A new era for managed detection and response: Accenture MxDR powered by Google Chronicle

Google Cloud
11 Dec 202336:21

Summary

TLDRIn this informative session, Accenture's Brent Hambly introduces a new managed service partnership with Google, aimed at enhancing clients' cybersecurity. The service merges Google's advanced security technology with Accenture's extensive experience in security operations. Hambly emphasizes the solution's adaptability to various environments and budgets, highlighting its ability to help clients detect and respond to threats more effectively. The discussion also touches on the challenges faced by security leaders and the importance of a proactive, intelligence-driven approach to cybersecurity.

Takeaways

  • 😀 Brent Hambly, leader of Accenture's North America detection and response practice, introduces a new managed service in partnership with Google to enhance clients' security operations.
  • 🛡️ The service combines Google's advanced security technology with Accenture's extensive experience in security operations, aiming to provide a best-in-class solution.
  • 🌐 The solution is adaptable to various environments, constraints, and budgets, ensuring clients can leverage Google's technology and Accenture's services effectively.
  • 🚨 The service aims to help clients avoid costly and disruptive security breaches, emphasizing the importance of proactive and efficient security measures.
  • 💡 Accenture and Google's partnership brings together various security capabilities, including Chronicle security operations, Mandiant threat intelligence, and security AI workbench, among others.
  • 🔍 The managed detection and response (MDR) service is built on Google's technology, offering a scalable and efficient platform for security operations.
  • 🔑 Security Orchestration, Automation, and Response (SOAR) is integrated into the service to enhance response capabilities and streamline security operations.
  • 📈 The service includes a centralized web portal for clients to interact with the service, access dashboards, and gain insights into their security environment.
  • 🌟 Accenture's unified Content Library, contributed to by hundreds of professionals globally, provides pre-built use cases, automation playbooks, and other resources to scale security operations quickly.
  • 📊 The script highlights the importance of tracking metrics such as average time to detect and remediate threats to demonstrate the effectiveness of security operations over time.

Q & A

  • Who is Brent Hambly and what is his role at Accenture?

    -Brent Hambly is the leader of Accenture's North America Detection and Response practice. He works with clients to help design, build, and run their security operations and choose the best solutions and partners for their needs.

  • What is the main focus of the session that Brent Hambly is leading?

    -The main focus of the session is on cybersecurity, specifically discussing Accenture's partnership with Google and the managed service they have launched to secure their clients with advanced security capabilities.

  • What is the significance of the partnership between Accenture and Google in the context of cybersecurity?

    -The partnership between Accenture and Google combines Google's best-in-class technology and advanced security capabilities with Accenture's years of delivery experience in security operations, offering a managed service that is adaptable to various client environments, constraints, and budgets.

  • How does Brent describe the challenges faced by security leaders today?

    -Brent describes the challenges faced by security leaders as managing both the modernization of security and dealing with technical debt. They are tasked with securing new assets and technologies rapidly adopted across the organization, often without being involved in the planning process or having the budget to handle it.

  • What is the role of Managed Detection and Response (MDR) in Accenture's security services?

    -MDR is a key part of Accenture's security services, providing clients with a platform that delivers 24/7 service, utilizing people and technology to be proactive and scalable in understanding the threat landscape and applying that knowledge across their client base.

  • What does Brent emphasize as the most important aspect of a security leader's job in detection and response?

    -Brent emphasizes that the most important aspect of a security leader's job in detection and response is prioritization. They need to understand what matters and what doesn't to effectively manage their efforts and resources.

  • What is the significance of the Chronicle Security Information and Event Management (SIEM) capability mentioned by Brent?

    -The Chronicle SIEM capability is significant because it allows for the ingestion of all security-relevant data and makes it searchable at sub-second intervals, providing a fast and responsive platform for clients to hunt and explore their own data and collaborate with Accenture's service.

  • What is the role of Security Orchestration, Automation, and Response (SOAR) in Accenture's service delivery?

    -SOAR is an integral part of Accenture's service delivery, helping to enrich the understanding of incoming threats, accelerate response, and improve case management workflows within a Security Operations Center (SOC).

  • How does Accenture's managed service differ from other managed services in terms of collaboration with clients?

    -Accenture's managed service differs by offering a collaborative process with clients, allowing them to actively participate in the service and make their own conclusions, unlike many managed services where the process can be less collaborative.

  • What is the importance of the unified Content Library that Accenture has developed?

    -The unified Content Library is important because it contains pre-built use cases, automation playbooks, reporting dashboards, threat hunt data models, etc., which can be immediately scaled in a client's environment, providing practical value and accelerating the activation process.

  • What are the two models Accenture offers for its managed detection and response service?

    -Accenture offers a full stack model, which includes their platform and people providing 24/7 support globally, and a hybrid model, which allows clients to use their own platform while still benefiting from Accenture's managed service.

  • What is the significance of the generative AI capabilities that Accenture is leveraging?

    -The generative AI capabilities are significant as they help Accenture scale their operations and improve the quality of their service delivery rapidly, providing an assistant to security operators to help them through investigations and reduce response times.

  • What is the purpose of the security AI assistant that Accenture is developing?

    -The security AI assistant is being developed to help security operators be more effective and efficient in their work by providing prioritized actions, quick responses, and confidence in the actions taken during an investigation.

  • What are the key factors that Accenture considers when selecting a partner for detection and response services?

    -Accenture considers factors such as the provider's ability to detect threats, the value they place on intelligence, their alignment with the client's industry, their understanding of the client's business, their ability to serve the entire enterprise, and their approach to keeping costs down year to year.

  • How does Accenture's approach to threat intelligence differ from other providers?

    -Accenture's approach to threat intelligence involves a structured conversation with clients to understand their threat landscape, prioritizing content and rule sets based on the threats, and advising clients on the benefits of a threat intelligence platform, including the importance of organic or original threat intelligence.

  • What is the significance of the 12-step process of decomposing threat actor activity mentioned by Brent?

    -The 12-step process, likely referring to the MITRE ATT&CK framework, is significant because it allows for a more effective defense by understanding the specific stages of an attack and how it typically plays out, enabling better detection and response strategies.

  • How does Accenture plan to leverage generative AI in its security operations?

    -Accenture plans to leverage generative AI to scale its operations and improve the quality of service delivery rapidly. This includes building its own security AI assistant and utilizing models from the Vertex AI ecosystem to assist security operators in their investigations and decision-making processes.

Outlines

00:00

😀 Introduction to Cybersecurity Session

The speaker, Brent Hambly, leader of North America detection and response practice at Accenture, warmly welcomes the audience to a session on cybersecurity. He emphasizes the importance of making good use of the audience's time and hints at a Q&A session later. Brent shares his background in Aerospace and defense, a startup, and his current role at Accenture, highlighting the partnership with Google. The session aims to discuss challenges, decisions, and recommendations for a resilient cybersecurity approach, using a scenario of a breached cloud environment to illustrate the urgency and impact of cybersecurity incidents.

05:02

🛡️ The Challenges of Modern Security Leadership

This paragraph delves into the difficulties faced by security leaders, particularly in the context of rapid digital transformation and the pressures of a global recession. Brent discusses the struggle to secure and manage new and existing assets without adequate resources or involvement in the planning process. He touches on the complexity of tasks such as container management, privileged account lifecycles, and data workflow mapping across SaaS applications. The paragraph underscores the need for security teams to be efficient and adaptive, balancing the modernization of security with dealing with technical debt.

