CYBER THREAT INTELLIGENCE

Slides:



Advertisements
Similar presentations
Security Life Cycle for Advanced Threats
Advertisements

© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Building a Threat Intel Team Ryan Olson Director of Threat Intelligence October, 2014.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Dell Connected Security Solutions Simplify & unify.
© 2014 IBM Corporation Smarter Workforce Services Business Process Innovation.
Network security Product Group 2 McAfee Network Security Platform.
© 2010 IBM Corporation Business Analytics software Business Analytics Editable Text Editable Text Editable Text.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
FFIEC Cybersecurity Assessment Tool Maine Credit Union League September 23, 2015 Patrick Truett, Information Systems Officer National Credit Union Administration.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
How to Make Cyber Threat Intelligence Actionable
Why SIEM – Why Security Intelligence??
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Visual Analytics for Cyber Defense Decision-Making Anita D’Amico, Ph.D. Secure Decisions division of Applied Visions, Inc.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Chapter 1 Market-Oriented Perspectives Underlie Successful Corporate, Business, and Marketing Strategies.
Proactive Incident Response
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Cybersecurity as a Business Differentiator
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Hurricanes, Earthquakes, and Threat Intelligence
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
OIT Security Operations
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Improving the effectiveness of cyber security – controlling people, process and technology 10 April 2014.
Cybersecurity - What’s Next? June 2017
Comprehensive Security and Compliance at an Affordable Price.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Cisco 2017 Security Annual Report
Real-time protection for web sites and web apps against ATTACKS
Cyber Security: State of the Nation
Introduction to a Security Intelligence Maturity Model
Active Cyber Security, OnDemand
Gelişmiş Tehdit Korumasının İnkar Edilemez 4 Gerçeği
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
Forensics Week 11.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Cyber defense management
Cyber Threat Intelligence Sharing Standards-based Repository
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Making Information Security Manageable with GRC
Securing Your Digital Transformation
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Making Information Security Actionable with GRC
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Skybox Cyber Security Best Practices
Securing the Threats of Tomorrow, Today.
CRITICAL INFRASTRUCTURE CYBERSECURITY
Panda Adaptive Defense Platform and Services
Enterprise Program Management Office
Cyber Security Culture
Enhanced alerting and collaborative incident management
Predicting Insider Threats (PIT)™
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
Strategic threat assessment
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Technology Convergence
Managing IT Risk in a digital Transformation AGE
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
CyberSecurity Strategy For Defendable ROI
OPIsrael And The Value Of Next Generation SOCs
Presentation transcript:

CYBER THREAT INTELLIGENCE

What is Threat Intelligence Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace or hazard.

CYBER SECURITY – BY THE NUMBERS MOTIVATION BEHIND ATTACKS

CYBER SECURITY – BY THE NUMBERS DISTRIBUTION OF TARGETS

CYBER SECURITY – BY THE NUMBERS ATTACK TECHNIQUES

THE DARK HACKING COMMUNITY EXPLAINED

THE PROBLEM: Over 80% say threats have doubled last year 97% of security technology is signature based Threats today are polymorphic 98% of security technologies are reactive 66% of SOCs falling behind in addressing threats

THE PROBLEM: Security spending is based on failure, rather than need. The more secure that you feel, the less you spend.  This is an inherently dangerous approach to cyber risk management. Instead of looking to spend significantly more in their enterprise, Boards should be looking at greater efficiencies with their existing technologies (they exist).

THE PROBLEM: Staying ahead in today’s new, fast-evolving security environment calls for placing threat intelligence at the center of security. Threat Intelligence will be the top enterprise security priority from 2017 through 2020. Focusing on threat intelligence is one of the smartest ways to protect employees, along with critical IP and business data.

THE PROBLEM: Advanced behavior and sophisticated techniques used to evade conventional security products As high as 46% of cyber attacks are unknown 0days are killing us No one looking beyond the horizon where threats are born

THE PROBLEM: Companies do NOT know what Threat Intelligence is Intelligence is generally used to learn about a particular threat and used to make a plan to defend against said threat. Actionable Intelligence does not always equal preventative actions/measures.

THE PROBLEM: Companies do NOT know what Threat Intelligence is SIEM does not EQUAL Threat Intelligence Insider Threat is NOT Threat Intelligence Saying ‘bad’ things on Social Media is NOT Threat Intelligence

THE PROBLEM: Too many EXTERNAL feeds How do you choose what is relevant Are you looking inside the organization for Intelligence? What patterns do you see? During the last incident, what did you learn?

