SlideShare a Scribd company logo
As malware becomes more commercialized, attackers are leveraging the
same attack kits again and again. Cyber Threat Intelligence (CTI) offers
the ability to detect attacks carried out using methods previously
reported by others in the threat intelligence network. In the latest SANS
Cyber Threat Intelligence (CTI) Survey (1)
, results showed that 69% OF
ORGANIZATIONS SURVEYED ARE NOW USING CTI TO SOME EXTENT.
For IT security teams considering integrating CTI, what are the key
questions to ask before getting started?
What are your short-term and long-term
goals and how will you measure progress?
Top benefits reported
by those using CTI:
Top 5 skill sets respondents viewed
as valuable for leveraging CTI:
Who will you assign to CTI planning?
22
11
IMPROVED
VISIBILITY into
attack methodologies
FASTER AND
MORE ACCURATE
RESPONSE
Measurable reduction
in incidents through
more INTELLIGENT
BLOCKING
What do you intend to do with CTI data?
33
Organizations are integrating many tools into their
CTI feeds, among those surveyed, the top 5 were:
INTRUSION
PREVENTION
SYSTEMS (IPS)
FIREWALLS
/UTMS
HOST
SECURITY
SYSTEMS
SIEM VULNERABILITY
MANAGEMENT
Will you use commercial feeds, open
source and community data, or both?44
Will you use a standard import
data format for your CTI feeds?55
What kinds of tools will you use
to aggregate and collect CTI data?66
Knowledge of normal
network and system
operations to
DETECT ABNORMAL
BEHAVIORS
DATA
ANALYSIS
capabilities
Knowledge
of INDICATORS
OF COMPROMISE
INCIDENT
RESPONSE
skills
Knowledge
of ADVERSARIES
AND CAMPAIGNS
AlienVault
Open Threat
Exchange TM
(OTX)
Structured Threat
Information
Expression (STIX)
Collective
Intelligence
Framework
(CIF)
Open
Indicators of
Compromise
(OPENIOC)
framework
Trusted
Automated
eXchange of
Indicator
Information (TAXII)
For those using standard formats, the
top 5 standard formats were:
COMMUNITY (groups such
as ISACs, CERT or other
formal or informal groups)
INTERNAL SYSTEMS
VENDOR-DRIVEN cyber
threat intelligence feeds
PUBLIC cyber threat
intelligence feeds (DNS,
MalwareDomainList.com, etc.)
OPEN SOURCE feeds
Survey respondents reported use of a
number of threat intelligence sources:
SECURITY INFORMATION
AND EVENT MANAGEMENT
(SIEM)
INTRUSION
MONITORING
platforms
OTHER TYPES
of analytics
platforms
HOMEGROWN
tools
Top four tools used by survey respondents
to aggregate, analyze & present CTI:
Companies using cyber
intelligence data in
“STANDARD” FORMAT
and well-known
open-source toolkits
(1) SANS Cyber Threat Intelligence Survey (CTI)
https://www.alienvault.com/resource-center/white-papers/cyber-threat-intelligence-whos-using-it-and-how

More Related Content

PDF
Security operations center 5 security controls
PPTX
Improve threat detection with hids and alien vault usm
PPTX
Alienvault threat alerts in spiceworks
PDF
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
PPTX
Effective Security Operation Center - present by Reza Adineh
PPTX
Top 20 Security Controls for a More Secure Infrastructure
PPT
Layered Approach - Information Security Recommendations
PDF
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Security operations center 5 security controls
Improve threat detection with hids and alien vault usm
Alienvault threat alerts in spiceworks
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Effective Security Operation Center - present by Reza Adineh
Top 20 Security Controls for a More Secure Infrastructure
Layered Approach - Information Security Recommendations
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...

What's hot (20)

