SlideShare a Scribd company logo
Copyright 2015 © Information Security Forum Limited
1ISF’s 26th Annual World Congress - Atlanta
IMPLEMENTING THREAT INTELLIGENCE SYSTEMS:
MOVING FROM CHAOS TO STRUCTURE
Speakers:
Puneet Kukreja
Partner, Cyber Advisory, Deloitte
Chair:
Nick Frost
ISF
Demystifying Threat
Intelligence
-keeping it real
ISF World Congress – 2015 Atlanta U.S.A.
Our Discussion
3
Threat landscape
Defining threat intelligence
Threat intelligence lifecycle
Challenges of threat intelligence
What we need
What can I takeaway
Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence
Threat Landscape
The cyber threat landscape will continue to deteriorate as the attack surface
expands with advances through digital innovation via IoT, consumerisation of
enterprise mobility and cloud.
Source: http://blogs.cisco.com/ciscoit/cisco-security-intelligence-operations-defense-in-depth
Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence
Threat landscape
Distributed
Denial of Service
(DDoS)
Application
Layer Attacks
Brute Force
Attacks
Network Protocol
Attacks
Known
Vulnerability
Exploitation
Zero Day
Exploitation
Phishing
Rogue Update
Attacks
Watering Hole
Attacks
Types of
Cyber
Attacks
Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence
Threat landscape
Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence
“There is nothing more necessary than good intelligence to frustrate a designing
enemy & nothing requires greater pains to obtain” - - GEORGE WASHINGTON
Defining threat intelligence?
Source: Gartner Definition – Threat Intelligence
Gartner
STRATEGIC TACTICAL TECHNICAL OPERATIONAL
TYPES OF THREAT INTELLIGENCE
SOURCE: Centre for the Protection of National Infrastructure – UK Government
Defining threat intelligence?
SOURCE: Centre for the Protection of National Infrastructure – UK Government
Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence
Is it all about the Kill Chain?
Threat intelligence lifecycle
RECONNAISSANCE
WEAPONISATION
DELIVERY
EXPLOITATIONINSTALLATION
COMMAND &
CONTROL
ACTIONS ON
OBJECTIVES
THE
KILL
CHAIN
1
2
3
45
6
7
Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence
Is it just not another control process?
Threat intelligence lifecycle
PLANNING
DIRECTION
COLLECTION
PROCESSINGANALYSIS
PRODUCTION
DISSEMINATION
1
2
3
45
6
7
Standards supporting threat intelligence
The Trusted Automated eXchange of
Indicator Information (TAXII™)
Standardizing Cyber Threat Intelligence
Information with the Structured Threat
Information eXpression (STIX™)
Cyber Observable eXpression (CybOX™)
Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence
STIX Architecture
Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence
Source: http://stix.mitre.org/
STIX Architecture
Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence
STIX Use Case (sharing threat information)
Source: http://stixproject.github.io/getting-started/whitepaper/
Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence
Challenges of threat intelligence
Why do I ask that question?
Attack
Graphs
Stakeholders
Scenario
Planning
Integrated
Architecture
Business
Case
Threat
Modelling
Contextual
Requirements
Threat Actors
Actionable
Governance
Threat Feeds
What we need
Attributes to measure threat intelligence
Accurate
Relevant
Aligned to
Requirements
Tailored
Integrated
Timely
Predictive
Actionable
Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence
What can I take away
Improves
visibility &
reporting
Integration is
required
across design,
engineering
and
operations
Begins with
critical
systems and
asset
inventory
Do not
overlook
security
operations
process
maturity
Is only as
good as your
asset and
threat profile
classification
Vendors are
only as good
as “your” use
cases
It’s no
Silver
Bullet
Thank you
Puneet Kukreja | Partner | Cyber Advisory
Deloitte Australia
Copyright 2015 © Information Security Forum Limited
19ISF’s 26th Annual World Congress - Atlanta
QUESTIONS?
Copyright 2015 © Information Security Forum Limited
20ISF’s 26th Annual World Congress - Atlanta
Please feel free to contact us for further
discussion:
Puneet Kukreja – Partner, Cyber Advisory, Deloitte
pkukreja@deloitte.coma.au
Nick Frost - ISF
nick.frost@securityforum.org

More Related Content

PDF
Bridging the Gap Between Threat Intelligence and Risk Management
PPTX
2016 ISSA Conference Threat Intelligence Keynote philA
PDF
Cyber Threat Intelligence
PPTX
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
PDF
Cyber intelligence for corporate security
PPTX
Cyber Threat Intelligence
PDF
Threat Intelligence 101 - Steve Lodin - Submitted
PDF
Cyber Threat Intelligence
Bridging the Gap Between Threat Intelligence and Risk Management
2016 ISSA Conference Threat Intelligence Keynote philA
Cyber Threat Intelligence
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
Cyber intelligence for corporate security
Cyber Threat Intelligence
Threat Intelligence 101 - Steve Lodin - Submitted
Cyber Threat Intelligence

