SlideShare a Scribd company logo
Road-map for actionable threat intelligence 
Making Information Security Smarter 
AbhiSingh, CISSP, CISA, CRISC, CISM, CCSK
Tuesday, February 12, 2013 
State of the Union Address 
Wednesday, October 2, 2012 
U.S. Cyber Command GEN Keith Alexander 
Thursday, December 19, 2013 
Headline of the day 
External92% 
Internal passive4% 
Internal active2% 
Unknown2%
What do I want to demonstrate? 
What is actionable cyber threat intelligence 
How does it enable business? 
Why actionable cyber threat intelligence is not a product? 
How can you develop a sound framework? 
What are some capabilities that you would need?
What is a Cyber Threat and Threat Intelligence? 
Defense Science Board Task Force on Resilient Military Systems defines Cyber Threat as: 
“The cyber threat is characterized in terms of three classes of increasing sophistication: those practitioners who rely on others to develop the malicious code, those who can develop their own tools to exploit publically known vulnerabilities as well as discovering new vulnerabilities, and those who have significant resources and can dedicate them to creating vulnerabilitiesin systems.” 
Threat Intelligence should then provide: 
Understanding of motivation, intents, and capabilities of attackers; and 
Detailed specifics on tactics, techniques, and procedures utilized.
How will Cyber Threat intelligence enable business? 
Make effective decisions with actionable information 
Save man-hours with automation –data collection, analysis, and usage 
Control risk, detect problems, and prioritize remediation supported by reliable data 
Validate existing policies and controls 
Demonstrate ROI –align expenses with business objectives
Where do collect the information from? 
Internal –SIEM, Helpdesk, Incidents, Business direction and priorities (M&A etc.), monitoring blind spots on network, Honeypots 
External - 
OSINT (using Matego, 
Shodan, metagoofiletc.) 
Pastebin, Google, 
Facebook etc. 
Cyveillance, Dell, iSIGHT, Mandiant, RSA, Verisign, Verizon, At&t, Fox-IT etc. 
Government 
Industry Community 
Public 
Commercial 
US-CERT, InfraGard, 
FBI, DHS 
FS-ISAC, NH-ISAC, ES- ISAC, REN-ISAC
What’s the first step after gathering information? 
Methods and modes 
Metadata 
Threat vectors 
Threat sources 
IP and hosts 
Exploit modules 
Logs 
Indicators of compromise (IOC)* 
Geo 
*Indicators of compromise (IOC) -Forensic artifacts of an intrusion that can be identified on a host or network 
Learn and Adapt 
React 
Human aspect 
Machine aspect
What would you do with intelligence? 
Identify Indicators of Compromise (IOCs)[forensic artifacts of an intrusion that can be identified on a host or network] 
Create machine consumable information -Notable frameworks OpenIOC, CybOX, IODEF 
Perform accurate detection across the enterprise 
Conduct a kill-chain based analysis to respond appropriately 
Map the findings/possible effects to business priorities/activities 
Develop strategic information for the senior leadership and decision makers
Some examples of threat intelligence 
Host-Based 
•Mutexes 
•File names 
•File hashes 
•Registry keys 
Network-Based 
•IP addresses & address ranges 
•Internet Domains 
•AS Numbers 
Behavioral 
•Adversary tactics 
•Attack techniques 
•Compromise procedures 
Actor-based 
•Malicious actors, organizations, and nation states 
•Cyber attack campaigns 
React and recover 
Learn and adapt
Example of actor based threat intelligence 
Learn and adapt
How do you put actionable intelligence (OpenIOC) to use? 
IOC Editor 
Allow users to create IOC’s in XML format 
Redline 
Provides host investigative capabilities to users to find signs of malicious activity through memory and file analysis, and the development of a threat assessment profile. 
Create IOC 
Deploy IOC 
Identify potential compromise 
Preserve evidence 
Analyze data 
Network IOC, Host IOC 
SIEM, IPS, End-point tools 
Forensic image, System state, Logs 
Malware analysis, log analysis 
Investigation process 
Intelligence Sources
Therefore threat intelligence should be a business priority because.. 
Is a capability not a product 
Builds on a diverse foundation of people, processes, and technology 
Provides actionable information on tactics, techniques, and procedures (TTP) of adversaries 
Allow effective response by identifying and analyzing indicators of comprise 
Enables forward thinking (proactive vs. reactive approach)
So what are the next steps.. 
•Make threat intelligence a business priority; allocate budget and resources 
•Define program objectives 
•Determine current state of critical capabilities for “build vs. buy” e.g. of critical capabilities –malware analysis, traffic analysis, intrusion detection, legal processes, SIEM etc. 
•Create traffic and host baselines 
•Conduct resource training 
•Identify external sources that you plan to use 
1 
•Develop framework to consume sources to generate threat intelligence –people, process, technology 
•Formalize roles and responsibilities 
•Pilot the framework with select intelligence sources 
•Decide external and internal information sharing strategy 
•Modify framework to consume all intelligence sources 
•Start sharing information across the supply chain 
•Demonstrate ROI based on the threats averted 
•Report metrics based on the established baselines 
2 
3 
Develop Foundation 
(month 0-6) 
Formalize Course 
(month 6-12) 
Road to Maturity 
(month 12 –24) 
Government 
Community 
Public 
Commercial
Thanks 
Abhi Singh, CISSP, CISA, CRISC, CISM, CCSK 
abhicrisc@gmail.com