THE PROBLEM: WHO owns Threat Intelligence? Currently not a lot of dedicated teams Growing trend of the numbers increasing Threat Intelligence is NOT easy Too much data can become overwhelming Digesting Threat Intelligence in to environment can be PAINFUL! Threat Intelligence expertise is slowly growing

THE PROBLEM: Security Practitioners are Educating our Foes We all attend conferences, write opinions, appear on TV YouTube is a great source for bad actors to learn our capabilities Security Hardware Companies freely distribute Data Sheets, Videos, How-To’s

THE SOLUTION: Close the gap between threat Prediction and Pro- Active Defense The acquisition and analysis of information to identify, track, and predict cyber capabilities, intentions, and activities to offer course of action that enhance decision making ~Carnegie Melon Software Engineering Institute

THE SOLUTION: The DNA has to be in research Identifying the real threat – the unknown unknowns Deliver productive intelligence on what matters Contextual learning and cognitive computing Correlation analysis, connecting the dots

THE SOLUTION: In depth analysis of unknown threats, 0days, etc. Differentiate the signal from the noise Answer the “why” and “how” not just the “what” Customized intelligence built around your Organization

THE VALUE: Deep analytical insight into cyber threats Industry analysis on security and technology companies Customized global threat dashboard Direct access to Threat Analysts Customized reports on threats, industry and trends Visibility into BadIPs, BadURLs and Phishing sites

THE VALUE: Threat Intelligence can cut in half the time to detect a threat and improve an investigation by 42% Increase readiness, Indicators of Compromise analysis, archived data, and Tools, Techniques, and Procedures Better prepared for the future threat on the horizon Threat Intelligence needs to do the heavy lifting; deliver important, productive intelligence

Intelligence Categorized As Tactical, Raw and Finished Depending on an organization’s operational maturity, determines at what stage they use this intelligence. Tactical intelligence is defined as your indicators of compromise: bad IP’s, file hashes, domain names. Analysts must understand the context of this intelligence to put it into use within their organization. Raw intelligence has been collected and processed but not analyzed. Usually collected via API’s or alerts are triggered on key words or phrases. Examples include: malware analysis, and compromised account data. Finished intelligence is ready to be used and is raw intelligence put into context. Examples include: fraud intelligence, brand protection, threat actor data and third party risk information.

Threat Intelligence Practice Why Build a Threat Intelligence Practice Tactical: Enforce and improve the ability for your security team (NOC/SOC) and all IT personnel to anticipate, prevent and mitigate cyber attacks. Operational: Improve the ability for high levels across your organization (CISO, CIO, CTO, CEO) to transform the use of threat intelligence for both protection and response. Strategic: Improve the board’s decisions to allocate budget for solutions that integrate and operationalize threat intelligence.

Use External Threat Intelligence To Understand and Prevent Threats The hardest patterns for threat actors to change are their TTP’s or Tactics, Techniques and Procedures – how they actually implement a threat. How does TI help you prevent and detect threats? Preempt attempts to defraud customers with impersonating domain registrations. Track exploit kits to prioritize patching. Detect breaches by monitoring dark net marketplaces for stolen data. Security professionals can use external threat intelligence to understand trends of attacks against other organizations, which you can use to better prepare for when those threat actors inevitably choose your organization to attack. It’s important to detect when attack infrastructure is being created to stay a step ahead of attackers trying to impersonate your organization. One emerging threat that has gained attention lately is homograph attacks, in which attackers use Unicode characters to create domains that are indistinguishable from legitimate domain names. Understanding attack trends and the use of exploit kits is a critical first step in developing a strategy to combat ransomware and other similar malware based attacks. By collecting tactical intelligence from exploit kit advertisements, you can identify common vulnerabilities and exposures (CVEs) being exploited and prioritize patching to prevent your organization from being compromised. Although detecting the sale of stolen data is not an ideal time to identify an attacker moving against your organization, considering dwell times for external attackers average 107 days — it’s better to be aware of the breach than to unknowingly allow it to persist.

THE BENEFIT OF THREAT INTELLIGENCE: Increase Security Posture within your Organization Timely and Prioritize threats to assign Risk Create a Program with a Dedicated Team Intelligence is the ability to adapt to Change ~ Stephan Hawking

ROI THROUGH INTELLIGENCE ORCHESTRATION Internal Threat Intelligence External Threat Intelligence Threat Intelligence Threat Intelligence’s differentiator should be the ability to integrate with the client enterprise.

THE BENEFIT OF THREAT INTELLIGENCE: Understand your Assets Need to understand how threats will affect your organization Understand your Controls and Capabilities What does your firewall stop? Endpoint Detection and Response? Orchestration and Mitigation Automation is the future

THE SUMMARY: Threat Intelligence will change the game in cybersecurity A competitive differentiator in the market place Invest in cyber resilience Create a watchtower with productive intelligence and research that drives your business Create a smarter workforce with a Threat Intelligence platform

THE SUMMARY: Intelligence is like underwear, it is important that you have it but not necessary that you show it off!

jason@stealthcare.com Stealthcare.com 440.477.1144