PPTX
Vulnerability Assessment Presentation
PDF
20 Security Controls for the Cloud
PDF
The Critical Security Controls and the StealthWatch System
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PPTX
Security operation center (SOC)
PPTX
SOC 3.0: strategic threat intelligence May 2016
PPTX
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PPTX
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
PDF
SANS 2013 Critical Security Controls Survey
PPTX
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
PPTX
Vulnerability Assesment
PPTX
Malware detection how to spot infections early with alien vault usm
PPTX
Security Operations Center (SOC) Essentials for the SME
PPTX
Extending the 20 critical security controls to gap assessments and security m...
PPTX
Effective Cyber Defense Using CIS Critical Security Controls
PPTX
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
PPTX
How to Solve Your Top IT Security Reporting Challenges with AlienVault
PPTX
Rothke rsa 2012 building a security operations center (soc)
PDF
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Vulnerability Assessment Presentation
20 Security Controls for the Cloud
The Critical Security Controls and the StealthWatch System
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
Security operation center (SOC)
SOC 3.0: strategic threat intelligence May 2016
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
VAPT - Vulnerability Assessment & Penetration Testing
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
SANS 2013 Critical Security Controls Survey
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
Vulnerability Assesment
Malware detection how to spot infections early with alien vault usm
Security Operations Center (SOC) Essentials for the SME
Extending the 20 critical security controls to gap assessments and security m...
Effective Cyber Defense Using CIS Critical Security Controls
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
How to Solve Your Top IT Security Reporting Challenges with AlienVault
Rothke rsa 2012 building a security operations center (soc)
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Ad

Viewers also liked (11)

PPTX
Simplify PCI DSS Compliance with AlienVault USM
PPTX
Incident response live demo slides final
PPTX
Improve Situational Awareness for Federal Government with AlienVault USM
PDF
The State of Incident Response - INFOGRAPHIC
PPTX
Improve Security Visibility with AlienVault USM Correlation Directives
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PDF
Open Source IDS Tools: A Beginner's Guide
PDF
PCI DSS Implementation: A Five Step Guide
PPTX
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
PDF
Insider Threat Detection Recommendations
PPSX
HP ArcSight
Simplify PCI DSS Compliance with AlienVault USM
Incident response live demo slides final
Improve Situational Awareness for Federal Government with AlienVault USM
The State of Incident Response - INFOGRAPHIC
Improve Security Visibility with AlienVault USM Correlation Directives
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
Open Source IDS Tools: A Beginner's Guide
PCI DSS Implementation: A Five Step Guide
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
Insider Threat Detection Recommendations
HP ArcSight
Ad

Similar to Alien vault sans cyber threat intelligence (20)

PDF
Sans cyber-threat-intelligence-survey-2015
DOC
Cyber Threat Intelligence - Staying Ahead of Attacks.doc
PDF
Embracing Threat Intelligence and Finding ROI in Your Decision
PDF
Cyber threat intelligence ppt
PPTX
Cyber Threat Intelligence
PPTX
Cyber Threat Intelligence, CTI Lifecycle and CTI Framework
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
SOCRadar's 2024 Cyber Threat Intelligence Solution
PDF
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
PPTX
Chapter I Introduction To Cyber Intelligence.pptx
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PDF
Stop Tilting at Windmills: 3 Key Lessons that CTI Teams Should Learn from the...
PPTX
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
PDF
Welcome to the world of Cyber Threat Intelligence
PPTX
Need for Threat Intelligence & How to Operationalize it for your Organisation.
PDF
Threat Intelligence 101 - Steve Lodin - Submitted
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
PDF
Empowering Cyber Threat Intelligence with AI
PDF
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
PDF
01 INTRODUCTION TO CYBERTHREAT INTELIGENCE.pdf
Sans cyber-threat-intelligence-survey-2015
Cyber Threat Intelligence - Staying Ahead of Attacks.doc
Embracing Threat Intelligence and Finding ROI in Your Decision
Cyber threat intelligence ppt
Cyber Threat Intelligence
Cyber Threat Intelligence, CTI Lifecycle and CTI Framework
Decoding a Decade: 10 Years of Applied CTI Discipline
SOCRadar's 2024 Cyber Threat Intelligence Solution
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Chapter I Introduction To Cyber Intelligence.pptx
Effective Threat Hunting with Tactical Threat Intelligence
Stop Tilting at Windmills: 3 Key Lessons that CTI Teams Should Learn from the...
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Welcome to the world of Cyber Threat Intelligence
Need for Threat Intelligence & How to Operationalize it for your Organisation.
Threat Intelligence 101 - Steve Lodin - Submitted
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Empowering Cyber Threat Intelligence with AI
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
01 INTRODUCTION TO CYBERTHREAT INTELIGENCE.pdf

More from AlienVault (13)