10:02

🤝 Accenture and Google's Partnership for Enhanced Security Operations

Brent introduces the partnership between Accenture and Google, which aims to revolutionize security operations through a managed service. This service combines Google's advanced security technology with Accenture's extensive experience in security operations. The goal is to act as an extension of a client's security team, improving their security operations by accelerating the remediation of vulnerabilities and reducing risk. The paragraph also highlights the integration of SOAR (Security Orchestration, Automation, and Response) as a fundamental part of the service delivery, emphasizing the maturity and effectiveness of this capability in response and case management.

15:03

🌐 Comprehensive Managed Detection and Response Service

The speaker provides an in-depth look at the managed detection and response service offered by Accenture and Google. The service utilizes Google's Chronicle technology for data ingestion and correlation against broad threat intelligence, maintaining a fast and responsive platform. It also includes a centralized web portal for service interaction and a unified Content Library with pre-built use cases and automation playbooks. The service is designed to scale with client environments, offering an all-you-can-ingest model without penalties for deeper learning and data ingestion.

20:04

📈 Advancing Security Operations with Intelligence and Adaptability

Brent discusses the importance of intelligence in security operations and how understanding the threat landscape is crucial for prioritization and effective defense. He outlines a structured approach to understanding the threat actor's tactics, techniques, and procedures (TTPs) and aligning them with the client's industry and environment. The paragraph emphasizes the value of original threat intelligence and the benefits of sharing internal lessons learned with partners like Accenture. It also introduces the concept of tracking improvement over time through the MITRE ATT&CK framework to demonstrate increased security effectiveness.

25:05

🚀 Leveraging Generative AI for Security Operations

In this paragraph, Brent introduces the integration of generative AI into Accenture's security operations, aiming to scale and improve the quality of service delivery. The company is developing a security AI assistant to support security operators in their tasks, focusing on prioritization, quick action, and ensuring the right measures are taken. Accenture is also working on modules for incident response reporting and language translation to cater to global clients, showcasing the application of generative AI in enhancing security operations.

30:05

🔧 The Importance of Adaptability and Partnership in Security

Brent concludes the script with a focus on the necessity of adaptability in the ever-changing landscape of technology and business. He emphasizes the importance of having a partner that can adapt to changes such as acquisitions, divestitures, new business lines, or geographic expansions. The paragraph also serves as a guide for selecting a partner in detection and response, highlighting factors such as threat detection clarity, intelligence value, industry alignment, comprehensive enterprise service, and cost efficiency. The speaker invites challenges and questions, showcasing confidence in Accenture's approach and the benefits of the partnership with Google.

Mindmap

Keywords

💡cyber security

Cyber security refers to the practice of protecting internet-connected systems, including hardware, software, and data, from theft, damage, or unauthorized access. In the video's theme, cyber security is central as the speaker discusses the importance of securing clients' digital platforms and the challenges faced by security leaders in modernizing their security measures. The script mentions the launch of a new managed service by Accenture and Google to enhance clients' cyber security capabilities.

💡managed service

A managed service is a program where a service provider delivers support and services to manage a specific aspect of businesses' IT infrastructure, such as security operations. In the context of the video, Accenture and Google have partnered to create a managed service that integrates Google's advanced security technology with Accenture's delivery experience to offer clients a comprehensive solution for their security needs.

💡security operations

Security operations encompass the daily tasks and procedures performed to protect an organization's information and assets. The speaker emphasizes the role of security operations as the core of the security program where the effectiveness of risk reduction to the enterprise is determined. The video discusses how the partnership between Accenture and Google aims to improve security operations through managed detection and response services.

💡digital transformation

Digital transformation refers to the integration of digital technology into all areas of a business, fundamentally changing how businesses operate and deliver value to customers. The script mentions that digital transformation has been disruptive to security operations, as security leaders are tasked with securing both new digital assets and legacy systems without always being involved in the planning or receiving adequate budget for these new technologies.

💡threat intelligence

Threat intelligence is the process of gathering, analyzing, and disseminating information about potential threats to an organization's information assets. In the video, the speaker highlights the importance of threat intelligence in understanding the threat landscape and making informed decisions about security. The partnership with Google brings Mandiant's threat intelligence capabilities into the managed service, enhancing the security offerings for clients.

💡Chronicle

Chronicle is a security intelligence platform developed by Google that helps organizations manage and analyze security-related data. The video discusses how Chronicle's security intelligence capabilities are integrated into the managed service provided by Accenture, allowing for the ingestion and analysis of security-relevant data to improve threat detection and response.

💡MITER ATT&CK framework

The MITER ATT&CK framework is a globally recognized knowledge base of adversary tactics, techniques, and procedures based on real-world observations. The speaker uses this framework to illustrate the importance of understanding the stages of an attack to improve detection and response. The video mentions tracking improvements over time by plotting the organization's progress against the steps in the MITER ATT&CK framework.

💡generative AI

Generative AI refers to artificial intelligence systems that can create new content, such as text, images, or data. In the video, the speaker mentions Accenture's use of generative AI to improve the quality and efficiency of their security operations. They are developing a security AI assistant that will help security operators prioritize tasks and act quickly during an investigation.

💡Security Orchestration, Automation, and Response (SOAR)

SOAR is a term used to describe the automation of security processes and workflows to improve the efficiency and effectiveness of security operations. The video describes how Accenture integrates SOAR as a fundamental part of their managed service, allowing for a more proactive defense against threats and a quicker response when incidents occur.

💡hybrid model

A hybrid model in the context of the video refers to a service delivery approach that combines the use of Accenture's platform and people with the client's existing security infrastructure. This model allows clients to benefit from Accenture's managed service without the need to replace their current security platforms, offering flexibility and customization to fit the client's specific needs.

Highlights

Introduction to the cybersecurity session with Brent Hambly, leader of North America detection and response practice at Accenture.

Accenture and Google's new managed service offering aimed at securing clients with best-in-class technology and advanced security capabilities.

Brent Hambly's background in Aerospace and defense, and his experience in a startup, shaping his approach to cybersecurity.

The importance of a secure-by-design approach and the challenges faced by security leaders in the rapidly evolving digital landscape.

The impact of a global recession on security funding and hiring, causing a freeze on projects and growth for security teams.

The need for security operations to be proactive, efficient, and adaptive in the face of technological change and budget constraints.

Accenture and Google's partnership to reimagine security operations as an extension of a client's security team, enhancing detection and response capabilities.

Integration of SOAR (Security Orchestration, Automation, and Response) as a fundamental part of Accenture's service delivery.

Chronicle's SIM and SOAR capabilities combined to provide a superior and highly responsive managed detection and response service.

Benefits of the Chronicle platform, including its rich integration ecosystem, performance, scalability, and user experience.

Accenture's Global Content Library, offering pre-built use cases, automation playbooks, and reporting dashboards tailored for various industries.

The flexible integration model of Chronicle, supporting over 400 integrations and custom solutions for unique client environments.

Accenture's approach to security operations, emphasizing the importance of intelligence and adapting to the client's specific needs and tech stack.

The use of generative AI to improve the quality and efficiency of Accenture's security operations and response capabilities.

Upcoming launch of Accenture's security AI assistant modules for incident response reporting and language translation to support global clients.

The importance of tracking and improving detection and remediation times as key metrics for demonstrating the effectiveness of security operations.

Closing thoughts on the necessity for security providers to adapt and evolve with their clients, ensuring long-term success in cybersecurity.