More Related Content

PPTX
Bsides 2019 - Intelligent Threat Hunting
PPTX
Cyber Threat Intelligence: Building and maturing an intelligence program that...
PPTX
Threat hunting and achieving security maturity
PDF
Threat Intelligence 101 - Steve Lodin - Submitted
PDF
Threat Hunting Report
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PDF
SIEM Architecture
PDF
Cyber Threat Intelligence - It's not just about the feeds
Bsides 2019 - Intelligent Threat Hunting
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Threat hunting and achieving security maturity
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Hunting Report
Security operations center-SOC Presentation-مرکز عملیات امنیت
SIEM Architecture
Cyber Threat Intelligence - It's not just about the feeds

What's hot (20)

PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
PDF
Threat Intelligence Workshop
PDF
Threat hunting 101 by Sandeep Singh
PPTX
Cyber Threat Intelligence
PDF
Threat Hunting Procedures and Measurement Matrice
PPTX
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
PPSX
Next-Gen security operation center
PPTX
SOAR and SIEM.pptx
PDF
Cyber Threat Intelligence
PPTX
Security operation center (SOC)
PDF
Cyber Threat Intelligence
PPTX
Cyber threat intelligence: maturity and metrics
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
Cyber Threat Hunting Workshop
PPTX
Cyber Threat Modeling
PPTX
Threat Hunting
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PPTX
Cyber Threat Hunting: Identify and Hunt Down Intruders
PPTX
Cyber Threat Hunting with Phirelight
PDF
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Threat Intelligence Workshop
Threat hunting 101 by Sandeep Singh
Cyber Threat Intelligence
Threat Hunting Procedures and Measurement Matrice
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Next-Gen security operation center
SOAR and SIEM.pptx
Cyber Threat Intelligence
Security operation center (SOC)
Cyber Threat Intelligence
Cyber threat intelligence: maturity and metrics
Cybersecurity 1. intro to cybersecurity
Cyber Threat Hunting Workshop
Cyber Threat Modeling
Threat Hunting
Effective Threat Hunting with Tactical Threat Intelligence
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting with Phirelight
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Ad

Similar to Road map for actionable threat intelligence (20)

