Learning Library

← Back to Library

Shrinking Response Times in Cybersecurity

Key Points

  • The cybersecurity framework is framed as “security = prevention + detection + response,” with earlier episodes covering prevention controls across identity, endpoint, network, application, and data layers.
  • Detection was the focus of the prior video, highlighting how attackers spend a long “reconnaissance” phase before breaching, followed by a mean‑time‑to‑identify (MTTI) of roughly 200 days after intrusion.
  • The current episode shifts to response, noting that once an intrusion is identified it takes an average mean‑time‑to‑contain (MTTC) of about 70 days to remediate and restore operations.
  • Despite advances in tools and knowledge, industry metrics show little change in MTTI and MTTC over time, indicating limited effectiveness in speeding up detection and containment.
  • The episode’s objective is to explore response strategies aimed at dramatically reducing the MTTC and improving overall incident handling.

Sections

Full Transcript

# Shrinking Response Times in Cybersecurity **Source:** [https://www.youtube.com/watch?v=Jk79QJCxPkM](https://www.youtube.com/watch?v=Jk79QJCxPkM) **Duration:** 00:16:52 ## Summary - The cybersecurity framework is framed as “security = prevention + detection + response,” with earlier episodes covering prevention controls across identity, endpoint, network, application, and data layers. - Detection was the focus of the prior video, highlighting how attackers spend a long “reconnaissance” phase before breaching, followed by a mean‑time‑to‑identify (MTTI) of roughly 200 days after intrusion. - The current episode shifts to response, noting that once an intrusion is identified it takes an average mean‑time‑to‑contain (MTTC) of about 70 days to remediate and restore operations. - Despite advances in tools and knowledge, industry metrics show little change in MTTI and MTTC over time, indicating limited effectiveness in speeding up detection and containment. - The episode’s objective is to explore response strategies aimed at dramatically reducing the MTTC and improving overall incident handling. ## Sections - [00:00:00](https://www.youtube.com/watch?v=Jk79QJCxPkM&t=0s) **From Detection to Response** - The speaker recaps the security equation (prevention + detection + response) and prior episodes on preventive controls and detection, then introduces today’s focus on how to respond after an attack is discovered. - [00:03:01](https://www.youtube.com/watch?v=Jk79QJCxPkM&t=181s) **Improving SOC Incident Response Speed** - The speaker explains how a centralized SOC handles alerts and incident response, emphasizing the need to shrink the 70‑day response time by moving from manual, hero‑based triage to more automated, repeatable processes. - [00:06:06](https://www.youtube.com/watch?v=Jk79QJCxPkM&t=366s) **From Attack to SOAR Case Management** - The speaker explains how a detected attack triggers alerts in a SIEM or XDR, which then automatically opens a case in a SOAR platform for assignment and investigation. - [00:09:12](https://www.youtube.com/watch?v=Jk79QJCxPkM&t=552s) **Dynamic Playbook for Incident Response** - The speaker emphasizes a flexible, dynamic playbook that adapts to findings, guiding analysts through case creation, investigation, and tailored remediation rather than relying on static SOPs. - [00:12:19](https://www.youtube.com/watch?v=Jk79QJCxPkM&t=739s) **Automated Breach Notification & GDPR Compliance** - The speaker describes how modern SOAR platforms automate breach response by identifying compromised data types and affected jurisdictions to satisfy varied notification laws, such as the EU’s GDPR, which imposes heavy penalties for delayed or inadequate reporting. - [00:15:30](https://www.youtube.com/watch?v=Jk79QJCxPkM&t=930s) **Course Wrap-Up and Call to Action** - The presenter summarizes the cybersecurity series, encourages viewer feedback, and urges the audience to like, subscribe, and watch the full playlist of ten videos. ## Full Transcript
0:07Remember that equation. 0:09This we covered in the last episode of the Cybersecurity Architecture series. 0:13Welcome back. 0:14This was about security equals prevention, plus detection, plus response. 0:20This is basically what we're doing in security. 0:22And we talked about at the very beginning of the series some security 0:26principles and roles and things like that, tools of the trade. 0:30Then we moved into prevention and we looked at each of these different domains: identity 0:35and access management and endpoint and network and application and data. 0:40And this is basically that mostly those controls we put in place 0:44are about prevention, trying to prevent someone from breaking in or doing damage to us. 0:49Then in the last video, if you didn't see that, make sure you check it out. 0:53In the last video, we really focused on the detection portion of this. 0:57The thing that's up here that does the monitoring and things of that sort. 1:02Today, we're going to move on over into once we've discovered that, how do we do response? 1:09So that's what we're covering today. 1:11Let's start off with some of the basics of security response. 1:15Well, remember also I talked about this diagram where basically the bad guy comes along and he begins his attack by doing reconnaissance. 