Mitigate Threats Faster with an
Intelligence-Driven Defense
Dan Cole
Director of Product Management
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
Todayโ€™s Agenda
Get answers:
โ€ข Intelligence-Driven Defense (IDD) : what
does it mean in real terms?
โ€ข How can teams at all levels of maturity
take advantage of IDD?
โ€ข What does IDD look like operationally in
ThreatConnect?
2
Intelligence-Driven Defense (IDD)
What does it mean?
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
How to Define Threat Intelligence
First, what is threat intelligence?
โ€œThreat intelligence is evidence-based
knowledge, including context, mechanisms,
indicators, implications and actionable advice,
about an existing or emerging menace or
hazard to assets that can be used to inform
decisions regarding the subjectโ€™s response to
that menace or hazard.โ€
โ€œThe details of the motivations, intent, and
capabilities of internal and external threat
actors. Threat intelligence includes specifics
on the tactics, techniques, and procedures of
these adversaries. Threat intelligenceโ€™s
primary purpose is to inform business
decisions regarding the risks and
implications associated with threats."
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
Threat Intelligence: Simplified
Now on my reading level..
โ€œKnowledge of threats that you can use to defend yourself.โ€
โ€œActionable Knowledge of Threatsโ€
Distilled even more:
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved. 6
The Threat Defense Surface Area (TDSA)
Bigger Targets need Bigger Shields
The likelihood of
having things go right in
your security organization.
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
Strength/capabilities/focus
of your threat intelligence
X
People and tools to whom
that TI is effectively
communicated
(i.e. โ€œoperationsโ€)
=
Your Threat Defense
Surface Area
7
The Threat Defense Surface Area (TDSA)
The Geometry of IDD
Operations
Intelligence
A = I * O
TI is siloed
Bare bones
Unclear focus
False positives
++MTTD
TI is shared
Fleshed out
Intel Requirements
Fewer FPs
--MTTD
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
Intelligence-Driven Defense means...
Your entire security team (and beyond) is
dedicated to increasing your Threat Defense
Surface Area by actively communicating and
contributing in order to:
โ— Increase actionable knowledge of threats
โ— Leverage that knowledge
Intelligence-Driven Defense for All
How can teams at all levels of maturity take
advantage of IDD?
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
Determining Whatโ€™s Right For You
โ€ข Needs differ based on factors like threat landscape, maturity, risk tolerance, size, and budget
โ€ข What are your threat intelligence requirements?
โ€ข Are your needs more strategic or tactical?
โ€ข How big of a target does your TDSA need to cover?
10
Different Teams Have Different Needs
More MatureLess Mature
Using Threat
Intelligence
Doing Threat
Intelligence
Prevention & Detection Assisting IR Inform Security Policy
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
TC Identify
11
The Intel Consumer
Whoโ€™s it for?
โ€ข The โ€œIntel Consumerโ€
โ€ข Smaller teams just getting started
What do they want to do with it?
โ€ข Consume Intel
โ€ข Reduce False Positives in their SIEM
โ€ข Get started on increasing their Threat Defense Surface Area
What do they need?
โ€ข Machine-Readable Threat Intelligence
โ€ข ThreatConnect Intelligence
โ€ข Minimal Setup and Support
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
TC Manage
12
The Under-Resourced Intel Rebel
Whoโ€™s it for?
โ€ข The Under-Resourced โ€œIntel Rebelโ€
โ€ข Small team, needs to do more with less
What do they want to do with it?
โ€ข Same as Intel Consumer
โ€ข Plus automation and orchestration
What do they need?
โ€ข Get all teams and tools talking
โ€ข Playbooks
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
TC Analyze
13
The Intel Analyst
Whoโ€™s it for?
โ€ข The โ€œIntel Analystโ€
โ€ข Mature teams that want to create new intel
What do they want to do with it?
โ€ข Consume, analyze, create and share intel
โ€ข Strategic view of intel for advising, policy
What do they need?
โ€ข Powerful data model to support threat modelling
โ€ข Sharing and reporting
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
TC Complete
14
The Ultimate Power in Threat Intelligence
Whoโ€™s it for?
โ€ข Mature teams
โ€ข Security leaders who want to build an intelligence-driven
security organization from the ground up
What do they want to do with it?
โ€ข Build and Customize the Platform and Apps
โ€ข Create Complex Automations & Orchestration
โ€ข Inform Team, Speed Response
โ€ข Inform Decisions Across the Organization
What do they need?
โ€ข A fully extensible, intelligence-driven platform
โ€ข Full threat modelling and communication support
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
Putting it all together
15
How does ThreatConnect Help?
Operations
Intelligence
A = I * C
Intelligence * Operations
=
Your Threat Defense Surface Area
Intelligence-Driven Defense in ThreatConnect
What does IDD look like operationally in
ThreatConnect?
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
Playbooks -
Automation &
Orchestration
Problem
โ€ข Fragmented technologies and
processes in cybersecurity
Solution
โ€ข Create automated playbooks
โ€ข Configure apps to talk to each other
automatically
โ€ข Share Playbooks across teams
โ€ข Human-in-the-loop
17
Intelligence-Driven
Automation &
Orchestration
Augment human
intuition by freeing it
from mundane tasks
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
Collective Analytics Layer
Provide global insights on threat data to all ThreatConnect instances
18
EvilDomain.com
Public
whitelists?
