Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 1 Commercial in Confidence Intelligence-led security.

Slides:



Advertisements
Similar presentations
Using Intelligence led policing as a model to Prioritize Organized Crime Investigations – A Canadian Perspective.
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Security Life Cycle for Advanced Threats
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
The Cyber Threat Intelligence Experts
Who Is Attacking You? Distinguishing Motivation to Prioritize Threats John Hultquist Senior Manager, Cyber Espionage Threat Intelligence iSIGHT Partners.
CERT Centers, Software Engineering Institute Carnegie Mellon University Pittsburgh, PA SEI is sponsored by the U.S. Department of Defense ©
Working Jointly to Tackle e-Crime Paul Wright Hi-Tech Crime Team City of London Police.
Cyber Crime The current threat to the UK Security Marking.
Cyber Crime in the Digital Age
Building a Threat Intel Team Ryan Olson Director of Threat Intelligence October, 2014.
Information Warfare Theory of Information Warfare
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Cyber Resilience Simon Onyons Financial Stability – Resilience Team.
Police Service of Northern Ireland Detective Chief Inspector Douglas Grant MSc PSNI Cyber Crime Centre.
Presentation by: Judith St-George - Director General
Using IP to Increase Entrepreneurial Competitiveness Ron Marchant CB FRSA Intellectual Property Rights Management, Riga, May 2012.
The National Intelligence Model (NIM)
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
Copyright 2010, The World Bank Group. All Rights Reserved. Prosecution Statistics Part 2 Crime, Justice & Security Statistics Produced in Collaboration.
Disabled people’s experiences of targeted violence and hostility Dr Chih Hoong Sin Office for Public Management (OPM)
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
Strategic Management of Cybercrime Making Crime Pay A/Prof Paul A. Watters Research Director ICSL.
JARAP Cybercrime D/Inspector Phil Tebbs – Cybercrime Implementation Lead.
© 2010 Verizon. All Rights Reserved. PTE / DBIR.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
The evolution of eCrime and the remote banking channels Presentation to the RHUL MSc Information Security Summer School 9 September 2013 Dom Lucas.
Ali Alhamdan, PhD National Information Center Ministry of Interior
BAE Systems Small Business Program
December 4 th 2015 Intelligence Briefing NOT PROTECTIVELY MARKED.
December 11 th 2015 Intelligence Briefing NOT PROTECTIVELY MARKED.
A threat to global security and economy Koushik Mannepalli CMPE 294.
Royal Mail Hydrogen the opportunity to decarbonise transport in the postal sector Dr. Martin Blake DBA, MBA, BSc Head of Sustainability.
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
A Unique Challenge INTERNATIONAL ORGANIZED CRIME.
Regional Cyber Crime Unit
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Assure Analytics data analytics and visualisation Robert Ghanea-Hercock, Alex Healing, Ben Azvine, Karl Smith.
FFIEC Cybersecurity Assessment Tool Maine Credit Union League September 23, 2015 Patrick Truett, Information Systems Officer National Credit Union Administration.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:
1Copyright © 2015 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc | Cyber Preparedness ˃ A Proactive Response to Infiltration.
Establishing an Aviation Risk Context APEC TPTWG-27 Aviation Security Experts Sub-Group Meeting Denise Morgan Office of Transport Security May 2006.
ILP model- Montenegro OSCE Annual Police Experts Meeting
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
The Third Wave of Hacking Cyber-Crime as a Service
Public Facilities and Cyber Security
RCCU Zephyr South West Regional Cyber Crime Unit.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Behavior Analytics Market to surpass $3.5bn by 2024: Global Market Insights,
Assessing Targeted Attacks in Incident Response Threat Correlation
General information Organisation logo Targeted topics
The Cyber Threats Landscape
Cyber Threat Intelligence Sharing Standards-based Repository
بهترین راهکار را انتخاب کنید...
Romanian National Cyberspace - Quick facts -
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Cybersecurity at PJM Jonathon Monken
Strategic threat assessment
Cybersecurity at PJM Jonathon Monken
In the attack index…what number is your Company?
CYBER RISKS IN SECURITIES SERVICES
Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential.
Thames Valley Chamber / Claire Logic
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 1 Commercial in Confidence Intelligence-led security Understanding threat intelligence