Transcripts

play00:00

foreign

play00:02

[Music]

play00:13

hey

play00:15

coming through okay all right great hey

play00:17

good afternoon and welcome everyone uh

play00:20

really uh appreciate you being here I um

play00:22

I hope you're having a good time here at

play00:24

next and uh this is going to be a good

play00:26

session

play00:27

um whether it is you know you have this

play00:29

penciled in to your agenda when you

play00:31

download the app or whether this is the

play00:33

consolation prize for the mandian event

play00:35

filling up I'm glad that you're here and

play00:37

I hope to make good use of your time so

play00:38

we're gonna have a good conversation

play00:39

about cyber security

play00:41

um I will hopefully have enough time for

play00:43

questions at the end we'll see how

play00:44

quickly we get through it and um

play00:46

definitely appreciate any any engagement

play00:47

that you have uh or questions you have

play00:49

please be thinking of them happy to

play00:50

answer them at the end

play00:52

um so my name is Brent Hambly

play00:55

um I am the leader of our North America

play00:57

detection and response practice so I

play00:58

have the privilege of working with

play00:59

clients every day helping them design

play01:01

build run their security operations and

play01:03

choosing the best Solutions and the

play01:05

partners to do that with I'm really

play01:06

happy today to be talking about our

play01:08

partnership with Google it's going to be

play01:09

a wonderful time just by way of

play01:11

background I spent the first 10 years of

play01:13

my career in Aerospace and defense so

play01:15

learning for first hand what a

play01:16

well-resourced and a very determined

play01:18

adversary can do and can make your life

play01:20

very miserable learning a lot of lessons

play01:23

through that and helping our helping

play01:25

secure clients for that I then spent

play01:27

time as employee number seven at a

play01:29

startup I was a wonderful Adventure in

play01:31

my career being able to kind of share

play01:33

all those lessons that we had learned in

play01:35

a very difficult and uh and environment

play01:37

to defend in Aerospace and defense and

play01:40

then I have the approach for the last

play01:41

four years of being a part of Accenture

play01:42

and leading our North American detection

play01:44

and response practice so I'm happy to be

play01:46

representing the team here I stand on

play01:48

the shoulders of a lot of great people

play01:49

some people are here who have helped

play01:52

build the solution and really work

play01:53

together on this partnership that we

play01:54

have with Google so

play01:57

um

play01:59

so we're gonna move fast and cover a lot

play02:00

of ground

play02:01

um I I know our time is going to go

play02:03

quickly if you have one thing that you

play02:05

take away from the session understand

play02:07

that Accenture and Google recently

play02:09

launched a new service to be able to

play02:10

secure our clients it's a managed

play02:12

service that allows us to provide that

play02:15

the Best in Class technology and

play02:17

advanced security capabilities of Google

play02:18

and the years and years of delivery

play02:21

experience that Accenture has in

play02:22

security operations and bring those two

play02:24

things together and deliver the value to

play02:26

our clients and it's a very adaptable

play02:28

solution so whatever your environment

play02:30

your constraints your budget usually we

play02:31

can find a way to make that work for

play02:33

your environment and have you Leverage

play02:35

The Best of Google's technology and

play02:36

Accenture services but before we get

play02:38

started I want to share a little bit of

play02:39

perspective or maybe just ground us a

play02:41

little bit in terms of where we're at so

play02:43

if you're looking at this image I hope

play02:45

it's it's peaceful it's a relief

play02:47

it could be Friday you know this could

play02:50

be you on Friday you're energized from

play02:52

the sessions at Google next you came you

play02:54

you know you have great plans for Labor

play02:56

Day weekend and you you have your

play02:59

calendar clear your out of office is set

play03:01

and just before you get out of cell

play03:03

range you get a call and it's your CIO

play03:05

and they're frantic so this is not a

play03:08

good start to the conversation

play03:10

and they tell you that your company's

play03:12

Cloud environment has been compromised

play03:14

and the digital platform that helps you

play03:16

generate 80 of your revenue is down and

play03:19

as a head of security they need you back

play03:21

at the office as soon as possible

play03:23

immediately for as long as it takes to

play03:25

respond and recover from that event

play03:27

and so obviously this is not a situation

play03:29

that we never want to find ourselves or

play03:31

our colleagues or a loved one in having

play03:33

to sacrifice their PTO to go in and

play03:35

handle a catastrophe in the office I

play03:37

think a lot of what we're trying to do

play03:38

with this partnership between Accenture

play03:40

and Google is help save our clients the

play03:42

pain of that and really help them

play03:43

leverage some of the best practices here

play03:45

so we're here to talk about those

play03:46

challenges the decisions you can make

play03:48

today and some of the uh some of the

play03:50

recommendations that we have for you to

play03:52

have a resilient approach to cyber

play03:54

security

play03:55

so you know why are we here uh you know

play03:58

I think a lot of that question is baked

play04:00

into uh the fact that we agree on the

play04:02

principles of secure by Design secure by

play04:04

default that would be great if that's

play04:05

how everyone operated and that's how all

play04:07

of our Solutions were I think hopefully

play04:10

we all share an understanding of the

play04:12

business value of cyber security that it

play04:13

is the number one business risk and that

play04:15

it is a consideration on the minds of

play04:17

not only the practitioners in the field

play04:19

but the board of directors right

play04:22

um but like breaks on a car uh the

play04:24

better we secure our assets the faster

play04:26

our business can move and just to share

play04:29

a little bit of perspective what it

play04:30

means to be like insecurity if that's

play04:31

not the hat that you wear it's a really

play04:33

difficult time for Security leaders and

play04:35

so

play04:36

as businesses have grown rapidly and

play04:39

we've recognized the value of digital

play04:40

transformation which is undeniable it's

play04:43

put our Security leaders in a really

play04:44

tough spot because

play04:46

in addition to managing all the things

play04:48

that have not been modernized yet

play04:49

they're also responsible for the things

play04:51

that are being rapidly adopted across

play04:54

the organization and sometimes they

play04:56

weren't involved in the planning process

play04:57

and sometimes they weren't afforded any

play04:59

budget to be able to handle that and

play05:01

whether it's you know securing your

play05:03

container runtime environment or

play05:05

managing the life cycle of a privileged

play05:07

account or mapping your data workflows

play05:10

across your SAS applications uh it's

play05:12

really tough out there it's a lot to

play05:14

keep track of as a security leader and

play05:16

it's been particularly rough for

play05:17

Security leaders because just as we were

play05:19

kind of gaining traction and momentum

play05:21

and being able to be properly resourced

play05:23

and get our budget requests fulfilled

play05:24

and get our projects activated the

play05:26

threat of a global recession basically

play05:27

froze our funding and our hiring so

play05:30

instead of kicking off those projects

play05:32

and growing our team as we always had

play05:33

hopetoun we finally got the support top

play05:35

to bottom for what we're doing we're

play05:37

stuck in a freeze and we're starting to

play05:38

emerge from that but it's been a really

play05:40

tough time and I think that as security

play05:42

teams we're always looking for every

play05:44

advantage that we can get in that

play05:45

situation to be efficient stewards of

play05:47

our investment so you know to put it

play05:49

simply we're solving for secure

play05:51

modernization while also dealing with

play05:53

our technical debt or we're Paving the

play05:55

road ahead of us while we're also

play05:56

filling the potholes behind

play06:00

and to put a finer point on it uh and

play06:02

very relevant to this talk digital

play06:04

transformation has been really

play06:05

disruptive to security operations so

play06:07

security operations is kind of the heart

play06:09

of the security program that's where the

play06:10

rubber meets the road it's where we

play06:11

determine are we going to be successful

play06:13

or not in reducing risk to the

play06:15

Enterprise uh very kinetically and the

play06:17

Dilemma that we have is uh we're often

play06:20

the last to find out about changes in

play06:22

