SlideShare a Scribd company logo
Landing on Jupyter
Stephan Chenette & Jose Barajas
MITRE ATT&CK 3.0, March 2022
The Transformative Power of Data-Driven Storytelling for Security Operations
Storytelling is an
ancient art
Data driven storytelling
is a powerful tool
Jupyter notebooks can
be a very valuable tool
for data driven
storytelling...
Let me show you with a few examples...
Jupyter Notebooks
Attack Flows and Technology Investment Gaps
Attack Flows and Technology Investment Gaps
Presenter CISO / Security Team
Audience Technical Management (e.g. CISO, CIO, CRO, etc.)
Question
How can I demonstrate our current security posture against relevant
threat actor campaigns to the management team and demonstrate
where where we have gaps and where we are focused on improving?
Desired
reaction
I want the management team to see the results and support our budget
and prioritization of security and risk projects.
Narrative
As the presenter, you should be able to confidentiality present the
organizational security posture as well as how the above threat actor
campaigns were emulated and how they are relevant. You can then
discuss which behavior have coverage or where a gaps exists. For any
cells that are red, you can discuss what projects or actions are in
progress, what further tools/resources are needed to close the gap, and
how investing in those tools or resources will close the gap.
Attack Flows Detection Coverage and Discrepancies
Attack Flows Detection Coverage and Discrepancies
Presenter CISO / Security Team
Audience Technical Operations
Question
How can I provide all details to my technical operations team
related to existing detection rules or enabled capabilities and
mapping to the related threat emulation results we executed so
that they have all the necessary details to improve our security
posture?
Desired
Reaction
I want my technical operations team to investigate and take
action regarding remediation and/or mitigation strategies to
improve the security controls and overall security posture of the
organization.
Narrative
As the presenter, you’re able to preempt any questions and
provide all the necessary details so that the individuals on the
technical operations team can investigate the scenarios and the
endpoint control policy to see what can be configured to improve
prevention and detection coverage. If nothing can be done
natively, then these details will allow discussion with the
endpoint control vendor so that the vendor can improve its
capabilities. Ultimately, once mitigation or remediation has
happened, the technical operations team can re-test themselves
directly or collaborate with the security testing team to re-test
and verify that the changes do, in fact, improve coverage.
Presenter CISO / Security Team
Audience Technical Management
Question
How can I provide all details to my technical management team
related to the threat emulation exercises we executed so they
can see at a MITRE ATT&CK tactical level what gaps we have
within the attack lifecycle and if gaps existing at the beginning,
middle or end or all of the above.
Desired
Reaction
I want my technical management team to support our efforts
regarding investigation, remediation and/or mitigation strategies
so we can improve the security controls and overall security
posture of the organization.
Narrative
As the presenter mapping to a framework like MITRE ATT&CK
and utilizing the tactics as a means to describe where in the
attack lifecycle gaps exists, is crucial to gaining support and
being enabled to prioritize resources appropriately to improve
security operations and response.
Historical Performance
Historical Performance
Presenter CISO / Security Team
Audience Technical Operations
Question
How can we demonstrate and prove improvement over time of our
investments, controls and detection logic rules while demonstrating remaining
gaps?
Desired
reaction
I want the technical operations to see with evidence and details that the
improvements they made had an effect and improved our security posture
while also seeing gaps still exist and there is either room for improvement or a
need to justify not making changes so that they can take action!
Narrative
As the presenter, it’s important to provide a view historically of progress and
demonstrate that progress or demand a certain sense of urgency if no
progress is being made. Demonstrating improvement will create a momentum
of energy to continue to improve and take any existing gaps more seriously
for the purpose of allocating resources appropriately and to continue to
improve. It’s important to note that new attack flows can be updated or added
so this process will never end.
Presenter CISO / Security Team
Audience Technical Management
Question
How can I provide both high level detail and technical details to show to our management team that
we are improving over time and resources are being spent effectively but there is more to be done?
Desired
Reaction
I want my technical management team to support our efforts by seeing credible proof of
improvement and existing gaps.
Narrative
As a presenter, it’s important to abstract detail away so the picture is crystal clear of historical
performance while also providing accompanying technical details as a means of credibility that the
issues are known, some have been fixed but more work is ahead and it’s being prioritized
efficiently.
The Transformative Storytelling
Power of the Jupyter Notebook:
Unlike static PowerPoints where data was extracted and
is quickly out of date, Jupyter Notebooks allow users
to tell a real-time data-driven story
Unlike a customized dashboard where data might
be extract in real-time, Jupyter Notebooks can
allow a sequential storytelling element
Build a Jupyter Notebook for your audience that:
• Provides visual data insights
• Anticipates top level questions
• Provokes emotion
• Enable data-driven decision making
Conclusion:
Thank You.
Questions?