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 2 Commercial in Confidence SIX STEPS TO INTELLIGENCE-LED SECURITY 1. PERFORM THREAT ASSESSMENT 2. DETERMINE INTELLIGENCE REQUIREMENTS 3. BUILD COLLECTION SOURCES 4. OPERATIONALIZE THREAT INTELLIGENCE 5. INTRODUCE SECURITY ANALYTICS 6. GAIN SITUATIONAL AWARENESS

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 3 Commercial in Confidence Malware signaturesMalware signatures IOCs / IOAsIOCs / IOAs Domain blacklistsDomain blacklists IP reputation listsIP reputation lists Security mailing listsSecurity mailing lists RSS feedsRSS feeds Open-source reportsOpen-source reports Targets (sector / region)Targets (sector / region) Motivation / PersistenceMotivation / Persistence Tools / Tactics / ProceduresTools / Tactics / Procedures Attribution / AffiliationAttribution / Affiliation Socio-political contextSocio-political context Business impactsBusiness impacts Suggested mitigationsSuggested mitigations THREAT INTELLIGENCE UNDERSTANDING THREAT INTELLIGENCE

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 4 Commercial in Confidence Dissemination Direction Collection Analysis Production Non-linear process with multiple feedback loops THE TRADITIONAL INTELLIGENCE LIFECYCLE

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 5 Commercial in Confidence Infrastructure DRIVES THE BUILDING OF INTELLIGENCE MODELS Malware Criminals Victims Banks Police Investigators CERTs Researchers

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 6 Commercial in Confidence SHYLOCK – A CYBER CRIMINAL INTELLIGENCE PROBLEM

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 7 Commercial in Confidence SHYLOCK FINANCIAL CRIME OPERATION Estimated at over 50K machines compromised Global victimisation, but with a preference for UK, US, and Italy

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 8 Commercial in Confidence SHYLOCK – A CYBER CRIMINAL INTELLIGENCE PROBLEM Intelligence Model Criminals Malware Infrastructure Victims

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 9 Commercial in Confidence HOW IT WORKS – COMPROMISING THE VICTIM Intelligence Model Criminals Malware Infrastructure Victims

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 10 Commercial in Confidence HOW IT WORKS – MALWARE AUTOMATION Intelligence Model Criminals Malware Infrastructure Victims

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 11 Commercial in Confidence HOW IT WORKS – MALWARE AUTOMATION Intelligence Model Criminals Malware Infrastructure Victims

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 12 Commercial in Confidence HOW IT WORKS – MALWARE AUTOMATION Intelligence Model Criminals Malware Infrastructure Victims

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 13 Commercial in Confidence HOW IT WORKS – BANKING WEBSITE MODIFICATION Intelligence Model Criminals Malware Infrastructure Victims

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 14 Commercial in Confidence FINDING THE C2 INFRASTRUCTURE Intelligence Model Criminals Malware Infrastructure Victims

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 15 Commercial in Confidence LINKS TO MULE RECRUITMENT Intelligence Model Criminals Malware Infrastructure Victims

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 16 Commercial in Confidence THE SHYLOCK TAKEDOWN – INTELLIGENCE INTO ACTION

Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 17 Commercial in Confidence BAE Systems Applied Intelligence Surrey Research Park Guildford Surrey GU2 7RQ United Kingdom T: +44 (0) F: +44 (0) Copyright © BAE Systems All rights reserved. BAE SYSTEMS, the BAE SYSTEMS Logo and the product names referenced herein are trademarks of BAE Systems plc. BAE Systems Detica and BAE Systems Applied Intelligence are trading names of Detica Limited registered in England (No ) with its registered office at Surrey Research Park, Guildford, England, GU2 7RQ.