the Enterprise whether it's new assets

play06:23

and new technologies that we're adopting

play06:25

but we also

play06:27

um don't you know always have the

play06:29

business context for what these assets

play06:30

mean and our job in detection and

play06:32

response is all about prioritization

play06:34

that's the only way we succeed we're not

play06:35

going to get to the bottom of the stack

play06:37

we'll never get to the bottom of the

play06:38

inbox or the queue we really have to

play06:40

prioritize our efforts and so the most

play06:42

important thing that we have is insight

play06:44

into what matters and what doesn't

play06:45

relatively speaking and the pace of

play06:48

digital change has not made that any

play06:49

easier

play06:52

so what are we to do about this

play06:54

when I talk with clients about their

play06:56

challenges and we talk about uh whether

play07:00

it's their budget stagnation or the fact

play07:02

that they can't hire or the fact of the

play07:04

technological change in the enterprise

play07:05

we have a discussion on you know what

play07:08

would it take what would it take to see

play07:09

across your Enterprise

play07:11

what would it take to understand the

play07:12

threat and accelerate the responsive

play07:14

threats that we know about in our

play07:15

environment what would it take to be

play07:16

proactive in defending against

play07:17

adversaries

play07:19

and today I really want to share with

play07:21

you the solution that Accenture and

play07:22

Google have partnered on to be able to

play07:24

help you achieve these goals

play07:27

so simply put this is a breakthrough

play07:29

moment for detection and response for

play07:31

both Google and Accenture

play07:33

um we are partnering on the capabilities

play07:34

from uh from both of our firms to be

play07:37

able to reimagine how security

play07:39

operations can be and and really as a

play07:42

partner in security operations how that

play07:43

can be an extension of your security

play07:45

team within your Enterprise

play07:47

and also how that can be used to improve

play07:49

not only not only just deliver the

play07:51

service that you signed up for but

play07:53

actually improve your security

play07:54

operations how are you remediating

play07:56

vulnerabilities faster how are you

play07:58

reducing risk faster what do you

play07:59

understand about the threat environment

play08:01

we're bringing those capabilities

play08:02

together

play08:07

and so this is where I think a lot of

play08:10

the important details are this is where

play08:12

you'll get the first sense of well what

play08:14

is he really talking about what is the

play08:15

solution that Accenture and Google have

play08:17

partnered with and so we now start

play08:19

partnership back in April it was RSA

play08:21

right here

play08:22

um and it was based on a shared vision

play08:24

for making our clients a more secure

play08:27

overall and a more secure future for

play08:28

them but it's also a recognition of the

play08:30

unique value that we both bring to the

play08:32

table and the synergies that our clients

play08:33

are going to get out of the partnership

play08:35

Accenture is the largest Security

play08:36

Services firm in the world we're also

play08:39

the leader in managed detection and

play08:40

response so this is what we do and this

play08:42

is our specialty one of our many

play08:44

Specialties across the environment

play08:47

um and it's we're serving thousands of

play08:49

clients globally and we've done this for

play08:51

over 25 years and so Accenture mxdr is a

play08:54

platform that we use to deliver that

play08:55

service 24x7 for our clients it's our

play08:58

people it's our platform working around

play09:00

the clock for them never sleeping always

play09:02

having always being available to them

play09:04

and really being proactive and scaling

play09:06

out what we know about the threat

play09:07

landscape and being able to apply that

play09:09

across our entire client base

play09:11

and mxdr is now powered by Google's

play09:13

technology which is really exciting for

play09:15

us this is a huge turn of the page for

play09:17

us because what Google has done with

play09:19

their security business the Acquisitions

play09:21

they've made the integration that's

play09:23

happened between the Acquisitions the

play09:25

way that they're offering that up in

play09:26

their go to market I hope a lot of you

play09:27

are excited by what you heard in the

play09:28

keynote about duet Ai and vertex Ai and

play09:32

a lot of the different capabilities that

play09:33

they're bringing to the table and

play09:34

certainly Kevin mandia's talk there's a

play09:36

lot of excitement around those

play09:37

capabilities and so whether you look at

play09:39

Chronicle security operations or you

play09:41

look at mandan's threat intelligence of

play09:43

breach analytics where you look at

play09:44

virustotal or you look at some of the

play09:46

capabilities coming in security AI

play09:48

workbench where some of the foundational

play09:49

capabilities we can use to build a

play09:51

really good service in bigquery how do

play09:53

we search our data at scale and our

play09:55

dashboards and looker right these are

play09:56

the capabilities that we're going to be

play09:57

building that we're building this

play09:59

service on and offering this to our

play10:00

clients because it's going to be a

play10:02

superior solution for them and

play10:04

it really allow us to take a different

play10:06

approach to detection and response and

play10:08

really to bring this all together this

play10:10

is busy and I know and I'm going to

play10:11

spend a little bit of time on it but

play10:12

this is really what looks what great

play10:14

looks like in manage detection and

play10:15

response this is what you hope to hope

play10:18

to see and feel and experience from a

play10:20

service provider and transparency and

play10:22

how they kind of put together their

play10:24

service and what what works in that

play10:26

environment so as you move left to right

play10:27

we're going from identifying threat

play10:29

activity to determining a plan of action

play10:31

to acting on that and we're doing that

play10:33

through Google's technology so we're

play10:35

using the chronicle Sim capability to

play10:38

ingest all of your security relevant

play10:39

data bring that all to the Forefront be

play10:42

able to correlate that data against not

play10:43

only our intelligence but also what

play10:45

we're seeing across the broader threat

play10:46

landscape

play10:47

we are keeping 12 months of hot data

play10:50

searchable at sub second intervals so

play10:53

really fast and responsive times no more

play10:54

10 15 minute queries that run and hang

play10:57

this is an extremely responsive platform

play11:00

um it's brilliant it works great for

play11:01

whether you're a service provider like

play11:03

Accenture or whether you're in the

play11:04

practitioner chair it's a great

play11:05

experience

play11:07

um and we're also uh exposing that

play11:10

capability to our clients so they can

play11:12

hunt at Google speed in their

play11:13

environment they can explore their own

play11:15

data they can make their own conclusions

play11:16

and they can collaborate in the service

play11:18

with us and that's not true of many

play11:20

managed services for those of you who

play11:21

have delivered that it's not a very

play11:22

collaborative process so I'm really

play11:24

excited about that in addition we're

play11:28

really integrating soar as a fun as a

play11:32

fundamental and integral part of how we

play11:33

deliver our service so soar security

play11:35

automate excuse me security

play11:36

orchestration Automation and response

play11:38

that capability has been around for a

play11:40

few years some of you may have haven't

play11:42

up and running and are loving it within

play11:43

your environment some of you may have

play11:45

tried it and didn't find much success

play11:47

with it and some of you may have yet to

play11:48

explore it but this capability has

play11:50

finally come to maturity and the way

play11:52

that Google has integrated their Sim and

play11:54

their sort capability makes it a value

play11:56

add from the perspective of response and

play11:59

the speed that we can generate from it

play12:00

so not only is it did the products fit

play12:03

together and work well together we're

play12:04

actually delivering the service together

play12:05

on it we're basing our success on the

play12:07

efficiency of working together with both

play12:09

of those Solutions so this is the way

play12:11

that we deliver that service and not

play12:12

only is it a tool that's going to help

play12:14

us enrich what we're seeing coming in

play12:16

respond to threat activities and really

play12:18

work with our clients on how we want

play12:19

that to flow in their environment but

play12:21

we're also able to use it for case

play12:23

management so how we actually go through

play12:25

the workflow in a sock which having both

play12:27

of those capabilities together is

play12:29

fantastic and you know for those of you