PDF
𝐓𝐨𝐩 𝐓𝐡𝐫𝐞𝐚𝐭 𝐇𝐮𝐧𝐭𝐢𝐧𝐠 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬: 𝐃𝐨𝐰𝐧𝐥𝐨𝐚𝐝 𝐎𝐮𝐫 𝐖𝐡𝐢𝐭𝐞 𝐏𝐚𝐩𝐞𝐫!
PDF
Top Threat Hunting Interview Questions.pdf
PDF
Top Threat Hunting Interview Questions.pdf
PDF
Top Threat Hunting Interview Questions download white paper!
PDF
Aujas incident management webinar deck 08162016
PDF
IOCs Are Dead—Long Live IOCs!
PDF
Caccia alle Minacce: Intelligence e Hunting nel cyberspace
PDF
SFBA_SUG_2023-08-02.pdf
PPTX
How To Turbo-Charge Incident Response With Threat Intelligence
PDF
Cyber Threat Hunting Workshop.pdf
PDF
Cyber Threat Hunting Workshop.pdf
PPTX
Cyber security with ai
PDF
security operations center by Manage Engigne
PDF
Anatomy of a cyber attack
PPTX
PCM Vision 2019 Breakout: IBM | Red Hat
 
PDF
Cyber Defense - How to be prepared to APT
PDF
Cyber Defense Automation
PDF
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
PPTX
Operational Security Intelligence
PDF
Deep Learning based Threat / Intrusion detection system
𝐓𝐨𝐩 𝐓𝐡𝐫𝐞𝐚𝐭 𝐇𝐮𝐧𝐭𝐢𝐧𝐠 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬: 𝐃𝐨𝐰𝐧𝐥𝐨𝐚𝐝 𝐎𝐮𝐫 𝐖𝐡𝐢𝐭𝐞 𝐏𝐚𝐩𝐞𝐫!
Top Threat Hunting Interview Questions.pdf
Top Threat Hunting Interview Questions.pdf
Top Threat Hunting Interview Questions download white paper!
Aujas incident management webinar deck 08162016
IOCs Are Dead—Long Live IOCs!
Caccia alle Minacce: Intelligence e Hunting nel cyberspace
SFBA_SUG_2023-08-02.pdf
How To Turbo-Charge Incident Response With Threat Intelligence
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
Cyber security with ai
security operations center by Manage Engigne
Anatomy of a cyber attack
PCM Vision 2019 Breakout: IBM | Red Hat
 
Cyber Defense - How to be prepared to APT
Cyber Defense Automation
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Operational Security Intelligence
Deep Learning based Threat / Intrusion detection system
Ad

Recently uploaded (20)

PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Cloud computing and distributed systems.
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation theory and applications.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Building Integrated photovoltaic BIPV_UPV.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
20250228 LYD VKU AI Blended-Learning.pptx
Cloud computing and distributed systems.
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation theory and applications.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Diabetes mellitus diagnosis method based random forest with bat algorithm
The Rise and Fall of 3GPP – Time for a Sabbatical?
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Electronic commerce courselecture one. Pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Per capita expenditure prediction using model stacking based on satellite ima...