What's hot (20)

PPTX
Threat intelligence in security
PDF
Cyber Threat Intelligence
PPTX
The Sweet Spot of Cyber Intelligence
PDF
Welcome to the world of Cyber Threat Intelligence
PPTX
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
PPTX
Cyber Threat Intelligence | Information to Insight
PDF
Threat Intelligence Workshop
PDF
PDF
Global Cyber Threat Intelligence
PPTX
6 Steps for Operationalizing Threat Intelligence
PPTX
The Making of a simple Cyber Threat Intelligence Gathering System
PDF
Sans cyber-threat-intelligence-survey-2015
PPTX
Cyber threat intelligence: maturity and metrics
PPTX
Actionable Threat Intelligence
PDF
Insa cyber intelligence 2011
PPTX
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
PDF
Cyber threat intelligence ppt
PPTX
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
PDF
Threat intelligence Primary Tradecraft and Research
PPTX
Threat Intelligence Data Collection & Acquisition
Threat intelligence in security
Cyber Threat Intelligence
The Sweet Spot of Cyber Intelligence
Welcome to the world of Cyber Threat Intelligence
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber Threat Intelligence | Information to Insight
Threat Intelligence Workshop
Global Cyber Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
The Making of a simple Cyber Threat Intelligence Gathering System
Sans cyber-threat-intelligence-survey-2015
Cyber threat intelligence: maturity and metrics
Actionable Threat Intelligence
Insa cyber intelligence 2011
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
Cyber threat intelligence ppt
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat intelligence Primary Tradecraft and Research
Threat Intelligence Data Collection & Acquisition
Ad

Viewers also liked (20)

PDF
Bridging the Gap Between Threat Intelligence and Risk Management
PDF
Threat Intelligence Is Like Three Day Potty Training
PDF
Dreaming of IoCs Adding Time Context to Threat Intelligence
PDF
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
PPTX
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
PDF
Pivotal role of intelligence analysis in ILP
PPTX
Information Fusion Methods for Location Data Analysis
PPT
Competitive intelligence-analysis-tools-for-economic-development
PDF
Ontologijos, semantinis saitynas ir semantinė paieška
PDF
Cyber Threat Intelligence: Who is Targeting your Information?
PDF
Executive Communications
PDF
Data Fusion for Dealing with the Recommendation Problem
PPT
2004 06 intelligence analysis seminar
PDF
Intelligence Analysis & Cognitive Biases: an Illustrative Case Study
PPTX
What can go wrong in executive communications
PPT
Eidws 110 operations
PPT
Eidws 109 communications
PPT
Eidws 111 opsec
PPT
Eidws 112 intelligence
PPT
intelligence report format
Bridging the Gap Between Threat Intelligence and Risk Management
Threat Intelligence Is Like Three Day Potty Training
Dreaming of IoCs Adding Time Context to Threat Intelligence
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Pivotal role of intelligence analysis in ILP
Information Fusion Methods for Location Data Analysis
Competitive intelligence-analysis-tools-for-economic-development
Ontologijos, semantinis saitynas ir semantinė paieška
Cyber Threat Intelligence: Who is Targeting your Information?
Executive Communications
Data Fusion for Dealing with the Recommendation Problem
2004 06 intelligence analysis seminar
Intelligence Analysis & Cognitive Biases: an Illustrative Case Study
What can go wrong in executive communications
Eidws 110 operations
Eidws 109 communications
Eidws 111 opsec
Eidws 112 intelligence
intelligence report format
Ad

Similar to Session 7.3 Implementing threat intelligence systems - Moving from chaos to structure (20)

PDF
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
PDF
ISF Congress 2016 - Session 7.2_Kukreja
PDF
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
PPTX
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
PPT
13734729.ppt
PDF
Threat_intelligence_Handbook
DOCX
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
PPTX
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
PPTX
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
PDF
Road map for actionable threat intelligence
PPTX
Intelligence-based computer network defence: Understanding the cyber kill cha...
PDF
Journey to the Center of Security Operations
PPTX
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
PPTX
Hands-On Security - ES Guided Tour
PPTX
What i learned at issa international summit 2019
PDF
SplunkLive Wellington 2015 - Splunk for Security
PDF
SplunkLive Auckland 2015 - Splunk for Security
PDF
Splunk for Security
PPTX
Operational Security Intelligence
PDF
Addressing the cyber kill chain
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
ISF Congress 2016 - Session 7.2_Kukreja
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
13734729.ppt
Threat_intelligence_Handbook
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
Road map for actionable threat intelligence
Intelligence-based computer network defence: Understanding the cyber kill cha...
Journey to the Center of Security Operations
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
Hands-On Security - ES Guided Tour
What i learned at issa international summit 2019
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
Splunk for Security
Operational Security Intelligence
Addressing the cyber kill chain