play12:31

who have experienced the pain of

play12:33

multiple panes of glass and having to

play12:35

swivel seat from one tool to another

play12:36

this makes it extremely simple to be

play12:38

able to understand your environment and

play12:40

so we're really excited about bringing

play12:41

Chronicle Sim Chronicle sword together

play12:43

and we're also leveraging a lot of the

play12:46

other great capable abilities from uh

play12:48

from Google so when we talk about

play12:50

mandian threat intelligence having that

play12:51

incorporated into our platform along

play12:53

with Accenture threat intelligence is a

play12:55

really strong capability you're getting

play12:56

two of the world's leading providers of

play12:58

threat intelligence in one platform and

play13:01

I think that that's such an important

play13:03

value proposition because when you say

play13:04

the name mandian out in the field and

play13:06

for the uninitiated you know there's

play13:07

very few who don't recognize the value

play13:09

and if you do recognize it you know it's

play13:10

top tier you know that's going to be an

play13:12

exceptional capability we're able to

play13:13

bring that together in the platform

play13:15

we also want to hit on a couple of

play13:18

points here one is that this isn't all

play13:20

you can ingest all you can consume kind

play13:22

of model and so you're not penalized for

play13:24

learning more about your environment and

play13:25

ingesting more logs that's very exciting

play13:27

if you've ever been have to pay by the

play13:29

terabyte you know that can get very

play13:30

expensive very quickly and you know

play13:32

there are different kinds of pricing

play13:34

models that are that can be applied our

play13:36

fully managed solution is all you can

play13:37

ingest and so it's based on the number

play13:39

of nodes in your environment as your

play13:41

environment grows you know we will grow

play13:43

with you but you're not penalized for

play13:45

learning more for ingesting more for

play13:46

understanding more security-rich context

play13:48

about your environment that's more that

play13:49

we can use to help keep you secure we

play13:52

also have a centralized web portal that

play13:53

we're building that's a common you know

play13:55

way to interface with our service and

play13:56

there's nothing really revolutionary

play13:58

about that other than you're able to

play13:59

consume our service interact with our

play14:01

analyst see your dashboard understand

play14:03

your environment what are our relatively

play14:04

high risks what do we need to be

play14:06

concerned about it's a good uh and it's

play14:08

also based on your persona so you could

play14:10

have your CSO login and be able to see

play14:12

all the relevant dashboards for he or

play14:14

she you can also have your analyst login

play14:16

and kind of find out where do we leave

play14:17

off in the investigation and what is the

play14:19

first thing I need to be doing now so

play14:21

that web portal is going to be that

play14:22

single source of Truth for that

play14:24

um maybe the thing that I'm most proud

play14:25

of is an Accenture Security employee we

play14:28

have a unified Content Library that is

play14:30

both tailored for industry and it's also

play14:33

contributed to actively by hundreds of

play14:35

professionals globally and what this

play14:37

means is we have pre-built use cases

play14:39

automation playbooks reporting

play14:41

dashboards threat hunt data models Etc

play14:44

so these are things that we can scale

play14:45

immediately in your environment so if

play14:47

you if you know the experience as a new

play14:49

Accenture client would be we understand

play14:50

a little bit about your in environment

play14:52

we activate your instance of Chronicle

play14:54

Sim and soar and that is a really quite

play14:57

frankly pretty quick and straightforward

play14:58

process your data stays where it belongs

play15:01

in your own tenant environment

play15:02

segregated from all other data but we

play15:04

also apply all the indicators that we're

play15:06

extracting so we can better defend you

play15:08

and our other clients but that whole

play15:10

process end to end it can be activated

play15:13

very very quickly through this Content

play15:14

Library and when you think about managed

play15:17

security operations for those of you who

play15:19

have gone really deep into it and you

play15:20

know it from the inside out you

play15:22

understand there's you know fully

play15:23

managed Solutions and then there might

play15:25

be a one-off you know maybe a client you

play15:27

have as a client you have a special

play15:28

environment you have special

play15:29

requirements so the provider is going to

play15:31

build a custom environment for you and

play15:33

what that looks like is

play15:36

um maybe your own instance of technology

play15:38

and then we come as a service provider

play15:39

on top of it a lot of those teams

play15:42

operate independently they're really not

play15:44

connected they're doing the service for

play15:46

the client and they're not really

play15:47

working together and scaling across this

play15:50

announcement with Google and not only

play15:52

platforming our mxdr Solution on Google

play15:54

technology it also gave us the

play15:56

opportunity to pull together our Global

play15:58

Content Library from across our many

play16:00

delivery centers globally we have 20

play16:02

Global socks and cyber fusion centers

play16:04

pull all that together and allow us to

play16:06

bring that to bear for clients so that's

play16:08

really exciting that's practical value

play16:09

for you as a client you're going to get

play16:11

that immediately from the solution

play16:14

and to take it one step further I don't

play16:16

know if how familiar you are with the

play16:18

architecture behind Chronicle maybe

play16:20

you've tried it you know a few years

play16:22

back or you know relatively recently or

play16:24

maybe you've never seen it before

play16:26

um but I think you know the most

play16:28

important thing about Chronicle is the

play16:30

the speed that we can get the value from

play16:31

it and it's flexible integration model

play16:32

so when our clients ask us why Chronicle

play16:35

certainly we we work with other

play16:37

providers and platforms but why

play16:38

Chronicle right we we share a point of

play16:41

view because of a number of very

play16:43

specific capabilities one it's got a

play16:46

rich integration ecosystem over 400

play16:48

Integrations are available meaning odds

play16:50

are in your environment Chronicle is

play16:52

going to natively support it if not

play16:53

we'll build parsers with Chronicle

play16:55

Engineers to be able to support that

play16:57

environment that's one point

play16:59

you look at the performance and the

play17:00

scalability of the environment it's hard

play17:02

to argue with the responsiveness of the

play17:03

search and how fast it can horizontally

play17:04

scale we're also looking at the human

play17:06

factors how do you interact with the

play17:08

platform is that a good experience is

play17:10

that a you know an experience that you'd

play17:12

rather not have but you'll live with it

play17:13

right we want our clients to be

play17:15

delighted by that experience and really

play17:16

see that responsiveness

play17:18

um but really above all

play17:20

with Google's vision for how they're

play17:23

growing their security practice and

play17:24

their security technology

play17:26

um the vision that they have on making

play17:28

their clients more secure all their

play17:29

products are security first right we

play17:32

really have great confidence and their

play17:33

solution is going to grow as our needs

play17:35

grow for our client and working with

play17:37

directly with Chronicle Engineers on

play17:39

building the solution out and helping

play17:40

that scale to accentuate size we have

play17:43

hundreds of clients globally we do many

play17:46

many engagements across all of our uh

play17:48

across all of our delivery centers this

play17:51

is going to scale with us and so that's

play17:53

a really exciting part to know with

play17:54

confidence that as a client you're going

play17:56

to get a great experience and you're

play17:57

going to get a solution that scales um

play17:58

with your experience

play18:01

so for um kind of to to put a a little

play18:05

bit of reality on it right we fully

play18:08

recognize that clients have Investments

play18:10

that they've already made and platforms

play18:12

that they may already be very happy with

play18:14

and so maybe you if you're one of those

play18:16

clients you don't see the value in

play18:18

necessarily what we're doing here

play18:19

because this is a chronicle-based

play18:22

solution you've already chosen what you

play18:24

want to do or maybe you are one of the

play18:26

clients that has very specific

play18:27

requirements on what you need to do

play18:29

whether your data needs to stay in a

play18:30

certain region of the world or you have

play18:32

some regulatory restrictions on who can