Road map for actionable threat intelligence

  • 1. Road-map for actionable threat intelligence Making Information Security Smarter AbhiSingh, CISSP, CISA, CRISC, CISM, CCSK
  • 2. Tuesday, February 12, 2013 State of the Union Address Wednesday, October 2, 2012 U.S. Cyber Command GEN Keith Alexander Thursday, December 19, 2013 Headline of the day External92% Internal passive4% Internal active2% Unknown2%
  • 3. What do I want to demonstrate? What is actionable cyber threat intelligence How does it enable business? Why actionable cyber threat intelligence is not a product? How can you develop a sound framework? What are some capabilities that you would need?
  • 4. What is a Cyber Threat and Threat Intelligence? Defense Science Board Task Force on Resilient Military Systems defines Cyber Threat as: “The cyber threat is characterized in terms of three classes of increasing sophistication: those practitioners who rely on others to develop the malicious code, those who can develop their own tools to exploit publically known vulnerabilities as well as discovering new vulnerabilities, and those who have significant resources and can dedicate them to creating vulnerabilitiesin systems.” Threat Intelligence should then provide: Understanding of motivation, intents, and capabilities of attackers; and Detailed specifics on tactics, techniques, and procedures utilized.
  • 5. How will Cyber Threat intelligence enable business? Make effective decisions with actionable information Save man-hours with automation –data collection, analysis, and usage Control risk, detect problems, and prioritize remediation supported by reliable data Validate existing policies and controls Demonstrate ROI –align expenses with business objectives
  • 6. Where do collect the information from? Internal –SIEM, Helpdesk, Incidents, Business direction and priorities (M&A etc.), monitoring blind spots on network, Honeypots External - OSINT (using Matego, Shodan, metagoofiletc.) Pastebin, Google, Facebook etc. Cyveillance, Dell, iSIGHT, Mandiant, RSA, Verisign, Verizon, At&t, Fox-IT etc. Government Industry Community Public Commercial US-CERT, InfraGard, FBI, DHS FS-ISAC, NH-ISAC, ES- ISAC, REN-ISAC
  • 7. What’s the first step after gathering information? Methods and modes Metadata Threat vectors Threat sources IP and hosts Exploit modules Logs Indicators of compromise (IOC)* Geo *Indicators of compromise (IOC) -Forensic artifacts of an intrusion that can be identified on a host or network Learn and Adapt React Human aspect Machine aspect
  • 8. What would you do with intelligence? Identify Indicators of Compromise (IOCs)[forensic artifacts of an intrusion that can be identified on a host or network] Create machine consumable information -Notable frameworks OpenIOC, CybOX, IODEF Perform accurate detection across the enterprise Conduct a kill-chain based analysis to respond appropriately Map the findings/possible effects to business priorities/activities Develop strategic information for the senior leadership and decision makers
  • 9. Some examples of threat intelligence Host-Based •Mutexes •File names •File hashes •Registry keys Network-Based •IP addresses & address ranges •Internet Domains •AS Numbers Behavioral •Adversary tactics •Attack techniques •Compromise procedures Actor-based •Malicious actors, organizations, and nation states •Cyber attack campaigns React and recover Learn and adapt
  • 10. Example of actor based threat intelligence Learn and adapt
  • 11. How do you put actionable intelligence (OpenIOC) to use? IOC Editor Allow users to create IOC’s in XML format Redline Provides host investigative capabilities to users to find signs of malicious activity through memory and file analysis, and the development of a threat assessment profile. Create IOC Deploy IOC Identify potential compromise Preserve evidence Analyze data Network IOC, Host IOC SIEM, IPS, End-point tools Forensic image, System state, Logs Malware analysis, log analysis Investigation process Intelligence Sources
  • 12. Therefore threat intelligence should be a business priority because.. Is a capability not a product Builds on a diverse foundation of people, processes, and technology Provides actionable information on tactics, techniques, and procedures (TTP) of adversaries Allow effective response by identifying and analyzing indicators of comprise Enables forward thinking (proactive vs. reactive approach)
  • 13. So what are the next steps.. •Make threat intelligence a business priority; allocate budget and resources •Define program objectives •Determine current state of critical capabilities for “build vs. buy” e.g. of critical capabilities –malware analysis, traffic analysis, intrusion detection, legal processes, SIEM etc. •Create traffic and host baselines •Conduct resource training •Identify external sources that you plan to use 1 •Develop framework to consume sources to generate threat intelligence –people, process, technology •Formalize roles and responsibilities •Pilot the framework with select intelligence sources •Decide external and internal information sharing strategy •Modify framework to consume all intelligence sources •Start sharing information across the supply chain •Demonstrate ROI based on the threats averted •Report metrics based on the established baselines 2 3 Develop Foundation (month 0-6) Formalize Course (month 6-12) Road to Maturity (month 12 –24) Government Community Public Commercial
  • 14. Thanks Abhi Singh, CISSP, CISA, CRISC, CISM, CCSK abhicrisc@gmail.com