How many
sources?
How many of TCโ€™s 15K other
analysts have viewed it?
Was it observed recently
by others?
Are the sources you find
relevant and accurate?
What
about
false
positives?
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
The Scenario
โ€ข Security team of a Fortune 500 company is
on the lookout for whaling scams
โ€ข Standard loadout: SOC, IR, CTI
โ€ข CTI has gathered intel on several possible
adversaries
โ€ข SOC has several monitoring inboxes for
collecting email alert data
โ€ข TC Complete
19
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
An alert!
Teeny-tiny TDSA
Operations
Intelligence
Iteration One
โ— SOC inbox ingests an email
โ— Playbook extracts the indicators and
stores them in ThreatConnect
No one is notified.
Nothing happens.
Maybe someone will check it out later.
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
Analysis and Awareness in Realtime
Adding Intel and Telling Someone
Operations
Intelligence
Iteration Two
โ— Indicators sent to third party for enrichment
โ— Enrichment data matched against ThreatConnect
โ— SOC team notified of potential matches
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
Communicating Across Teams and Time
Increasing the Area
Operations
Intelligence
Iteration Three
โ— The CTI teamโ€™s intel identified an adversary that used
whaling scams
โ— The CTI team recorded whaling scams in
ThreatConnect as a key requirement
โ— This flag causes the IR team to be notified in Slack
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
Avoiding False Positives
Almost there...
Operations
Intelligence
Iteration Four
โ— Instead of blindly notifying the IR team, the Playbook checks
CAL for false positives
โ— If there are FPs, the IR team is not notified and the SOC teamโ€™s
email is updated instead
โ— Adversary record updated for future TI regardless of outcome
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
Closing the Loop
Saturation
Operations
Intelligence
Iteration Five
โ— IR team deep dives on key data in CAL
โ— Hits a button to block a malicious indicator
โ— CTI team gets feedback on action taken
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
Intelligence-Driven Defense
How does ThreatConnect Help?
Operations
Intelligence
Intelligence
โ— Enriched data using reverse WHOIS
โ— Referenced intel on existing adversary
โ— Use of intel requirements
โ— Used CAL to mitigate false positives
Operations
โ— Notified all teams of Whaling Scam
requirement
โ— Slacked IR team on alert
โ— CoA reported back to CTI
โ— Used CAL to mitigate false positives
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
Questions?
ยฉ 2017 ThreatConnect, Inc. All Rights Reserved.
Thank You
THREATCONNECT.COM

Intelligence driven defense webinar

  • 1.
    Mitigate Threats Fasterwith an Intelligence-Driven Defense Dan Cole Director of Product Management
  • 2.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. Todayโ€™s Agenda Get answers: โ€ข Intelligence-Driven Defense (IDD) : what does it mean in real terms? โ€ข How can teams at all levels of maturity take advantage of IDD? โ€ข What does IDD look like operationally in ThreatConnect? 2
  • 3.
  • 4.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. How to Define Threat Intelligence First, what is threat intelligence? โ€œThreat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subjectโ€™s response to that menace or hazard.โ€ โ€œThe details of the motivations, intent, and capabilities of internal and external threat actors. Threat intelligence includes specifics on the tactics, techniques, and procedures of these adversaries. Threat intelligenceโ€™s primary purpose is to inform business decisions regarding the risks and implications associated with threats."
  • 5.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. Threat Intelligence: Simplified Now on my reading level.. โ€œKnowledge of threats that you can use to defend yourself.โ€ โ€œActionable Knowledge of Threatsโ€ Distilled even more:
  • 6.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. 6 The Threat Defense Surface Area (TDSA) Bigger Targets need Bigger Shields The likelihood of having things go right in your security organization.
  • 7.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. Strength/capabilities/focus of your threat intelligence X People and tools to whom that TI is effectively communicated (i.e. โ€œoperationsโ€) = Your Threat Defense Surface Area 7 The Threat Defense Surface Area (TDSA) The Geometry of IDD Operations Intelligence A = I * O TI is siloed Bare bones Unclear focus False positives ++MTTD TI is shared Fleshed out Intel Requirements Fewer FPs --MTTD
  • 8.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. Intelligence-Driven Defense means... Your entire security team (and beyond) is dedicated to increasing your Threat Defense Surface Area by actively communicating and contributing in order to: โ— Increase actionable knowledge of threats โ— Leverage that knowledge
  • 9.
    Intelligence-Driven Defense forAll How can teams at all levels of maturity take advantage of IDD?