play18:34

touch the platform and things like that

play18:36

right there's solutions for each client

play18:39

and that's what I think one of the key

play18:40

messages that I want to address is

play18:42

whether you are more aligned to one of

play18:46

the two models and the two models are on

play18:47

the left it's our full stack model

play18:49

that's our platform our people 24x7

play18:52

support globally delivered

play18:55

based on the scale we can offer that a

play18:57

really great price point right so that's

play18:58

that allows us to achieve the most value

play19:00

for clients it's typically what we want

play19:02

to leave with what we want to lead with

play19:04

in our discussions unless there are some

play19:06

driving requirements that would cause

play19:07

you to need or want your own platform in

play19:09

which case we're happy to work with you

play19:11

on that and that's the solution on the

play19:12

right which is hybrid and you know for

play19:15

the sake of being at the conference and

play19:16

presenting this material right you can

play19:18

insert your own vendor names into the

play19:20

other SIM and soar products but these

play19:22

are the reality of the environment that

play19:24

we're in and we're never going to go

play19:25

into a client environment and require

play19:27

them to replace what they already have

play19:28

that might be working well for them but

play19:30

we do want them to benefit from the

play19:31

managed service that we can deliver for

play19:33

them and we do want to make this as easy

play19:35

as possible for them so really that kind

play19:38

of middle slice of that soar integration

play19:39

layer that is what is really special

play19:41

about the service because that is a

play19:43

layer that allows us to bring our

play19:44

Content Library our service delivery all

play19:47

everything that we know about the threat

play19:48

landscape directly to a client without

play19:50

them having to re-architect their

play19:51

environment and so this is an

play19:53

approachable solution it's

play19:55

straightforward to onboard it's

play19:56

straightforward to utilize and we can

play19:58

configure the solution for our clients

play20:00

and really work with whatever the tech

play20:01

stack is in the environment many clients

play20:04

have multiple Sims for different reasons

play20:05

that's fine right we can use that sore

play20:08

integration layer to cut across all of

play20:09

that I think that that might be a

play20:11

value-added capability that you either

play20:12

have to build yourself or it's tough to

play20:14

find in the market because I don't know

play20:16

too many you know of the source

play20:17

solutions that can really do a good job

play20:19

of centralized security monitoring with

play20:21

multiple security platforms that you

play20:23

have to pay attention to

play20:26

so

play20:27

thinking ahead I think I've shared

play20:29

enough about what the you know the

play20:31

overall solution is and maybe the

play20:32

flexible ways that we can deliver it I

play20:34

want to leave you with hopefully a

play20:35

little bit of value in terms of what

play20:37

good looks like in security operations

play20:39

and ways that you can advance your sock

play20:40

regardless of your Tech stack right

play20:43

so

play20:44

when we look at what success looks like

play20:47

in security operations all roads point

play20:49

back to intelligence this is what we

play20:51

understand about our own environment

play20:52

this is what the experts at Mandy and

play20:55

Accenture and other threat intelligence

play20:56

providers tell you about your

play20:58

environment in terms of whether or not

play21:00

you're secure whether or not you're at

play21:01

risk but really if you can align on

play21:04

business value and you know from the top

play21:07

down what are the valuable assets what

play21:09

are the valuable business processes what

play21:10

are the aspects of the network that are

play21:12

particularly sensitive what are our what

play21:13

are our really sensitive subnet ranges

play21:15

when you can understand all of those

play21:16

things together you have a good

play21:18

perspective on the threat landscape

play21:19

because you know your business and you

play21:21

understand your industry and you

play21:22

understand the adversaries that

play21:23

typically Target your business in your

play21:25

industry

play21:25

and you understand the vulnerability

play21:27

posture of your organization and all of

play21:29

that is able to be integrated into the

play21:30

platform and you understand through your

play21:33

own analytics what you're experiencing

play21:34

and seeing on your network today you can

play21:37

bring all that together that's true

play21:39

leverage intelligence that's applied

play21:40

intelligence

play21:41

and when we have the conversation with

play21:43

our clients about what does Intel mean

play21:45

to you and they may have a very prolific

play21:47

answer to that or they may be struggling

play21:48

to respond to I don't know that we've

play21:50

really figured it out it's a feed that

play21:52

we have it when it you know dings we we

play21:55

pay attention but we don't get much more

play21:57

out of that right whether you know

play21:58

whether you're you're in either of those

play22:00

camps

play22:01

um where we start with our clients is a

play22:03

structured conversation on helping them

play22:05

understand that understand their threat

play22:07

landscape and so left to right in the

play22:09

bottom of this graphic are really how we

play22:11

have those conversations and so we take

play22:13

a threat actor and we understand their

play22:15

way of operating their their tactics

play22:17

techniques and procedures or ttps we

play22:19

understand we help them understand that

play22:20

right based on their industry based on

play22:22

their environment we if they can name an

play22:24

apt group or an adversary that they want

play22:26

to Target we can tell tell the client

play22:28

what we know about that and help them

play22:29

work through that what that helps with

play22:31

is prioritizing the content that we have

play22:33

and prioritizing the rule sets that we

play22:35

configure for them again it's all about

play22:36

prioritization so if we're building in

play22:38

the right direction because we're

play22:39

starting with the right content

play22:40

foundation in our seminar Technologies

play22:42

if we are aligning our capabilities in

play22:45

order in in terms of our response

play22:47

processes on the right order of

play22:49

operation based on the threats that we

play22:51

see we can be very successful and we

play22:52

help our clients stratify on that so we

play22:54

put that in a priority order and finally

play22:56

we help advise our clients on the

play22:58

benefit of a threat intelligence

play22:59

platform because whether it's Accenture

play23:01

is provided or it's another uh threat

play23:03

and tell platform that's provided in the

play23:05

market this is really where a lot of

play23:07

that comes together and you start making

play23:08

this real for your Enterprise and so I

play23:11

like to think about it this way right

play23:12

other organizations may know a lot about

play23:14

you because they are you know scraping

play23:17

the internet and they are scraping the

play23:18

dark web and they are dredging up all of

play23:20

all of that intelligence that's relevant

play23:21

for your business the one thing they

play23:23

can't see is inside of your Enterprise

play23:24

and those are where some of the hardest

play23:26

and most important Lessons Learned are

play23:27

and you have to have a way to

play23:29

memorialize that within your environment

play23:30

and so when we think about threat

play23:32

intelligence organic or original threat

play23:35

intelligence is some of the most

play23:36

valuable that we have and so we'd advise

play23:38

you to certainly collect that use that

play23:40

tell stories about that in your

play23:41

environment I meant talk about why

play23:42

that's important and why you never want

play23:44

to experience that kind of incident

play23:45

again and what you learn from it but

play23:47

also if you can share that back with us

play23:49

as a partner we can be more effective in

play23:51

preventing you from experiencing that

play23:53

and preventing our other clients from

play23:54

experiencing that in a way that protects

play23:56

your privacy and we can do when we can

play23:57

do that across our hundreds of clients

play23:59

globally that's a really powerful force

play24:01

and so I'd like to share with you one

play24:04

more thing which is maybe my favorite

play24:05

metric in what it means to be successful

play24:08

long term in detection and response

play24:10

so for those of you who are familiar

play24:12

with minor attacker but maybe you're not

play24:13

this is a 12-step process of decomposing

play24:16

what we know about a threat actor's

play24:18

activity this is the attack life cycle

play24:20

broken down into granular Bits And the

play24:22

reason we do this is because we can be

play24:24