1:23That's some number of days where they're basically casing the joint. 1:26They're looking to see where are the weak spots, where can I get in? 1:30Then the attack occurs and this is where the damage begins. 1:36Unfortunately, where the attack occurs and when we're aware of it is separated by a period of time. 1:42And that period of time we call the mean-time-to-identify (MTTI). 1:47And the according to the Ponemon Institute's Cost of a Data Breach survey, which I've mentioned before, this is roughly-- 1:54I'm going to make it approximate --roughly 200 days on average 1:59between when the attackers get in and when we're actually aware of it. 2:03Mean-time-to-identify 200 days, the bad guy is sitting in your house 2:08doing who knows what before you finally realize that it's happened. 2:12That's a big problem. 2:13But that's what we covered in the detection portion. 2:16Then what we're going to look at today is this next bit here. 2:20The mean-time-to-contain (MTTC). 2:22How long does it take for us, 2:23once we're aware, to get the damage controlled and the bad guys out and get back to operation? 2:30And it turns out this is on the order of 70 days. 2:33So this is the response portion of all of this. That is clearly not working well. 2:40We in fact, if you look at the numbers over the years, these numbers stay roughly the same. 2:45They don't really change much. 2:46So even though we've had more tooling, we've had more understanding, we've had a lot of things that we've tried to do. 2:52We've not been, as an industry, all that terribly effective at reducing 2:56that mean time to identify and mean time to contain. 3:00So what are we going to do? 3:01We're going to look at this this stuff in the response part and see if we can shrink this 70 days 3:06and make that some number that's shorter than that. 3:09So, for instance, the group that's up here doing this, I talked about this also in the last video. 3:14This is what we know as the SOC, the security operations center. 3:18And it is a centralized team of people whose job it is to monitor and look for across all the different ones-- 3:26each one of these domains is sending their information up so that we can see what's going on. 3:30We're going to detect whenever we see anomalous behavior alerts, things like that, we're correlate all of that 3:37and then we're going to respond, which again is the focus of what we're talking about today. 3:41And that response business has traditionally been called incident response or IR. 3:47And one of the big things that can cut the cost of a data breach is having a good incident response capability in place. 3:53Traditionally, again, that's the terminology we've used. 3:56It's not wrong, but that's just where we've come from. 4:00And what it is, is traditionally we've also made this largely a manual process. 4:06It relies on heroes and experts, people who just happen 4:09to have knowledge in their heads and a gut feel on what to do. 4:13And that's how we do this. 4:14Unfortunately, that really doesn't scale well, and it's not necessarily all that repeatable. 4:19But their job is to, first of all, triage. 4:22That is to when we get these alarms that come in, we've got to determine, is that a real attack 4:28or is this just some noise that's out there? 4:31And if it's a real attack, is it a significant attack or is it not so significant? 4:36And which ones? 4:37Because we never have time to respond to everything as quickly as we'd like to. 4:41What's the order of importance? 4:42That's the triage aspect of that. 4:44Looking and figuring out which patients do we need to see first. 4:48That's where that word comes from, is in the health care industry. 4:52And then once we've figured out the pecking order, then we're going to do remediation. 4:57That is, we're going to fix whatever it is, we're going to block. 5:01We're going to shut things down. We're going to apply software patches. 5:05We're going to put in controls so that we're no longer leaking data 5:09or our systems are able to get back up and running again. 5:13Now, the more modern approach that we hear, the terminology is SOAR. And I'm going to do my best 5:19to resort to not using any puns when it comes to a word like this, but it's awfully tempting. 5:25Anyway, source stands for security, orchestration, automation and response. 5:30So it's automation and orchestration. 5:34We'll talk a little bit more about those coming up and the difference between the two. 5:38But just say where this tends to be traditionally much more manual. 5:42The idea with SOAR is that we're going to try to make things as much as possible automated 5:48and that hopefully will help us reduce the time that it takes to contain. 5:54Okay. 5:55Now we've covered the basics of response. 5:58Now let's take a look in a little more detail about cases 6:02and investigations, because that's the thing we're going to do next. 6:06The way this works is we have an attack. 6:08Remember, over here. Well, now I've depicted it here. 6:11And this attack then is going to generate hopefully some sort of alarm, some sort of event, some sort of indication that we have a problem. 6:19And that's going to flow on up here into the SIEM, the security information and event management system, 6:24which makes up this detection portion of our security architecture. 