More Related Content

What's hot

ATT&CK Updates- Defensive ATT&CK
ATT&CK Updates- Defensive ATT&CKATT&CK Updates- Defensive ATT&CK
ATT&CK Updates- Defensive ATT&CKMITRE ATT&CK
 
ATT&CK Updates- Campaigns
ATT&CK Updates- CampaignsATT&CK Updates- Campaigns
ATT&CK Updates- CampaignsMITRE ATT&CK
 
Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developersThreat Modelling - It's not just for developers
Threat Modelling - It's not just for developersMITRE ATT&CK
 
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CKATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CKMITRE ATT&CK
 
The ATT&CK Philharmonic
The ATT&CK PhilharmonicThe ATT&CK Philharmonic
The ATT&CK PhilharmonicMITRE ATT&CK
 
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
 Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro... Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...MITRE ATT&CK
 
State of the ATT&CK
State of the ATT&CKState of the ATT&CK
State of the ATT&CKMITRE ATT&CK
 
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...MITRE ATT&CK
 
ATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open SourceATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open SourceMITRE ATT&CK
 
Projects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the CenterProjects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the CenterMITRE ATT&CK
 
ATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue DivideATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue DivideMITRE ATT&CK
 
The ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookThe ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookMITRE ATT&CK
 
ATT&CK Updates- ATT&CK for mac/Linux
ATT&CK Updates- ATT&CK for mac/LinuxATT&CK Updates- ATT&CK for mac/Linux
ATT&CK Updates- ATT&CK for mac/LinuxMITRE ATT&CK
 
From Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have ChangedFrom Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have ChangedMITRE - ATT&CKcon
 
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...MITRE - ATT&CKcon
 
TA505: A Study of High End Big Game Hunting in 2020
TA505: A Study of High End Big Game Hunting in 2020TA505: A Study of High End Big Game Hunting in 2020
TA505: A Study of High End Big Game Hunting in 2020MITRE - ATT&CKcon
 
ATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSMITRE ATT&CK
 
When Insiders ATT&CK!
When Insiders ATT&CK!When Insiders ATT&CK!
When Insiders ATT&CK!MITRE ATT&CK
 
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR TelemetryTidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR TelemetryMITRE ATT&CK
 

What's hot (20)

ATT&CK Updates- Defensive ATT&CK
ATT&CK Updates- Defensive ATT&CKATT&CK Updates- Defensive ATT&CK
ATT&CK Updates- Defensive ATT&CK
 
ATT&CK Updates- Campaigns
ATT&CK Updates- CampaignsATT&CK Updates- Campaigns
ATT&CK Updates- Campaigns
 
Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developersThreat Modelling - It's not just for developers
Threat Modelling - It's not just for developers
 
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CKATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
 
The ATT&CK Philharmonic
The ATT&CK PhilharmonicThe ATT&CK Philharmonic
The ATT&CK Philharmonic
 
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
 Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro... Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
 
State of the ATT&CK
State of the ATT&CKState of the ATT&CK
State of the ATT&CK
 
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
 
ATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open SourceATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open Source
 
Projects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the CenterProjects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the Center
 
ATT&CKcon Intro
ATT&CKcon IntroATT&CKcon Intro
ATT&CKcon Intro
 
ATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue DivideATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue Divide
 
The ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookThe ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT Playbook
 
ATT&CK Updates- ATT&CK for mac/Linux
ATT&CK Updates- ATT&CK for mac/LinuxATT&CK Updates- ATT&CK for mac/Linux
ATT&CK Updates- ATT&CK for mac/Linux
 
From Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have ChangedFrom Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have Changed
 
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
 
TA505: A Study of High End Big Game Hunting in 2020
TA505: A Study of High End Big Game Hunting in 2020TA505: A Study of High End Big Game Hunting in 2020
TA505: A Study of High End Big Game Hunting in 2020
 
ATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICS
 
When Insiders ATT&CK!
When Insiders ATT&CK!When Insiders ATT&CK!
When Insiders ATT&CK!
 