more much more effective at defending

play24:26

against this when we understand the

play24:27

specific stages of an attack and how

play24:29

that typically plays out

play24:31

and when you look at the model and when

play24:33

you understand left to right left is

play24:34

we've done a really good job and we've

play24:36

you know eliminated risk early on in the

play24:38

cycle or you look right and it's a

play24:40

disaster and you know these are you know

play24:42

business impactful events

play24:44

um you start to think about okay well

play24:46

obviously how can we get as far left as

play24:48

we possibly can be and so by gathering

play24:51

your data and by organizing your data by

play24:54

where where are we detecting this and

play24:55

where are we remediating these threats

play24:57

we can be really effective in telling a

play24:59

message of are we getting any better I'm

play25:01

sure you've all been asked the question

play25:02

from your leadership are we secure and

play25:04

it's an impossible question but you can

play25:06

spin that slightly and say this is how

play25:09

much more secure we were from last year

play25:11

and this is how we do it right we we

play25:13

break it down into the average time to

play25:16

detect and the average time to remediate

play25:17

we plot that out and we can show them

play25:19

the growth over the time this is what

play25:21

that looks like

play25:22

so the y-axis is those 12 steps of the

play25:25

miter attack framework

play25:26

and as you see the plot lines what

play25:28

you're looking for is a downward Trend

play25:30

and in this case it's a good news story

play25:32

and this is what we would tend to expect

play25:33

over a year serving a client

play25:36

and uh that green line at the bottom

play25:39

that's the Baseline that's what we're

play25:40

seeking that's our Target that's what

play25:41

we're going for this is an organization

play25:43

set priority but it's really what we're

play25:45

striving for and so you see the first

play25:48

chord this is a quarterly plot so the

play25:50

first quarter you see we weren't doing

play25:51

very good we were being heavily impacted

play25:53

by uh the threat activity in our

play25:56

environment these are things that are

play25:57

causing big impacts to our business and

play25:58

consequences probably costing us a

play26:00

fortune maybe we're having to file

play26:02

claims against our in our cyber

play26:05

Insurance maybe we're really having some

play26:07

painful conversations about Lessons

play26:08

Learned maybe our leadership team looks

play26:11

different I don't know that that's a

play26:12

really bad news story if that's where

play26:13

we're starting as a data point and you

play26:15

see we're not being effective in

play26:16

detecting or responding to any threats

play26:19

as we move to the second quarter you can

play26:20

see we've had a significant noticeable

play26:22

Improvement in detection

play26:24

but remediation really hasn't moved that

play26:26

much maybe that's because we pooled all

play26:28

of our resources said we're really in

play26:30

tough shape let's at least try to find

play26:31

where these you know threats are

play26:32

targeting us and do a really good job up

play26:34

front at detection

play26:35

then but maybe we haven't had enough

play26:37

time or energy to devote to having the

play26:39

remediation conversations or we're

play26:41

having trouble building a relationship

play26:42

with the people that actually remediate

play26:44

because we really need that solid

play26:46

partnership with infrastructure with

play26:48

endpoints with applications with network

play26:49

with all the parts of our business to be

play26:51

effective in actually responding and

play26:53

remediating and so you know we're we're

play26:55

slightly improving but we've got a room

play26:57

to go and then in quarter three we see a

play26:59

noticeable Improvement in remediation

play27:01

maybe we've been successful in

play27:02

negotiating what good looks like and

play27:04

maybe enabling sorta do its job and do a

play27:07

really good job in protecting us from uh

play27:09

the threat activity but our detections

play27:11

have actually gotten worse overall

play27:14

because maybe we're getting targeted by

play27:16

a different group or maybe

play27:18

um we just didn't have you know the

play27:19

right detections in place for that so

play27:21

maybe the situation looked worse before

play27:23

it got better because we just brought a

play27:25

new capability on board

play27:26

and then finally we can tell a good news

play27:28

story in quarter four because not only

play27:30

have we you know brought the detection

play27:32

and Remediation statistics to the you

play27:34

know all-time low from our measurement

play27:36

but we can tell a really good story

play27:38

about how much better off we are now

play27:40

that we've been on this journey and

play27:41

whether you're doing this through a

play27:43

partner like Accenture

play27:45

um and and or consuming a service like

play27:47

Accenture mxdr that's powered by Google

play27:49

or you're using another solution this is

play27:51

absolutely something that you should

play27:52

consider tracking because we all have to

play27:54

tell the story about how much better are

play27:56

we this is a really effective way

play27:58

um and and helping and it's a way to

play28:00

socialize some of the vernacular that we

play28:02

use in security

play28:03

with our executives

play28:06

so obviously I'd be remiss if I did not

play28:09

mention generative Ai and how we're

play28:10

leveraging generative AI but I'm happy

play28:12

to say that this is a real capability

play28:13

that we are using to not only scale but

play28:16

also help improve the quality of our

play28:18

delivery very very rapidly and so in

play28:22

addition to all of the great generative

play28:23

AI capabilities that we're leveraging

play28:25

building on vertex Ai and and the whole

play28:28

Google ecosystem we are also building

play28:30

our own security AI assistant and this

play28:32

is for our security operators that are

play28:34

serving our clients to be able to be

play28:36

most effective and efficient in what

play28:38

they do and I think some of the toughest

play28:40

challenges in the field are knowing what

play28:42

to prioritize being able to act quickly

play28:45

spending most of our time on value-added

play28:47

activities and really being able to be

play28:49

confident about yes we took the right

play28:50

action and we we did that correctly and

play28:53

that whole closed-loop feedback process

play28:55

for the analyst and those are some of

play28:57

the use cases that we're working on so

play28:58

as you look around the the wheel of the

play29:00

the use cases that we're working on

play29:01

those are real things that we're

play29:03

powering generative Ai and our models

play29:06

that we're utilizing both you know

play29:07

models directly in vertex Ai and our own

play29:10

models that we've trained on security

play29:11

data to be able to say this is how our

play29:13

operations team is doing and this is

play29:15

going to be their assistant to be able

play29:16

to help them through an investigation

play29:18

and rapidly reduce and if you want to

play29:20

see a demo of this capability we're in

play29:21

Booth 401 I'd love for you to stop by

play29:23

and see this capability and kind of how

play29:25

our operators are going to be able to

play29:27

interact with that in November we're

play29:29

launching two of the modules here one is

play29:31

the incident response reporting for our

play29:33

client so in other words making sense of

play29:35

this and being able to roll this up and

play29:36

communicate this clearly to Executives

play29:38

that's going to add a lot of value as

play29:40

well as our ability to translate across

play29:42

the many languages that we have to work

play29:44

with right when we work with truly

play29:45

Global clients that have operations in

play29:47

all kinds of countries obviously it's

play29:49

best to communicate in the primary

play29:51

language that they're they're working in

play29:53

and many times there can be things Lost

play29:54

in Translation it's difficult to

play29:56

communicate across environments so

play29:57

imagine logging into the portal and

play29:59

anybody on your team seeing the

play30:01

dashboard in their native language it's

play30:03

a really powerful capability that quite

play30:05

frankly not many firms can offer

play30:08

so I wanted to kind of incorporate a

play30:11

quote that I think puts a really nice

play30:13

point on what we have to deal with in

play30:15

security so Darwin's theory of evolution

play30:18

uh and is is working in in evolution uh

play30:23

really helped us understand

play30:26

and an accelerated path life on earth

play30:28

right he helped us explain a lot of what

play30:30

we're seeing in life on earth and the

play30:33

highest the trait that was most highly

play30:34

correlated to survivalist species was

play30:37

the ability to adapt change that's what

play30:39

we have to do every day in Security in

play30:41

technology in the fields that we're in