6:30Now, we may also have the SIEM feeding in to an XDR, as I mentioned in the previous video. 6:36Or they may be separate. 6:37You may only have XDR or only SIEM. 6:39So I'm just going to depict it this way for the purpose of this illustration. 6:44What I'd like to do then, if this system is able to identify that we in fact think this is a problem and someone needs to go into more detail 6:51and investigate this, then one of the things I'm going to do is create a case 6:55and I'm going to create that case here. 7:00Either one of these systems could open the case automatically 7:03in our SOAR system, the security, orchestration, automation and response system. 7:08So the SOAR is depicted here. 7:10It's got this case management as one of its components. 7:13We can also use that to modify cases. 7:16We can use it to assign cases. 7:18So I'm going to assign this case over here to this guy right here. 7:22And he's going to be responsible for looking at all the cases that are assigned to him. 7:27And when he does that, one of the things he'll see is that if we've done a really good job, our XDR or our SIEM 7:34not only created the case but also added in these things right here artifacts, indicators of compromise, 7:41useful information that the cybersecurity analyst is going to use later when they start trying to do their investigation. 7:49So we can take that information and add that into the case automatically. 7:53So we enrich the case is another way of looking at it. 7:57And that way this person isn't starting from zero. 8:00They've got some information. There's a problem. Here's where it started. 8:04Here's some information I have about it. Now we can also with this 8:07SOAR case management system track and maybe we have an extra dashboard 8:13that allows us to figure out which cases are open, which ones are high priority, 8:17who's investigating these and even reassign these as we need to and make kinds of adjustments of that sort. 8:24Now, this person is going to need to do this investigation business. 8:28They're going to have to dig in and figure out what's going on. 8:30How do they know what to do? Do they just start guessing? 8:33Do they start poking around where we'd hope that they would have a more 8:37consistent, repeatable way of figuring out what the problems are. 8:41So we'd like to guide their activities, especially if this person is not very experienced and doesn't know where to start first. 8:48So we have these things called dynamic playbooks. 8:51So a dynamic playbook is something where we have gone in-- 8:55in advance --and determined when you see this, then run this routine. 9:00If you start here and then you go off and run these two 9:05events, maybe their scripts, 9:07maybe their particular procedures that a person is supposed to go through and they do those. 9:12And based upon the results of those things, then they might do other things. 9:16And depending on the results of that, they do something different. 9:20That's the dynamic aspect of this. 9:22So it's not just a static standard operating procedure 9:26that spells out you to number 1 through 10 statically every single time. 9:31There may be some of those things, but in fact, what we find is that there's a lot of cases where we have to be 9:35more dynamic and more flexible. 9:37And what you get from this step will depend on what you want to do in the next steps. 9:44That's why it needs to be dynamic. 9:46And if we're able to capture that kind of information in a dynamic playbook, we can guide this person. 9:52They don't have to have all of the expertise that knows everything about everything, 9:57but they can follow the playbook and let it guide their activities. 10:02Ultimately, they're going to figure out where the source of the problem is, 10:05and we're going to spell out with the remediation steps they should take. 10:09And then they can go back here to this system and figure out what they need to do in order to get things. 10:15If we're leaking data, stop that hemorrhaging. 10:18If it's a system that's down, how to bring it back up and protect it. 10:21Do the remediation that's necessary with that system. 10:26Okay. 10:27Now, we have gotten an indication that there was a problem. 10:30We created a case, opened it in the case management system, and now we have the cybersecurity analyst 10:36that's going to go off and investigate this, figure out what the problem is and remediate. 10:41Why wouldn't we just automate everything? 10:44Well, I'm going to address that in this next business of automation versus orchestration. 10:49So think about this. Here's the manual approach. 10:52And we can think about everything as being on this spectrum. 10:54Either it's done entirely manually or it's done entirely in an automated way. And as much as possible, 11:01I'd rather do it this way. 11:03The problem is, in security, we see a lot of things that sometimes we refer to as black swan events. 11:09You know, swans are normally white, sometimes they're black. 11:12It's not impossible. 11:14It's just more rare. 11:15And it's not what we expect. 11:17And I can only automate what I've seen before. 