This article examines practical use cases: How we’ve used SIEM solutions for incident management. It demonstrate how SIEM strengthens security operations and prevents costly incidents.
Security Information and Event Management (SIEM) solutions are often seen as complex and expensive. However, their true value lies in mitigating financial, compliance, and third-party risks through early detection and automation.
We refer to actual security projects (both planned, and incident response) in this article, in order to provide a detailed account of how MSIEM and MDR solutions effectively address data exfiltration and sophisticated phishing attacks, using real-world scenarios and practical implementations.
Security Information and Event Management (SIEM) solutions are often seen as complex and expensive. However, their true value lies in mitigating financial, compliance, and third-party risks through early detection and automation. This article examines practical use cases that demonstrate how SIEM strengthens security operations and prevents costly incidents.
We refer to actual security projects (both planned, and incident response) in this article, in order to provide a detailed account of how MSIEM and MDR solutions effectively address data exfiltration and sophisticated phishing attacks, using real-world scenarios and practical implementations.
Many organizations grapple with the challenges of detecting and preventing data exfiltration and phishing attacks. This post will delve into four specific case studies where existing security measures fell short, allow us to describe how we implemented solutions using MSIEM and MDR, including the steps taken and results achieved.
Security Information and Event Management (SIEM) solutions are often seen as complex and expensive. However, their true value lies in mitigating financial, compliance, and third-party risks through early detection and automation. This article examines practical use cases that demonstrate how SIEM strengthens security operations and prevents costly incidents.
When discussing security, it’s easy to get lost in technical details, but at its core, SIEM is about managing risks before they turn into full-blown crises. Whether you’re dealing with cyberattacks, compliance regulations, or third-party security concerns, SIEM plays a critical role in keeping things under control.
Every organization faces risks, and those risks can be treated, accepted, managed, or ignored. Ignoring them is rarely a good strategy—just ask any company that has faced a major data breach. Proactively managing risk is where SIEM excels. It allows organizations to spot and mitigate threats before they escalate into security incidents that cost money, damage reputations, or lead to compliance penalties.
We use our MSIEM service to support a number of customer needs:
Let’s look at four past projects:
One of the most persistent threats to financial security is account compromise, particularly within business email environments. Attackers routinely exploit stolen credentials to manipulate financial processes, often by redirecting payments or modifying invoice details. Incidents involving compromised Microsoft 365 accounts have led to substantial financial losses worldwide, and fraudulent forwarding rules, unauthorized access to sensitive emails, and payment fraud schemes can have devastating effects on organizations.
dotSec’s challenge was to establish a robust monitoring framework capable of detecting and preventing these attacks before financial transactions were affected. SIEM was leveraged to track suspicious account activity and alert security teams in real-time.
A company’s finance team is targeted by attackers attempting payment fraud via compromised Microsoft 365 accounts.
Monitors Microsoft 365 audit logs for newly created rules and filters, and newly (sometimes oddly-named) folders.
Flags suspicious rules, such as forwarding emails with “invoice” in the subject line to an external account.
Alerts security teams to fraudulent activity before a financial transaction occurs.
The organization detects and stops financial fraud before funds are transferred to an attacker.
One of the most significant challenges in cybersecurity is detecting data exfiltration. This issue is not theoretical; major breaches such as those at HWLE (2.2 million files), Equifax (165 million contacts), Optus (10 million contacts), and NPD (2.9 billion contacts) demonstrate the scale and impact of such incidents. These events lead to class action lawsuits, regulatory fines, mandatory reporting obligations, and significant damage to company brands and valuations.
The task at hand was to develop an automated monitoring service capable of detecting indicators of data exfiltration activity without generating excessive false positive alerts. This required a deep understanding of what constituted normal behavior and the ability to identify deviations that signaled potential threats.
An organisation’s security team must identify stolen credentials before attackers gain full access.
Detects user authentication attempts from unexpected locations (e.g., outside Australia).
Flags repeated failed login attempts with Error Code “50074”, which indicates an MFA failure.
Identifies patterns suggesting an MFA fatigue attack (i.e., excessive authentication prompts until the user mistakenly approves one).
The security team receives alerts before data is exfiltrated, preventing unauthorized access.
Configuration errors (without malicious intent) on critical business systems can be as dangerous as an actual malicious attack. A simple misconfiguration—whether caused by human error or unauthorized activity—can inadvertently expose internal systems to external threats. Firewall changes, network rule misconfigurations, and improper access controls can all widen an organization’s attack surface.
To address this, organizations needed a method to continuously monitor system changes, ensuring that any unintended modifications were detected and corrected before they could be exploited. SIEM played a key role in identifying unusual administrative activity, allowing teams to respond before damage was done.
An administrator makes a configuration change on a network firewall, unintentionally exposing sensitive VLANs to internet traffic.
Tracks administrator activity logs and network traffic signals.
Detects misconfigurations affecting compliance scope (e.g., PCI DSS violations).
Identifies attackers attempting to exploit unintended network access.
Triggers alerts so administrators can revert misconfigurations before an attack occurs.
The security team is alerted before an attacker can exploit the misconfiguration, preventing a potential data breach.
Security vulnerabilities are inevitable, but failing to address them in a timely manner is not. Unattended vulnerabilities can lead to significant compliance violations and increased risk exposure. Many high-profile breaches have resulted from unpatched vulnerabilities that attackers exploited long after fixes were available. Regulations such as PCI DSS 4.0 demand timely remediation, but tracking vulnerability life cycles across large infrastructures is a complex challenge.
dotSec’s goal was to create an automated monitoring and alerting system that ensured vulnerabilities were prioritised and patched within defined SLAs. SIEM was used to track scan results, monitor patching status, and provide early warnings on ageing vulnerabilities before they became a security liability.
