Security is hard. Some say once we can predict threats all will be better. Should we believe? Maybe. But security teams need to demystify the concept of “threat prediction” by addressing three common misunderstandings, and move their company’s view of predictive security from science fiction to IRL. Credit: Thinkstock While the definition of “prediction” might seem like an obvious concept, in the context of security I’ve found that most people’s expectations seldom align with reality. You can blame pop culture if you like. Some misunderstandings surrounding prediction come from movies or television where fiction and fact is blurred. In reality, security analysts cannot predict successful attacks before they happen (yet). Your average security operations center (SOC) does not look like the set of the film, Minority Report.When someone talks about threat prediction in the computer security world, they might imagine automatically and instantly detecting threats. On TV shows, we see words like unknown, motivation, adversary, attack and threat – flashing across a screen, while a tech savvy protagonist breezes through lines of code that are shown crossing the circuits and wires behind the “dark web.” When we talk to some technology providers we hear terms like artificial intelligence, machine learning and analytics, which offer the potential to see into the future. While many of these technologies exist today, our ideas on what they can predict is off-base.Despite all of the sensationalist language surrounding threat prediction, I have yet to meet someone who has reconciled the sci-fi image of prediction and thwarted a cyber threat. Security as an industry, as a community, needs to demystify the three common misunderstandings about prediction by breaking it down into its core components. Once we have established that factual security is not a form of clairvoyance, the responsibility of just one team, or a perfect defense, other teams will begin to appreciate that while security experts aren’t the heroes most people expected, they are the defenders we all need right now. In the first part of this series, we will explore how to deconstruct the myths surrounding prediction, and in part two, we will focus on how a functional understanding of security prediction operates in practice.Seeing Into the futureThe first misunderstanding I notice when having discussions with people is that they imagine predictive security as some form of clairvoyance, that modern security teams should instantly identify, analyze and qualify an infinite number of different possibilities in order to pinpoint the most likely scenario. Instead of viewing predictive security as a an all-seeing and all-knowing capability, here is what really happens:Prediction, is predicated on the SOC’s capacity to understand a cohesive picture of their environment. In order to effectively determine when any breaches have occurred, security teams need to create a holistic understanding of the networks, systems, services and applications they are responsible for monitoring. And security teams have to understand how those resources are used. For example, an email admin may not be required to understand database services to do their job effectively, or a network engineer can do their job without understanding the details of authentication services. But security practitioners have to have cross functional expertise as well as visibility to do their job. Connecting the dotsPredictive security is often misunderstood as providing the savant-like capacity to create a perfect solution for any problem using a cursory look at the situation. In reality, security teams need to constantly refresh their understanding of threats, technologies and interactions to distinguish the legitimate or potentially harmful from the benign.Security analytics forms the basis of combining understanding with visibility. Analytics is core to the adaptive response for the security markets group at Splunk and many other security technologies. But to have the visibility for analytics, security and other teams need to come to a mutual understanding – every business unit needs to work with security. The collaboration can create a unified picture of what actors, objects and interactions exist in an environment, and connect the dots with analytics that are meaningful.Control the probabilitiesFinally, we need to dispel the notion that predictive security can directly prevent something from happening in the future. Instead, we need to frame security as the practice of applying the likelihood (probability) of the actions, by the actor, on the objects within an environment. Shifting this understanding of security will allow businesses to let go of the notion of security as a perfect wall of defense, and instead adopt a more practical view of security – starting from knowing what’s in the environment through recovering when bad things happen. Embracing this understanding enables business owners and SOC analysts to take the highest advantage of their technology and process investments, and guide future ones.So, let’s review. Prediction requires knowledge, it requires the ability to connect the dots, and it requires a probabilistic approach to what may happen. It requires security teams and non-security teams to work together to gain visibility and apply analytics to connect the dots. In the next article in this series, we will apply these principles and walk through specific examples of how you can develop a more predictive security posture. Related content opinion User behavior analytics is not a silver bullet The security industry has a knack for spinning up new solutions and repurposing old tools to solve new use cases. While the race to commoditize new solutions helps drive the industry forward, misconceptions about user behavior analytics show why team By Monzy Merza Sep 10, 2018 4 mins Analytics Security opinion The new definition for threat prediction Security is hard enough without inaccurate understandings of your team setting unrealistic expectations for success. Security teams need to demystify the concept of “threat prediction” by addressing three common misunderstandings and move By Monzy Merza Aug 01, 2018 5 mins Data Breach Technology Industry Hacking opinion The art of machine speed execution Understaffed security teams are struggling to secure their organizations’ expanding technology footprints, and often times the new tools they have been given to manage data bring with them a tidal wave of new data to sift through. In order for By Monzy Merza May 22, 2018 5 mins Machine Learning IT Leadership Security opinion Redefining mission critical systems in the world of analytics-driven security How should security operations determine what systems require the most attention? By Monzy Merza Apr 27, 2018 4 mins Risk Management Analytics Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe