SlideShare a Scribd company logo
Pitfalls of Cyber Data
2




3
Direction
Access
Analysis &
Assessment
Dissemination
Action
Customer
Gather
Information
Insight
Expert
Schema
Assess
Source
Define
Action
4
Immediate
Threat
Evolving
Threat
Long Term
Threat
Trend
Analysis
Horizon
Scanning
Futurology
Situational Awareness Strategic Intelligence
5


High-level
Information on
changing risk
The board
Details of a specific
Incoming attack
Defenders
Attacker
Methodologies,
Tools and tactics
Architects &
Sysadmins
Indicators of
Specific malware
SOC staff / IR
Long-TermUseShort-TermUse
Low LevelHigh Level
6




Threat
Source
Threat
Event
Vulnerability
Adverse
Impact
Initiates Exploits Causing
Characteristics:
• Capability
• Intent
• Target
Sequences:
• Actions
• Activities
• Scenarios
• Relevance
Conditions:
• Pervasiveness
• Severity
Controls:
• Effectiveness
Risk:
• Likelihood
• Impact
Risk View
7
Driving
Forces
Public Cyber
Data
Past Incident
Records
Adversaries
(Threat Source)
Threat
Scenarios
Adverse
Impacts
Threat
Events
TTPs Controls
Threat
Personas
Technical
Indicators
Tactical View
8



9





10















11

 Threat
Events
Countries &
Regions
Industries
Selection
Bias
Sample
Bias
12
13
14
15





16
Threat
Scenarios
Threat
Events
TTPS
Many to
Many
Many to
ManySpecific
Instance with
extensive
business
context.
Collection of
TTPs with
limited Business
Context Standards
not used /
many fudges
17




Pitfalls of Cyber Data

More Related Content

PPTX
Security Analytics Beyond Cyber
PPTX
Cyber Resilience: Managing Cyber Shocks
PPTX
Modern Security Risk
PPTX
Cyber Resilience
PPTX
Countering Cyber Threats
PPTX
Resilience is the new cyber security
PDF
Vendor Cybersecurity Governance: Scaling the risk
PPTX
The Economics of Cyber Security
Security Analytics Beyond Cyber
Cyber Resilience: Managing Cyber Shocks
Modern Security Risk
Cyber Resilience
Countering Cyber Threats
Resilience is the new cyber security
Vendor Cybersecurity Governance: Scaling the risk
The Economics of Cyber Security

What's hot (20)

PDF
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
PDF
Collaborated cyber defense in pandemic times
PDF
Is Cyber Resilience Really That Difficult?
PPTX
Managing Enterprise Risk: Why U No Haz Metrics?
PPTX
Top Level Cyber Security Strategy
PDF
Improve Your Threat Intelligence Strategy With These Ideas
PDF
Outpost24 webinar - Improve your organizations security with red teaming
PDF
Threat Intelligence Tweaks That'll Take Your Security to the Next Level
PDF
Using Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
PDF
Security Testing for Test Professionals
PDF
Bridging the Gap Between Threat Intelligence and Risk Management
PDF
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
PPTX
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
PDF
Building Human Intelligence – Pun Intended
PDF
Evidence-Based Risk Management
PDF
Top 6 Sources for Identifying Threat Actor TTPs
PDF
011918 executive breach_simulation_customer_fac_rs
PDF
Cyber Threat Intelligence Integration Center -- ONDI
PDF
7 Habits of Smart Threat Intelligence Analysts
PDF
Hexis Cybersecurity Mission Possible: Taming Rogue Ghost Alerts
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Collaborated cyber defense in pandemic times
Is Cyber Resilience Really That Difficult?
Managing Enterprise Risk: Why U No Haz Metrics?
Top Level Cyber Security Strategy
Improve Your Threat Intelligence Strategy With These Ideas
Outpost24 webinar - Improve your organizations security with red teaming
Threat Intelligence Tweaks That'll Take Your Security to the Next Level
Using Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
Security Testing for Test Professionals
Bridging the Gap Between Threat Intelligence and Risk Management
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Building Human Intelligence – Pun Intended
Evidence-Based Risk Management
Top 6 Sources for Identifying Threat Actor TTPs
011918 executive breach_simulation_customer_fac_rs
Cyber Threat Intelligence Integration Center -- ONDI
7 Habits of Smart Threat Intelligence Analysts
Hexis Cybersecurity Mission Possible: Taming Rogue Ghost Alerts
Ad

Viewers also liked (20)

PPTX
WAF in Scale
PPTX
PIANOS: Protecting Information About Networks The Organisation and It's Syste...
PPTX
Security Architecture
PPT
Probability Calibration
PPTX
Measuring black boxes
PPTX
Intelligence-led Cybersecurity
PPTX
First Responders Course - Session 8 - Digital Evidence Collection [2004]
PPTX
Delivering Secure Projects
PPTX
First Responders Course- Session 1 - Digital and Other Evidence [2004]
PPTX
UK Legal Framework (2003)
PPTX
Introduction to Hacktivism
PPTX
First Response - Session 11 - Incident Response [2004]
PPTX
Penetration Testing; A customers perspective
PPTX
Security Metrics [2008]
PPTX
First Responder Course - Session 9 - Volatile Evidence Collection [2004]
PPTX
PIANOS: Protecting Information About Networks The Organisation and It's Systems
PPTX
First Responder Course - Session 10 - Static Evidence Collection [2004]
PPTX
Security and Resilience Vulnerabilities in the UK’s Telecoms Networks
PPTX
Network Reconnaissance Infographic
PPTX
Managing Insider Risk
WAF in Scale
PIANOS: Protecting Information About Networks The Organisation and It's Syste...
Security Architecture
Probability Calibration
Measuring black boxes
Intelligence-led Cybersecurity
First Responders Course - Session 8 - Digital Evidence Collection [2004]
Delivering Secure Projects
First Responders Course- Session 1 - Digital and Other Evidence [2004]
UK Legal Framework (2003)
Introduction to Hacktivism
First Response - Session 11 - Incident Response [2004]
Penetration Testing; A customers perspective
Security Metrics [2008]
First Responder Course - Session 9 - Volatile Evidence Collection [2004]
PIANOS: Protecting Information About Networks The Organisation and It's Systems
First Responder Course - Session 10 - Static Evidence Collection [2004]
Security and Resilience Vulnerabilities in the UK’s Telecoms Networks
Network Reconnaissance Infographic
Managing Insider Risk
Ad

Similar to Pitfalls of Cyber Data (20)

PDF
ScotSecure West Summit 2024 - Glasgow 11th Sept
PDF
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
PPTX
Operational Security Intelligence
PPTX
Operationalizing Security Intelligence
PDF
Caccia alle Minacce: Intelligence e Hunting nel cyberspace
PPTX
Best Practices for Scoping Infections and Disrupting Breaches
PDF
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
PPTX
Best Practices for Scoping Infections and Disrupting Breaches
PPTX
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
PDF
Exploring the Defender's Advantage
PDF
Road map for actionable threat intelligence
PDF
TMT industry Threat Landscape
PPT
Anton Chuvakin on Threat and Vulnerability Intelligence
PDF
PDF
Welcome to the world of Cyber Threat Intelligence
PPTX
07 - Indicators and Intelligence00.pptx a presentation
PPTX
Threat Intelligence (CTI) Blue Teams.pptx
PPTX
Unit-1&2,mdngmnd,mngmdnmgnmdnfmngdf.pptx
PPTX
07 - Indicators and Intelligence .pptx new
ScotSecure West Summit 2024 - Glasgow 11th Sept
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Operational Security Intelligence
Operationalizing Security Intelligence
Caccia alle Minacce: Intelligence e Hunting nel cyberspace
Best Practices for Scoping Infections and Disrupting Breaches
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Best Practices for Scoping Infections and Disrupting Breaches
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
Exploring the Defender's Advantage
Road map for actionable threat intelligence
TMT industry Threat Landscape
Anton Chuvakin on Threat and Vulnerability Intelligence
Welcome to the world of Cyber Threat Intelligence
07 - Indicators and Intelligence00.pptx a presentation
Threat Intelligence (CTI) Blue Teams.pptx
Unit-1&2,mdngmnd,mngmdnmgnmdnfmngdf.pptx
07 - Indicators and Intelligence .pptx new

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
KodekX | Application Modernization Development
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
Teaching material agriculture food technology
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
MYSQL Presentation for SQL database connectivity
Building Integrated photovoltaic BIPV_UPV.pdf
The AUB Centre for AI in Media Proposal.docx
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Weekly Chronicles - August'25 Week I
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
KodekX | Application Modernization Development
Network Security Unit 5.pdf for BCA BBA.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Teaching material agriculture food technology
NewMind AI Monthly Chronicles - July 2025
Advanced methodologies resolving dimensionality complications for autism neur...
Big Data Technologies - Introduction.pptx
20250228 LYD VKU AI Blended-Learning.pptx
cuic standard and advanced reporting.pdf
Encapsulation theory and applications.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Pitfalls of Cyber Data