Global research: Security leaders’ priorities for cloud integrity, the talent gap and the most urgent attack vectors.
Addressing the toughest incidents out there
If you work in incident response, every judgment call had better be right. That’s the expectation of every cybersecurity function in every organization. And it’s especially true for Splunk’s Advanced Threat Response team, which addresses the biggest and nastiest incidents the company encounters. This unit of ten individuals partners with the SOC and other internal stakeholders to keep Splunk secure. When something goes wrong, the team’s job is to minimize any effects on the company’s operations, finances, and reputation and allow all Splunk employees across the company to keep doing their best work.
The team recently adopted Splunk Attack Analyzer to support deeper incident investigations and conduct more analyses. It’s since become the team’s go-to tool for analyzing suspicious files or domains. Using Splunk Attack Analyzer has enabled them to detect incidents faster and reduce risk to the organization. “It’s been helpful for the thorniest of thorny incidents,” says Tony Iacobelli, senior manager on the Splunk Advanced Response team.
Having a strong automated threat analysis tool like Splunk Attack Analyzer in its arsenal means the team can expand the scope of its detections. Previously, when anything malicious popped up, the Advanced Threat Response team relied solely on its EDR solution to automatically block it from further execution. With Attack Analyzer, analysts can track patterns and get additional details (such as indicators of compromise and host-based artifacts) about the attack source to find other instances of suspicious activity the EDR may have missed. The interactive detonation modes within the tool also let the team investigate malware without running the risk of infecting their machines.
This addition to the toolbelt came at a good time. “We were expanding the number of use cases and areas we have visibility into,” says Tony. “Unfortunately, we can’t simply scale our people resources as we get more visibility into systems. So we need to scale our team’s productivity by increasing our overall efficiency. And Attack Analyzer helped us do just that.” Attack Analyzer ramped up the efficiency across Splunk’s incident response teams, so much so that they achieved their goal of getting their mean time to detect on critical use cases to be under seven minutes.