PPTX
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
PDF
Malware Invaders - Is Your OS at Risk?
PPTX
How Malware Works
PPTX
AWS Security Best Practices for Effective Threat Detection & Response
PPTX
Improve Threat Detection with OSSEC and AlienVault USM
PPTX
Best Practices for Configuring Your OSSIM Installation
PPTX
IDS for Security Analysts: How to Get Actionable Insights from your IDS
PPTX
Security by Collaboration: Rethinking Red Teams versus Blue Teams
PPTX
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
PPTX
How to Detect System Compromise & Data Exfiltration with AlienVault USM
PPTX
Spice world 2014 hacker smackdown
PPTX
Demo how to detect ransomware with alien vault usm_gg
PPTX
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Malware Invaders - Is Your OS at Risk?
How Malware Works
AWS Security Best Practices for Effective Threat Detection & Response
Improve Threat Detection with OSSEC and AlienVault USM
Best Practices for Configuring Your OSSIM Installation
IDS for Security Analysts: How to Get Actionable Insights from your IDS
Security by Collaboration: Rethinking Red Teams versus Blue Teams
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
How to Detect System Compromise & Data Exfiltration with AlienVault USM
Spice world 2014 hacker smackdown
Demo how to detect ransomware with alien vault usm_gg
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Machine learning based COVID-19 study performance prediction
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Advanced Soft Computing BINUS July 2025.pdf
PPTX
Cloud computing and distributed systems.
PDF
Unlocking AI with Model Context Protocol (MCP)
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
KodekX | Application Modernization Development
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Advanced IT Governance
PPT
Teaching material agriculture food technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Mobile App Security Testing_ A Comprehensive Guide.pdf
GamePlan Trading System Review: Professional Trader's Honest Take
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Machine learning based COVID-19 study performance prediction
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Advanced Soft Computing BINUS July 2025.pdf
Cloud computing and distributed systems.
Unlocking AI with Model Context Protocol (MCP)
The AUB Centre for AI in Media Proposal.docx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KodekX | Application Modernization Development
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Advanced IT Governance
Teaching material agriculture food technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Per capita expenditure prediction using model stacking based on satellite ima...
The Rise and Fall of 3GPP – Time for a Sabbatical?
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...

Alien vault sans cyber threat intelligence

  • 1. As malware becomes more commercialized, attackers are leveraging the same attack kits again and again. Cyber Threat Intelligence (CTI) offers the ability to detect attacks carried out using methods previously reported by others in the threat intelligence network. In the latest SANS Cyber Threat Intelligence (CTI) Survey (1) , results showed that 69% OF ORGANIZATIONS SURVEYED ARE NOW USING CTI TO SOME EXTENT. For IT security teams considering integrating CTI, what are the key questions to ask before getting started? What are your short-term and long-term goals and how will you measure progress? Top benefits reported by those using CTI: Top 5 skill sets respondents viewed as valuable for leveraging CTI: Who will you assign to CTI planning? 22 11 IMPROVED VISIBILITY into attack methodologies FASTER AND MORE ACCURATE RESPONSE Measurable reduction in incidents through more INTELLIGENT BLOCKING What do you intend to do with CTI data? 33 Organizations are integrating many tools into their CTI feeds, among those surveyed, the top 5 were: INTRUSION PREVENTION SYSTEMS (IPS) FIREWALLS /UTMS HOST SECURITY SYSTEMS SIEM VULNERABILITY MANAGEMENT Will you use commercial feeds, open source and community data, or both?44 Will you use a standard import data format for your CTI feeds?55 What kinds of tools will you use to aggregate and collect CTI data?66 Knowledge of normal network and system operations to DETECT ABNORMAL BEHAVIORS DATA ANALYSIS capabilities Knowledge of INDICATORS OF COMPROMISE INCIDENT RESPONSE skills Knowledge of ADVERSARIES AND CAMPAIGNS AlienVault Open Threat Exchange TM (OTX) Structured Threat Information Expression (STIX) Collective Intelligence Framework (CIF) Open Indicators of Compromise (OPENIOC) framework Trusted Automated eXchange of Indicator Information (TAXII) For those using standard formats, the top 5 standard formats were: COMMUNITY (groups such as ISACs, CERT or other formal or informal groups) INTERNAL SYSTEMS VENDOR-DRIVEN cyber threat intelligence feeds PUBLIC cyber threat intelligence feeds (DNS, MalwareDomainList.com, etc.) OPEN SOURCE feeds Survey respondents reported use of a number of threat intelligence sources: SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) INTRUSION MONITORING platforms OTHER TYPES of analytics platforms HOMEGROWN tools Top four tools used by survey respondents to aggregate, analyze & present CTI: Companies using cyber intelligence data in “STANDARD” FORMAT and well-known open-source toolkits (1) SANS Cyber Threat Intelligence Survey (CTI) https://www.alienvault.com/resource-center/white-papers/cyber-threat-intelligence-whos-using-it-and-how