Global research: Security leaders’ priorities for cloud integrity, the talent gap and the most urgent attack vectors.
Teamwork makes the dream work
Because of data silos and the non-standardized nature of reporting, there were cases where multiple analysts independently worked on the same alert without collaborating. This meant there were different ways of working from one analyst to the next, not always to the same standard. Meanwhile, 90% of alerts were generated by just 20% of specific use cases. Using Splunk SOAR, Johnson Matthey started to use playbooks to streamline and standardize the alert process so that analysts’ work was better organized and their reporting more uniform. This resulted in more standardized and accurate data for more proactive tuning.
Previously, when analysts recorded a threat, they had to manually create a ticket and input relevant information. Splunk SOAR has changed the process, automating repetitive tasks and enriching alerts with additional context. Case investigation used to take an average of 30 minutes, but now average five minutes. “Splunk SOAR facilitates communication,” says Nathan Lowey, cybersecurity engineer at Johnson Matthey. “If one of our analysts needs to share something with someone on the OT side, with the click of a button they can extract everything from the case, sign it over to them in IT service management, and it's all protected in one single system.”
Addressing risks, old and new
As new and sophisticated cyber threats emerge, organizations must stay ahead of attackers. So, when teams at Johnson Matthey encountered the new threat of “quishing,” a form of phishing attack that uses QR codes that standard detection systems could not distinguish from regular images, Splunk Attack Analyzer was brought in.
Adopting Splunk Attack Analyzer has boosted the accuracy of the entire phishing detection system, which had before suffered from a high rate of false alarms. Previously, every email subject line, including the words "urgent," "payment," or "report announcement," was flagged as suspicious. After using Splunk Attack Analyzer, phishing detection accuracy increased to 80%, compared to 50% originally. This improvement helps to better identify genuine threats. Approximately 61% of phishing attempts are now automatically identified as false and closed without an analyst involved. Once a malicious URL has been detected, it’s automatically added to the cloud proxy.
By using Splunk Enterprise Security, Splunk SOAR, and Splunk Attack Analyzer, Johnson Matthey has simplified and enhanced its data security strategy, streamlined processes, and improved decision-making. Additionally, the once-siloed cybersecurity teams can now communicate and collaborate seamlessly, working together to keep the organization secure.