An organization needs to ensure that all high-risk vulnerabilities are patched within the required timeframes.
Security teams address vulnerabilities before they cause compliance issues, reducing exposure to potential exploits.
As we noted in a previous post, ASIC has commenced a law suit in the Federal Court of Australia, alleging that, “from March 2019 to 8 June 2023, FIIG Securities Limited failed to take the appropriate steps, as is required by an Australian Financial Services (AFS) licensee, to ensure it had adequate cyber risk management systems in place. ”
As ASIC noted in the Concise Statement, “Had FIIG had the Missing Cybersecurity Measures in place, it would have detected suspicious activity on its network on or shortly after 19 May 2023, identified that its system had been compromised by on or about 23 May 2023, and prevented the threat actor from downloading some or all of the stolen data or, alternatively, had the opportunity to do so.”
We’ve said it before: We are quite proud of our achievements and qualifications:
SIEM can be a pro-active business enabler that will help you dictate the costs and terms upon which your security-maturity costs are incurred. Give us a call and we can tell you more about the case studies we’ve outlined above, as well as many more, and show you how SIEM can help you do more business, more securely.
Practical and experienced Australian ISO 27001 and ISMS consulting services. We will help you to establish, implement and maintain an effective information security management system (ISMS).
DotSec’s penetration tests are conducted by experienced, Australian testers who understand real-world attacks and secure-system development. Clear, actionable recommendations, every time.
dotSec stands out among other PCI DSS companies in Australia: We are not only a PCI QSA company, we are a PCI DSS-compliant service provider so we have first-hand compliance experience.
Web Application Firewalls (WAFs) are critical for protecting web applications and services, by inspecting and filtering out malicious requests before they reach your web servers
Multi-Factor Authentication (MFA) and Single Sign-On (SSO) reduce password risks, simplify access, letting verified and authorised users reach sensitive systems, services and apps.
dotSec provides comprehensive vulnerability management services. As part of this service, we analyse findings in the context of your specific environment, priorities and threat landscape.
We don’t just test whether users will click a suspicious link — we also run exercises, simulating phishing attacks that are capable of bypassing multi-factor authentication (MFA) protections.
DotSec’s penetration testing services help you identify and reduce technical security risks across your applications, cloud services and internal networks. Clear, actionable recommendations, every time!
dotSec has provided Australian managed SOC, SIEM and EDR services for 15 years. PCI DSS-compliant and ISO 27001-certified. Advanced log analytics, threat detection and expert investigation services.
We provide prioritised, practical guidance on how to implement secure configurations properly. Choose from automated deployment via Intune for Windows, Ansible for Linux or Cloud Formation for AWS.
Secure web hosting is fundamental to protecting online assets and customer data. We have over a decade of AWS experience providing highly secure, scalable, and reliable cloud infrastructure.
DotSec helps organisations to benefit from the ACSC Essential Eight by assessing maturity levels, applying practical security controls, assessing compliance, and improving resilience against attacks.
Evaluation against the CIS 18 Controls establishes a clear baseline for stakeholders, supporting evidence-based planning, budgeting, maturity-improvement and compliance decisions
We have over 25 years of cyber security experience, providing practical risk-based guidance, advisory and CISO services to a wide range of public and private organisations across Australia.
Practical and experienced Australian ISO 27001 and ISMS consulting services. We will help you to establish, implement and maintain an effective information security management system (ISMS).
DotSec’s penetration tests are conducted by experienced, Australian testers who understand real-world attacks and secure-system development. Clear, actionable recommendations, every time.
dotSec stands out among other PCI DSS companies in Australia: We are not only a PCI QSA company, we are a PCI DSS-compliant service provider so we have first-hand compliance experience.
Web Application Firewalls (WAFs) are critical for protecting web applications and services, by inspecting and filtering out malicious requests before they reach your web servers
Multi-Factor Authentication (MFA) and Single Sign-On (SSO) reduce password risks, simplify access, letting verified and authorised users reach sensitive systems, services and apps.
dotSec provides comprehensive vulnerability management services. As part of this service, we analyse findings in the context of your specific environment, priorities and threat landscape.
We don’t just test whether users will click a suspicious link — we also run exercises, simulating phishing attacks that are capable of bypassing multi-factor authentication (MFA) protections.
DotSec’s penetration testing services help you identify and reduce technical security risks across your applications, cloud services and internal networks. Clear, actionable recommendations, every time!
dotSec has provided Australian managed SOC, SIEM and EDR services for 15 years. PCI DSS-compliant and ISO 27001-certified. Advanced log analytics, threat detection and expert investigation services.
We provide prioritised, practical guidance on how to implement secure configurations properly. Choose from automated deployment via Intune for Windows, Ansible for Linux or Cloud Formation for AWS.
Secure web hosting is fundamental to protecting online assets and customer data. We have over a decade of AWS experience providing highly secure, scalable, and reliable cloud infrastructure.
DotSec helps organisations to benefit from the ACSC Essential Eight by assessing maturity levels, applying practical security controls, assessing compliance, and improving resilience against attacks.
Evaluation against the CIS 18 Controls establishes a clear baseline for stakeholders, supporting evidence-based planning, budgeting, maturity-improvement and compliance decisions
We have over 25 years of cyber security experience, providing practical risk-based guidance, advisory and CISO services to a wide range of public and private organisations across Australia.