  • 10.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. Determining Whatโ€™s Right For You โ€ข Needs differ based on factors like threat landscape, maturity, risk tolerance, size, and budget โ€ข What are your threat intelligence requirements? โ€ข Are your needs more strategic or tactical? โ€ข How big of a target does your TDSA need to cover? 10 Different Teams Have Different Needs More MatureLess Mature Using Threat Intelligence Doing Threat Intelligence Prevention & Detection Assisting IR Inform Security Policy
  • 11.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. TC Identify 11 The Intel Consumer Whoโ€™s it for? โ€ข The โ€œIntel Consumerโ€ โ€ข Smaller teams just getting started What do they want to do with it? โ€ข Consume Intel โ€ข Reduce False Positives in their SIEM โ€ข Get started on increasing their Threat Defense Surface Area What do they need? โ€ข Machine-Readable Threat Intelligence โ€ข ThreatConnect Intelligence โ€ข Minimal Setup and Support
  • 12.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. TC Manage 12 The Under-Resourced Intel Rebel Whoโ€™s it for? โ€ข The Under-Resourced โ€œIntel Rebelโ€ โ€ข Small team, needs to do more with less What do they want to do with it? โ€ข Same as Intel Consumer โ€ข Plus automation and orchestration What do they need? โ€ข Get all teams and tools talking โ€ข Playbooks
  • 13.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. TC Analyze 13 The Intel Analyst Whoโ€™s it for? โ€ข The โ€œIntel Analystโ€ โ€ข Mature teams that want to create new intel What do they want to do with it? โ€ข Consume, analyze, create and share intel โ€ข Strategic view of intel for advising, policy What do they need? โ€ข Powerful data model to support threat modelling โ€ข Sharing and reporting
  • 14.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. TC Complete 14 The Ultimate Power in Threat Intelligence Whoโ€™s it for? โ€ข Mature teams โ€ข Security leaders who want to build an intelligence-driven security organization from the ground up What do they want to do with it? โ€ข Build and Customize the Platform and Apps โ€ข Create Complex Automations & Orchestration โ€ข Inform Team, Speed Response โ€ข Inform Decisions Across the Organization What do they need? โ€ข A fully extensible, intelligence-driven platform โ€ข Full threat modelling and communication support
  • 15.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. Putting it all together 15 How does ThreatConnect Help? Operations Intelligence A = I * C Intelligence * Operations = Your Threat Defense Surface Area
  • 16.
    Intelligence-Driven Defense inThreatConnect What does IDD look like operationally in ThreatConnect?
  • 17.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. Playbooks - Automation & Orchestration Problem โ€ข Fragmented technologies and processes in cybersecurity Solution โ€ข Create automated playbooks โ€ข Configure apps to talk to each other automatically โ€ข Share Playbooks across teams โ€ข Human-in-the-loop 17 Intelligence-Driven Automation & Orchestration Augment human intuition by freeing it from mundane tasks
  • 18.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. Collective Analytics Layer Provide global insights on threat data to all ThreatConnect instances 18 EvilDomain.com Public whitelists? How many sources? How many of TCโ€™s 15K other analysts have viewed it? Was it observed recently by others? Are the sources you find relevant and accurate? What about false positives?
  • 19.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. The Scenario โ€ข Security team of a Fortune 500 company is on the lookout for whaling scams โ€ข Standard loadout: SOC, IR, CTI โ€ข CTI has gathered intel on several possible adversaries โ€ข SOC has several monitoring inboxes for collecting email alert data โ€ข TC Complete 19
  • 20.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. An alert! Teeny-tiny TDSA Operations Intelligence Iteration One โ— SOC inbox ingests an email โ— Playbook extracts the indicators and stores them in ThreatConnect No one is notified. Nothing happens. Maybe someone will check it out later.
  • 21.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. Analysis and Awareness in Realtime Adding Intel and Telling Someone Operations Intelligence Iteration Two โ— Indicators sent to third party for enrichment โ— Enrichment data matched against ThreatConnect โ— SOC team notified of potential matches
  • 22.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. Communicating Across Teams and Time Increasing the Area Operations Intelligence Iteration Three โ— The CTI teamโ€™s intel identified an adversary that used whaling scams โ— The CTI team recorded whaling scams in ThreatConnect as a key requirement โ— This flag causes the IR team to be notified in Slack
  • 23.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. Avoiding False Positives Almost there... Operations Intelligence Iteration Four โ— Instead of blindly notifying the IR team, the Playbook checks CAL for false positives โ— If there are FPs, the IR team is not notified and the SOC teamโ€™s email is updated instead โ— Adversary record updated for future TI regardless of outcome
  • 24.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. Closing the Loop Saturation Operations Intelligence Iteration Five โ— IR team deep dives on key data in CAL โ— Hits a button to block a malicious indicator โ— CTI team gets feedback on action taken
  • 25.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. Intelligence-Driven Defense How does ThreatConnect Help? Operations Intelligence Intelligence โ— Enriched data using reverse WHOIS โ— Referenced intel on existing adversary โ— Use of intel requirements โ— Used CAL to mitigate false positives Operations โ— Notified all teams of Whaling Scam requirement โ— Slacked IR team on alert โ— CoA reported back to CTI โ— Used CAL to mitigate false positives
  • 26.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. Questions?
  • 27.
    ยฉ 2017 ThreatConnect,Inc. All Rights Reserved. Thank You THREATCONNECT.COM