Session 7.3 Implementing threat intelligence systems - Moving from chaos to structure

  • 1. Copyright 2015 © Information Security Forum Limited 1ISF’s 26th Annual World Congress - Atlanta IMPLEMENTING THREAT INTELLIGENCE SYSTEMS: MOVING FROM CHAOS TO STRUCTURE Speakers: Puneet Kukreja Partner, Cyber Advisory, Deloitte Chair: Nick Frost ISF
  • 2. Demystifying Threat Intelligence -keeping it real ISF World Congress – 2015 Atlanta U.S.A.
  • 3. Our Discussion 3 Threat landscape Defining threat intelligence Threat intelligence lifecycle Challenges of threat intelligence What we need What can I takeaway
  • 4. Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence Threat Landscape The cyber threat landscape will continue to deteriorate as the attack surface expands with advances through digital innovation via IoT, consumerisation of enterprise mobility and cloud. Source: http://blogs.cisco.com/ciscoit/cisco-security-intelligence-operations-defense-in-depth
  • 5. Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence Threat landscape Distributed Denial of Service (DDoS) Application Layer Attacks Brute Force Attacks Network Protocol Attacks Known Vulnerability Exploitation Zero Day Exploitation Phishing Rogue Update Attacks Watering Hole Attacks Types of Cyber Attacks
  • 6. Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence Threat landscape
  • 7. Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence “There is nothing more necessary than good intelligence to frustrate a designing enemy & nothing requires greater pains to obtain” - - GEORGE WASHINGTON Defining threat intelligence? Source: Gartner Definition – Threat Intelligence Gartner STRATEGIC TACTICAL TECHNICAL OPERATIONAL TYPES OF THREAT INTELLIGENCE SOURCE: Centre for the Protection of National Infrastructure – UK Government
  • 8. Defining threat intelligence? SOURCE: Centre for the Protection of National Infrastructure – UK Government
  • 9. Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence Is it all about the Kill Chain? Threat intelligence lifecycle RECONNAISSANCE WEAPONISATION DELIVERY EXPLOITATIONINSTALLATION COMMAND & CONTROL ACTIONS ON OBJECTIVES THE KILL CHAIN 1 2 3 45 6 7
  • 10. Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence Is it just not another control process? Threat intelligence lifecycle PLANNING DIRECTION COLLECTION PROCESSINGANALYSIS PRODUCTION DISSEMINATION 1 2 3 45 6 7
  • 11. Standards supporting threat intelligence The Trusted Automated eXchange of Indicator Information (TAXII™) Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX™) Cyber Observable eXpression (CybOX™)
  • 12. Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence STIX Architecture
  • 13. Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence Source: http://stix.mitre.org/ STIX Architecture
  • 14. Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence STIX Use Case (sharing threat information) Source: http://stixproject.github.io/getting-started/whitepaper/
  • 15. Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence Challenges of threat intelligence Why do I ask that question? Attack Graphs Stakeholders Scenario Planning Integrated Architecture Business Case Threat Modelling Contextual Requirements Threat Actors Actionable Governance Threat Feeds
  • 16. What we need Attributes to measure threat intelligence Accurate Relevant Aligned to Requirements Tailored Integrated Timely Predictive Actionable
  • 17. Deloitte Touche Tohmatsu © 2015 - Demystifying Threat Intelligence What can I take away Improves visibility & reporting Integration is required across design, engineering and operations Begins with critical systems and asset inventory Do not overlook security operations process maturity Is only as good as your asset and threat profile classification Vendors are only as good as “your” use cases It’s no Silver Bullet
  • 18. Thank you Puneet Kukreja | Partner | Cyber Advisory Deloitte Australia
  • 19. Copyright 2015 © Information Security Forum Limited 19ISF’s 26th Annual World Congress - Atlanta QUESTIONS?
  • 20. Copyright 2015 © Information Security Forum Limited 20ISF’s 26th Annual World Congress - Atlanta Please feel free to contact us for further discussion: Puneet Kukreja – Partner, Cyber Advisory, Deloitte pkukreja@deloitte.coma.au Nick Frost - ISF nick.frost@securityforum.org