SHARING CYBER THREAT INTELLIGENCE JUST GOT A LOT EASIER

Slides:



Advertisements
Similar presentations
The Important Thing About By. The Important Thing About ******** The important thing about ***** is *****. It is true s/he can *****, *****, and *****.
Advertisements

MnM (and FHIR) Roundtable report Baltimore WGM Sept. 13, 2012.
Just to get it right...  We already have an ITS: the XML ITS  We will discuss another ITS: the RIM ITS.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
“White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT Christopher R. Barber, CISSP, C|EHv7 Threat Analyst Solutionary.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Strategy and Policy Unit: Current Activities and Future Tasks
A Study in NoSQL & Distributed Database Systems John Hawkins.
JSON (JavaScript Object Notation).  A lightweight data-interchange format  A subset of the object literal notation of JavaScript (or ECMA-262).  A.
Cyber Security Analytics Presenter: Aaron Burrows25 February 2015.
LinkSpace, LLC Proprietary and Confidential © 2014, all rights reserved.
Information Dissemination Strategy An Update Presenter: Bruce Locke.
Active Ports 1.4 ZoneLog. Active Ports Overview What it does Where to get it Why use it How to use it Screen Shots Observations Lessons Learned.
 You find patterns.  You use rhymes.  You use stories.  You relate them to what you already know.
TAXII SC Call Agenda Administrivia Month Behind Discussion Month Ahead.
CTI STIX SC Monthly Meeting October 21, 2015.
CTI STIX SC Status Report October 22, 2015.
TAXII SC Call 9/8/2015. Agenda Administrivia Survey Recap Discussion Recap Protocol Discussion Slack channel Month Ahead.
CTI STIX SC Status Report December 10, 2015.
Abusing 3rd-Party Services For Command And Control
WISE Information Security for Collaborating E-Infrastructures
Cybersecurity Information Sharing Act of 2015(CISA) and Automated Indicator Sharing (AIS) Presentation is about 45 minutes with 15 Q&A.
Figure 1. Critical Infrastructure Organizations Believe that the Cyber-threat Landscape Is Getting Worse From: ESG Brief: Critical Infrastructure Organizations.
CTI STIX SC Monthly Meeting
Michael Lutz INSPIRE MIG-T meeting #38 Ghent March 2017
STIX Interoperability
Service Delivery and Governance
Service Delivery and Governance
Emergency Management Technical Committee
OASIS Context Server Technical Committee First Meeting
Cloud Application Marketplaces
TAB Internal Report to board May 2010 final
Cyber Threat Intelligence Sharing Standards-based Repository
Chapter 16 – Software Reuse
Business Management Courses Gives Competitive Edge.
COMMUNICATION.
Additional Programming Language Support
OASIS, Emergency Management Technical Committee
Cyber Standards User Council CTI-TC STIX Subcommittee Update
Patent services for business community
CAMSS ISA² - Action Common Assessment Method for
INTERNET OF THINGS CYBERSECURITY
فرایند تسهیلگری در مددکاری جامعه ای
CTI TC Monthly Meeting Updates Session #1: 11:00 AM EST
Cloud Application Marketplaces
Service Model Monitoring Cloud Application Marketplaces
Briefing on STIX | TAXII
1 مفهوم ارتباطات ارتباطات معادل واژه communications ) ميباشد(. ارتباطات يك فرايند اجتماعي و دو طرفه است كه در آن اطلاعات مبادله شده و نوعي تفاهم بين طرفهاي.
Soar Agents for Cyberspace 5/15/2018
Cloud Application Marketplaces
Cloud Application Marketplaces
TAXII SC Meeting 8/11/2015.
TC Process Specification Flow
Meeting Agenda - June 8, 2016 Register Attendance
Cloud Application Marketplaces
Service Delivery and Governance
Organization for the Advancement of Structured Information Standards 23 September 2015 Thank you for being here today for the.
CTI Specification Organization
<?xml version="1.0"?><AllQuestions />
Cloud Application Marketplaces
Stephen W Thomas Using BizTalk Server as your Foundation to the Clouds
CTI STIX SC Monthly Meeting
Coordinated Security Response
The Crime and Deviance Channel
CTI STIX SC Monthly Meeting
Cloud Application Marketplaces
Mitre Att&ck Matrix RA PS...Trebuchet Font makes crazy ampersands but I was to lazy to change it.
Cooperative & Experiential Education
#01# ASP.NET Core Overview Design by: TEDU Trainer: Bach Ngoc Toan
Quick Introduction to DFDL
Presentation transcript:

SHARING CYBER THREAT INTELLIGENCE JUST GOT A LOT EASIER www.oasis-open.org SHARING CYBER THREAT INTELLIGENCE JUST GOT A LOT EASIER

STIX 2.0 – Where we are TC has voted to approve a Committee Specification Draft & will open a public review Community is already developing documentation, tooling, and is working on 2.1

STIX 2.0 …is JSON, not XML …has improved patterning …is smaller and more focused …has a complete specification …is explicitly nodes and edges …is true to its roots

Before and After: JSON Before After

Before and After: Patterning

STIX is true to its roots Before After

STIX 2.1: Where we’re going www.oasis-open.org STIX 2.1: Where we’re going Filling in the blanks Malware, Course of Action Expanding to new use cases Incident, Infrastructure Focusing on the community Confidence, Opinion, Intel Notes

…uses native HTTP features …is HTTPS by default www.oasis-open.org TAXII 2.0 …uses native HTTP features …is HTTPS by default …has channels & collections …is built to support trust groups