, ThreatConnect, ThreatQuotient, etc. I’m looking forward to hearing how the threat intelligence crowd is working on helping organizations address new types of business risk as well as pure cybersecurity disciplines like penetration testing, “hunting,” incident response, etc. 
  4. Persistent buzz about incident response. Speaking of IR, the trend toward incident response automation and orchestration has gained tremendous momentum over the past 12 months. Furthermore, most enterprise organizations I speak with are now willing to abandon homegrown software efforts in favor of commercial tools from the likes of FireEye, Hexadite, IBM (Resilient), Phantom, ServiceNow, and Siemplify. I’m looking to hear more about how IR automation and orchestration is maturing. Is the focus more on automation or orchestration? Where are organizations starting this process? How are they proceeding? What role do people play today and how are these roles changing?    
  5. Machine learning hype and reality. I predict that artificial intelligence and machine learning will be this year’s winner of the industry hyperbole award at RSA. Everyone will talk about it but no one will clarify it so that cybersecurity professionals understand what it does and where it fits. In my humble opinion, machine learning should be viewed (today) as an intelligent layer of defense that can automate and accelerate some types of specific analytics activities. In other words, machine learning is somewhat limited today but that doesn’t mean that it can’t be extremely useful in appropriate use cases. Which use cases? That’s what I’ll be exploring at RSA with vendors like Darktrace, E8, Exabeam, Vectra, Securonix, Sqrrl, etc. 
  6. Services, services, services. According to ESG research, 45% of organizations have a “problematic shortage” of cybersecurity skills in 2017. This means that almost half of organizations may not have the cybersecurity staff or talent pool to manage security analytics and operations on their own. Which service vendors are filling this void? That’s an area I hope to research at RSA. I know that companies like BT, CSC, CrowdStrike, FireEye, Unisys, SecureWorks, and Symantec are doing well in the services realm but I hope to learn more about which of these and other cybersecurity vendors help organizations address various aspects of security analytics and operations requirements. 

I’m heading to RSA with an insatiable appetite to learn more about the present and future of security analytics and operations. See you at the show.

Jon Oltsik

Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies.

Jon was named one of the top 100 cybersecurity influencers for 2015 by Onalytica, and is active as a committee member of the Cybersecurity Canon, a project dedicated to identifying a list of must-read books for all cybersecurity practitioners. Often quoted in the business and technical press, Jon is also engaged in cybersecurity issues, legislation, and technology discussions within the U.S. government.

Jon has an M.B.A. and a B.A. from the University of Massachusetts, Amherst. As an escape from cybersecurity intelligence and technology, he plays guitar in a rock-and-roll cover band.

Posts by Topic

see all