SlideShare a Scribd company logo
ENISA CTI-EU Conference 2022
Andreas Sfakianakis
CTI Professional
§ CTI in Financial, Energy, and Technology sectors
§ ENISA, FIRST.org, SANS, European Commission
§ Twitter: @asfakian
Mastodon: @asfakian@infosec.exchange
§ Websites: www.threatintel.eu
www.sandgroup.eu
tilting at windmills
Setting Your CTI Process In Motion - ENISA CTI-EU 2022
Setting the scene Workflow & Case
Management
Basic Ingredients
Problem Statement(s)
Image from gatewaytotheclassics.com
Setting Your CTI Process In Motion - ENISA CTI-EU 2022
Setting Your CTI Process In Motion - ENISA CTI-EU 2022
Setting Your CTI Process In Motion - ENISA CTI-EU 2022
Image from bestofspain.es
Workflow, Coordination
& Collaboration
Knowledge
Management
Metrics
Setting Your CTI Process In Motion - ENISA CTI-EU 2022
§ Tagging
§ Custom Fields
§ Easy searching and filtering
§ Rate your sources
§ Control access
Management
• Time spent per PIR
• CTI assessments per threat
type/threat actor
• CTI assessments(or time
spent) supporting IR
• Quantitative feedback
received per PIR
• Time spent on RFIs per
stakeholder
Team
• Sources mostly used
• CTI deliverables per PIR
• CTI deliverables per
stakeholder
• Average time spent per
CTI deliverable
• CTI analysts’ workload
• Time spent on CTI projects
Image from heritage-history.com
Setting Your CTI Process In Motion - ENISA CTI-EU 2022
Some TIPs
Recommendation is to live off the land (at least at the start of your journey)
Remember
§ Data into buckets
§ Consistency is key
§ Spend time to save time
Request For Information (RFI) Feedback Mechanism
Image from elladocomicodedonquijote.wordpress.com
§A common shortcoming
of CTI teams
§The importance of workflow and
case management
§The basic ingredients
Planning
Collection
Processing
Analysis
Dissemination
Feedback
CTI Process
Andreas Sfakianakis
@asfakian
threatintel.eu / sandgroup.eu
Sharing is caring

More Related Content

PDF
CTI Training on Intelligence Requirements - ENISA CTI Summer School 2019
PDF
ATT&CKing the Red/Blue Divide
PDF
ATT&CKcon Intro
PDF
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
PDF
Knowledge for the masses: Storytelling with ATT&CK
PDF
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
PDF
Spin Your CTI Process Round - FIRST CTI Conference 2023
PDF
State of the ATT&CK
CTI Training on Intelligence Requirements - ENISA CTI Summer School 2019
ATT&CKing the Red/Blue Divide
ATT&CKcon Intro
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Knowledge for the masses: Storytelling with ATT&CK
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Spin Your CTI Process Round - FIRST CTI Conference 2023
State of the ATT&CK

What's hot (20)

PDF
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
PDF
Landing on Jupyter: The transformative power of data-driven storytelling for ...
PDF
Automating the mundanity of technique IDs with ATT&CK Detections Collector
PDF
ATT&CK Updates- Defensive ATT&CK
PDF
Purple Team Exercises - GRIMMCon
PDF
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
PDF
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
PDF
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
PDF
Threat Hunting Report
PDF
ATT&CK Updates- ATT&CK's Open Source
PDF
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
PDF
ATT&CK Updates- ATT&CK for mac/Linux
PDF
It's just a jump to the left (of boom): Prioritizing detection implementation...
PDF
The ATT&CK Philharmonic
PDF
Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...
PPTX
Purple Teaming with ATT&CK - x33fcon 2018
PPTX
ATT&CKing with Threat Intelligence
PDF
Threat Modelling - It's not just for developers
PDF
Automation: The Wonderful Wizard of CTI (or is it?)
PDF
Purple Team Exercise Framework Workshop #PTEF
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Landing on Jupyter: The transformative power of data-driven storytelling for ...
Automating the mundanity of technique IDs with ATT&CK Detections Collector
ATT&CK Updates- Defensive ATT&CK
Purple Team Exercises - GRIMMCon
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
Threat Hunting Report
ATT&CK Updates- ATT&CK's Open Source
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
ATT&CK Updates- ATT&CK for mac/Linux
It's just a jump to the left (of boom): Prioritizing detection implementation...
The ATT&CK Philharmonic
Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...
Purple Teaming with ATT&CK - x33fcon 2018
ATT&CKing with Threat Intelligence
Threat Modelling - It's not just for developers
Automation: The Wonderful Wizard of CTI (or is it?)
Purple Team Exercise Framework Workshop #PTEF
Ad

Similar to Setting Your CTI Process In Motion - ENISA CTI-EU 2022 (20)

PPTX
Modern cybersecurity threats, and shiny new tools to help deal with them
PDF
Modern cybersecurity threats, and shiny new tools to help deal with them - T...
PDF
AARC Assurance Profiles for Kantara Initiative
PDF
CYB205-1 Evolving Threat Landscapes_01.pdf
PPTX
CYB205-1 Evolving Threat Landscapes_01.pptx
PPTX
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
PPTX
Gabor Munk - CTI and Information Sharing
PDF
Still thinking your Ex(cel)? Here are some TIPs - SANS CTI Summit 2021
PPT
Quant & Crypto Gold
PPT
Have the Bad Guys Won the Cyber security War...
PDF
ICIC 2017: Technology Scouting: Decision Support in Strategic Analyses for Te...
PDF
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
PDF
Security Incident Handling for Schools
PPTX
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
PPTX
How Internet Peering Improves Security
PPT
An Introduction to Digital Preservation
PDF
Incident handling of cyber espionage
ODP
Infosec Workshop - PacINET 2007
PPTX
Honeypots for proactively detecting security incidents
PPTX
ENISA - EU strategies for cyber incident response
Modern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with them - T...
AARC Assurance Profiles for Kantara Initiative
CYB205-1 Evolving Threat Landscapes_01.pdf
CYB205-1 Evolving Threat Landscapes_01.pptx
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
Gabor Munk - CTI and Information Sharing
Still thinking your Ex(cel)? Here are some TIPs - SANS CTI Summit 2021
Quant & Crypto Gold
Have the Bad Guys Won the Cyber security War...
ICIC 2017: Technology Scouting: Decision Support in Strategic Analyses for Te...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Security Incident Handling for Schools
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
How Internet Peering Improves Security
An Introduction to Digital Preservation
Incident handling of cyber espionage
Infosec Workshop - PacINET 2007
Honeypots for proactively detecting security incidents
ENISA - EU strategies for cyber incident response
Ad

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Approach and Philosophy of On baking technology
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PPTX
Big Data Technologies - Introduction.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Cloud computing and distributed systems.
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
KodekX | Application Modernization Development
Review of recent advances in non-invasive hemoglobin estimation
Understanding_Digital_Forensics_Presentation.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Approach and Philosophy of On baking technology
GamePlan Trading System Review: Professional Trader's Honest Take
Big Data Technologies - Introduction.pptx
Electronic commerce courselecture one. Pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Weekly Chronicles - August'25 Week I
The Rise and Fall of 3GPP – Time for a Sabbatical?
Cloud computing and distributed systems.
CIFDAQ's Market Insight: SEC Turns Pro Crypto
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
cuic standard and advanced reporting.pdf
20250228 LYD VKU AI Blended-Learning.pptx
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
KodekX | Application Modernization Development

Setting Your CTI Process In Motion - ENISA CTI-EU 2022