play30:43

and that's really hard to keep up with

play30:45

and so that principle really sticks well

play30:48

with our industry right the technologies

play30:50

that power our businesses and the

play30:51

economic factors that Prevail and just

play30:53

how we interact with each other our

play30:55

ability to adapt to change and move the

play30:56

business that maybe is maybe your

play30:58

business is acquiring another firm it's

play31:00

divesting part of a business maybe it's

play31:02

getting a new line of business maybe

play31:03

it's you know moving into a different

play31:05

geography as you grow and scale you need

play31:07

a partner that can adapt to that change

play31:09

with you that is at the core of our uh

play31:12

ethos if you will that's that's the

play31:14

heart of what we do

play31:15

and when you're looking at a partner in

play31:17

detection and response and when you're

play31:19

evaluating all of the different factors

play31:21

that go into a decision about selecting

play31:23

a partner I really wanted to be able to

play31:25

give something back to you that I've

play31:26

experienced in many of the conversations

play31:28

that we have with clients about why

play31:30

Accenture why your service why the

play31:32

technology platform why are you going to

play31:34

be the right partner for us and I'm

play31:36

happy to say

play31:38

um that some of these Lessons Learned

play31:39

you know we'd have confidence we'd have

play31:41

confident response to all these

play31:42

questions but our lessons learned are

play31:44

not all providers are considered equal

play31:45

right and so as you adapt to change

play31:48

think about you know conversations with

play31:50

your provider about can they explain to

play31:52

you simply and transparently how they're

play31:54

detecting threats in your environment

play31:56

can they tell you what they're going to

play31:58

do with another a new piece of threat

play31:59

data or an indicator of compromise that

play32:01

they see the right answer is we're going

play32:03

to Retro hunt against all the logs that

play32:05

we have for you and we're going to tell

play32:07

you if we've ever seen that threat in

play32:08

your environment we're going to

play32:09

proactively protect you from that in the

play32:11

future and if you have a sore capability

play32:13

we're going to automatically block that

play32:15

we're going to block that IP on the

play32:16

firewall we're going to you know lock

play32:18

that user account those kinds of things

play32:20

right you need a confident response from

play32:22

that on your partner

play32:23

what is the value of intelligence do

play32:25

they prioritize it is it and also Rand

play32:27

do they have you know capabilities

play32:28

coming in from other feeds that they're

play32:30

able to be used in that environment it's

play32:32

very important are they aligned to your

play32:34

industry do they understand your

play32:35

business in the industry that you

play32:36

operate in do they understand the

play32:38

difference between an oil and gas

play32:39

pipeline versus a medical device in a

play32:41

hospital versus you know e-commerce

play32:43

platform in the cloud right can they

play32:45

speak those languages can they

play32:46

understand where you are at as a client

play32:48

and really partner deeply with you it's

play32:51

a very very important decision and then

play32:52

can they serve your whole Enterprise and

play32:54

maybe most importantly these days is

play32:56

how are you going to keep costs down

play32:58

year to year what are the things that

play32:59

you're doing to become more efficient

play33:00

because I don't want to see escalating

play33:02

costs every year you know your service

play33:04

needs to be getting more efficient and

play33:05

you need to prove to me how you're going

play33:06

to do that generated AI is one way to do

play33:08

that and that's certainly one of the

play33:09

many things that we're doing but this

play33:11

Global model is super important to us

play33:12

for doing that

play33:14

so with that cheat sheet in mind you

play33:15

know I started with

play33:17

how are you going to approach this or

play33:19

what would it take to you know what

play33:20

would it take to see across the

play33:21

Enterprise what would it take to

play33:23

understand understand the threat and

play33:24

accelerate a response and to be able to

play33:26

you know adapt and be able to keep ahead

play33:28

of threat actors

play33:30

um you know what you need is a great

play33:32

partner who has experience in delivering

play33:34

the service at scale designing building

play33:36

and running not just running but

play33:37

designing and building security

play33:38

operations that's very important you get

play33:41

a lot of perspective by having to build

play33:42

things from the ground up and then

play33:44

understanding the value of managed

play33:45

service and the integration of that

play33:47

super important we need to be able to

play33:49

understand the threat and not only

play33:50

contextualize what you're seeing but add

play33:52

value to that through the threat

play33:53

intelligence that's being curated all

play33:55

the way from the Strategic level of

play33:57

what's going on geopolitically what's

play33:58

going on in the threat actor communities

play34:00

what's going on in the dark web forums

play34:01

but also very tactical intelligence that

play34:04

we can use in your environment

play34:05

how can we accelerate response is soar a

play34:08

core part of the strategy or is it

play34:09

something that we do because a lot of

play34:11

clients ask for and we bolt it on and we

play34:13

use it if clients ask for it but it's

play34:14

really kind of something on the side

play34:16

because for us it's a core part of our

play34:18

strategy and we need to make sure that

play34:19

our clients see the value of that they

play34:21

understand that there's a lot of

play34:22

flexibility in how we do that that is a

play34:24

consultative process of what action

play34:26

would you like us to take would you like

play34:28

to be involved in the response process

play34:30

one of the really interesting things

play34:32

that we can do with Chronicle soar if

play34:33

you're not familiar we can put a human

play34:35

in the loop for specific steps in a

play34:36

Playbook so that if there is a detection

play34:39

that fires on one of your critical

play34:40

assets and for a end user workstation we

play34:43

would contain it immediately we don't

play34:45

want that anywhere near our network but

play34:47

this is a critical web server this is

play34:48

serving up a critical application that

play34:50

runs our business what do we do in that

play34:51

scenario well I want my Security

play34:53

administrator or I want my like lead

play34:56

security analyst in the sock our top

play34:58

tier analyst to be able to make sense of

play35:00

this and work with our application team

play35:01

to coordinate maybe the restoration of

play35:04

services the takedown or how we

play35:05

reconstitute the service and relaunch

play35:07

that that new clean instance right so we

play35:10

can put that human in the loop to be

play35:12

able to take that action and really

play35:13

involve our clients in the response

play35:15

process that's a really exciting

play35:16

capability and then finally from the

play35:18

proactive standpoint how are we bringing

play35:20

together all of our operations data

play35:22

right how are we really leveraging the

play35:24

scale that we're operating at if your

play35:26

provider serves two you know hundreds

play35:28

and hundreds of clients every year I

play35:31

would expect a service that also can

play35:32

leverage the benefits of the hundreds

play35:34

and hundreds of client engagements I

play35:36

wouldn't want my engagement to only be

play35:37

in its in its separate box without the

play35:39

ability to really benefit from that and

play35:41

that's really what we've tried to build

play35:42

here so hopefully you gained something

play35:44

from this I love you know additional

play35:46

questions or anything that you might

play35:47

want to share

play35:48

um really if you're you know we'd love

play35:50

to you know be challenged on what we're

play35:51

doing here and seeing you know why you

play35:53

may you may doubt that this would work

play35:54

in your environment but I really thank

play35:56

you for the time

play35:57

um Accenture we're really really excited

play35:59

about the mxdr platform powered by

play36:01

Google technology a lot of exciting

play36:02

announcements from Google here encourage

play36:04

you to do that we have great partners

play36:06

total and really bring all those

play36:08

capabilities to bear so thank you very

play36:10

much for the time and hope to see you

play36:12

around and answer your questions maybe

play36:13

it Booth 401 or off to the side here

play36:15

later thank you

play36:19

foreign

Rate This

5.0 / 5 (0 votes)

Related Tags
CybersecurityManaged ServicesGoogle PartnershipAccenture MXDRThreat IntelligenceSecurity OperationsData IntegrationResponse AutomationCyber StrategyTech Innovation