11:20Sometimes we even get in security 11:21some of these things we call first of a kind events. And a first of a kind, 11:26okay, I'm probably going to have to figure that out manually because I won't have known how to set up a script to handle that in advance. 11:34But what I'd like to do is, as much as possible, do 11:38as much of this as I can in an automated way and for the things I can't. 11:43I'll stop somewhere along this continuum and we'll do what we call orchestration. 11:49Think of this as sort of like semi-automated, where we have a human 11:52who is directing the system and saying, okay, go, I'm going to push this button. 11:57It's going to go off and do these procedures and I'm going to push this button. 12:00It's going to go off and do these things. 12:01So think of this also another way analogy here is the conductor in an orchestra 12:06who is saying, okay, now I want the violins to come in here and I want the drums to exit there. 12:11And they’re orchestrating what is happening in this case. 12:15So orchestration is a step that's not fully automated, but it's in that direction. 12:20And the whole goal of this modern SOAR capability is to, as much as possible, 12:27move things in that direction where it's more automated and less manual. 12:34And orchestration is a step along that way. 12:37Well, what are the other things that we have to do? 12:39It turns out if someone attacked us and there was data that was sensitive to individuals 12:46that then got breached or got compromised and bad guys got a hold of it, 12:51then we might have a responsibility here for notification. 12:54This whole business of breach notification. 12:57One of the first things we have to ask is what kind of data was involved? 13:01Well, maybe there were names. 13:05There might be Social Security numbers, 13:08if you're in the US, other types of ID numbers, credit card numbers and things of that sort. 13:14That's the kind of information. 13:16So that's the data. 13:17I need to know what kind of data was compromised. 13:20Then I need to know what geography were the people whose data was compromised involved. 13:26So what nation are they in? 13:29Maybe even what state or region within that? 13:32Because it turns out we have different breach notification laws in different countries, in different parts of the world. 13:39And even within a country we have different breach notification rules. 13:42So for instance, one of these major ones is called the Generalized Data 13:47Protection Regulation, GDPR that comes from the European Union. 13:52And GDPR specifies very specific, very heavy penalties. 13:57In fact, if you don't respond within a timely fashion, 14:01the penalties for this can be on the order of 4% of worldwide revenue. 14:08So 4% is a huge number for most organizations. 14:12Or it can be €20 million, whichever is greater. 14:19That's a big penalty if you don't report in a timely way 14:23when consumers data, citizen data has been compromised. 14:28And again, you might say, but I don't care. 14:30I am in the US or I'm in Australia. I don't have EU, 14:36you know, really hanging over my head. 14:38Think again. 14:39If you've got EU citizen data, you might be subject to EU rules and penalties. 14:45So then it's a question of prosecution. 14:47But regardless, there are other types of rules in the US. 14:51Each individual state is kind of coming out with their own sets of rules, with their own set of regulations and so forth. 14:56So there are lots of these, and this is what makes it really complicated 15:01to make sure that you have complied with all of these regulations because there are so many. 15:06It's really good to have a tool-- point being --that would help you with all of this. 15:10Once I realize as part of my investigation that there has been a data breach, 15:15I'd like to go into the tool and say, here are the types of data that were compromised. 15:21Here are the geographies where it was compromised, 15:25and here are the different regulatory requirements that I have to to follow. 15:30And based upon that, the system would come out and tell me exactly who do I need to notify. 15:36And that way I don't end up with a bunch of this because that gets to be very expensive. 15:43I hope you've enjoyed watching this series as much as I've enjoyed making it. 15:47As I told you at the beginning. 15:48This is a condensed version of a course I teach at a local university. So you don't get any college credit. 15:55But on the positive side, you also didn't have any homework and you didn't have to take a final exam. 15:59So good news in that regard. 16:02I hope this also whetted your appetite and increased your desire to learn 16:07more about cybersecurity and that you find this topic as interesting as I do. 16:11What we'd like is to get some feedback from you. 16:14If you can add in the comments. What did you learn? 16:17What was a particular value to you in this series? That helps us know what kinds of things we should be doing in future videos. 16:25So also take a look at in the description below 16:29and you'll see a playlist that shows you all ten videos that were in this series in case you missed one. 16:35You don't want to miss. You want to catch all of them. 16:37So please go take a look at that. 16:39And as always, like subscribe and hit the notify bell so that you're aware of new videos 16:44as they come out.