Lock and Code

SIEM is not storage, with Jess Dodson


Listen Later

In the world of business cybersecurity, the powerful technology known as “Security Information and Event Management” is sometimes thwarted by the most unexpected actors—the very people setting it up.

Security Information and Event Management—or SIEM—is a term used to describe data-collecting products that businesses rely on to make sense of everything going on inside their network, in the hopes of catching and stopping cyberattacks. SIEM systems can log events and information across an entire organization and its networks. When properly set up, SIEMs can collect activity data from work-issued devices, vital servers, and even the software that an organization rolls out to its workforce. The purpose of all this collection is to catch what might easily be missed.

For instance, SIEMs can collect information about repeated login attempts occurring at 2:00 am from a set of login credentials that belong to an employee who doesn’t typically start their day until 8:00 am. SIEMs can also collect whether the login credentials of an employee with typically low access privileges are being used to attempt to log into security systems far beyond their job scope. SIEMs must also take in the data from an Endpoint Detection and Response (EDR) tool, and they can hoover up nearly anything that a security team wants—from printer logs, to firewall logs, to individual uses of PowerShell.

But just because a SIEM can collect something, doesn’t necessarily mean that it should.

Log activity for an organization of 1,000 employees is tremendous, and the collection of frequent activity could bog down a SIEM with noise, slow down a security team with useless data, and rack up serious expenses for a company.

Today, on the Lock and Code podcast with host David Ruiz, we speak with Microsoft cloud solution architect Jess Dodson about how companies and organizations can set up, manage, and maintain their SIEMs, along with what advertising pitfalls to avoid when doing their shopping. Plus, Dodson warns about one of the simplest mistakes in trying to save budget—setting up arbitrary data caps on collection that could leave an organization blind.

“A small SMB organization … were trying to save costs, so they went and looked at what they were collecting and they found their biggest ingestion point,” Dodson said. “And what their biggest ingestion point was was their Windows security events, and then they looked further and looked for the event IDs that were costing them the most, and so they got rid of those.”

Dodson continued:

“Problem was the ones they got rid of were their Log On/Log Off events, which I think most people would agree is kind of important from a security perspective.”

Tune in today to listen to the full conversation.

You can also find us on Apple PodcastsSpotify, and whatever preferred podcast platform you use.

For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.

Show notes and credits:

Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)

Licensed under Creative Commons: By Attribution 4.0 License

http://creativecommons.org/licenses/by/4.0/

Outro Music: “Good God” by Wowa (unminus.com)

Listen up—Malwarebytes doesn't just talk cybersecurity, we provide it.

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium for Lock and Code listeners.

...more
View all episodesView all episodes
Download on the App Store

Lock and CodeBy Malwarebytes

  • 4.7
  • 4.7
  • 4.7
  • 4.7
  • 4.7

4.7

42 ratings


More shows like Lock and Code

View all
Freakonomics Radio by Freakonomics Radio + Stitcher

Freakonomics Radio

32,011 Listeners

WSJ Opinion: Potomac Watch by Paul Gigot, The Wall Street Journal

WSJ Opinion: Potomac Watch

2,836 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,010 Listeners

Talking Real Money - Investing Talk by Don McDonald

Talking Real Money - Investing Talk

758 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,024 Listeners

The Clark Howard Podcast by Clark Howard

The Clark Howard Podcast

5,450 Listeners

Click Here by Recorded Future News

Click Here

418 Listeners

Bold Names by The Wall Street Journal

Bold Names

1,446 Listeners

Hacking Humans by N2K Networks

Hacking Humans

315 Listeners

All-In with Chamath, Jason, Sacks & Friedberg by All-In Podcast, LLC

All-In with Chamath, Jason, Sacks & Friedberg

9,938 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

139 Listeners

What the Hack? by DeleteMe

What the Hack?

221 Listeners

The 404 Media Podcast by 404 Media

The 404 Media Podcast

386 Listeners

The Kim Komando Show by Kim Komando

The Kim Komando Show

160 Listeners

Decoding Retirement by Yahoo Finance

Decoding Retirement

21 Listeners