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR TelemetryTidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
 

Similar to Landing on Jupyter: The transformative power of data-driven storytelling for security operations

Presentation by parag saha
Presentation by parag sahaPresentation by parag saha
Presentation by parag sahaPMI_IREP_TP
 
Make Continuous Delivery work for middle management
Make Continuous Delivery work for middle managementMake Continuous Delivery work for middle management
Make Continuous Delivery work for middle managementMatteo Emili
 
Planning for an Oil & Gas Operation Well Life Cycle Framework
Planning for an Oil & Gas Operation Well Life Cycle FrameworkPlanning for an Oil & Gas Operation Well Life Cycle Framework
Planning for an Oil & Gas Operation Well Life Cycle FrameworkJeff Dyk
 
John Kenyon masterclass
John Kenyon masterclassJohn Kenyon masterclass
John Kenyon masterclassConnecting Up
 
Successful HR Technology Implementations Demystified
Successful HR Technology Implementations DemystifiedSuccessful HR Technology Implementations Demystified
Successful HR Technology Implementations DemystifiedTincup & Co.
 
Presentation by dakshinamoorthi g
Presentation by dakshinamoorthi  gPresentation by dakshinamoorthi  g
Presentation by dakshinamoorthi gPMI_IREP_TP
 
Case study on radio station
Case study on radio stationCase study on radio station
Case study on radio stationafira20
 
Info_Sec&Cyber_Security_Intervention-v1
Info_Sec&Cyber_Security_Intervention-v1Info_Sec&Cyber_Security_Intervention-v1
Info_Sec&Cyber_Security_Intervention-v1John Gilleland, CPCU
 
Tech reboot Jan All staff 2015 DRAFT 4
Tech reboot Jan All staff 2015 DRAFT 4Tech reboot Jan All staff 2015 DRAFT 4
Tech reboot Jan All staff 2015 DRAFT 4Rachel Murphy
 
Deploying a data centric approach to enterprise agility
Deploying a data centric approach to enterprise agilityDeploying a data centric approach to enterprise agility
Deploying a data centric approach to enterprise agilityComparative Agility
 
Building analytics / AI capability Conference Presentation
Building analytics / AI capability Conference PresentationBuilding analytics / AI capability Conference Presentation
Building analytics / AI capability Conference PresentationVenkat Chandra ("VC")
 
WEEK2-Analyzing the Business Case.pdf
WEEK2-Analyzing the    Business Case.pdfWEEK2-Analyzing the    Business Case.pdf
WEEK2-Analyzing the Business Case.pdfssuser590cc81
 
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITIONBhavanthSoni
 
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...31West Global Services
 
Implementing an enterprise architecture
Implementing an enterprise architectureImplementing an enterprise architecture
Implementing an enterprise architectureKevin Kempton
 
La Dove Associates -- CRM/Customer Care Consulting Overview
La Dove Associates --  CRM/Customer Care Consulting Overview La Dove Associates --  CRM/Customer Care Consulting Overview
La Dove Associates -- CRM/Customer Care Consulting Overview LaDove Associates
 
5 Keys to Mastering Today's Communication Domain
5 Keys to Mastering Today's Communication Domain5 Keys to Mastering Today's Communication Domain
5 Keys to Mastering Today's Communication DomainAvaya Inc.
 

Similar to Landing on Jupyter: The transformative power of data-driven storytelling for security operations (20)

Landing on Jupyter
Landing on JupyterLanding on Jupyter
Landing on Jupyter
 
BI_StrategyDM2
BI_StrategyDM2BI_StrategyDM2
BI_StrategyDM2
 
Presentation by parag saha
Presentation by parag sahaPresentation by parag saha
Presentation by parag saha
 
Make Continuous Delivery work for middle management
Make Continuous Delivery work for middle managementMake Continuous Delivery work for middle management
Make Continuous Delivery work for middle management
 
Planning for an Oil & Gas Operation Well Life Cycle Framework
Planning for an Oil & Gas Operation Well Life Cycle FrameworkPlanning for an Oil & Gas Operation Well Life Cycle Framework
Planning for an Oil & Gas Operation Well Life Cycle Framework
 
John Kenyon masterclass
John Kenyon masterclassJohn Kenyon masterclass
John Kenyon masterclass
 
Successful HR Technology Implementations Demystified
Successful HR Technology Implementations DemystifiedSuccessful HR Technology Implementations Demystified
Successful HR Technology Implementations Demystified
 
Presentation by dakshinamoorthi g
Presentation by dakshinamoorthi  gPresentation by dakshinamoorthi  g
Presentation by dakshinamoorthi g
 
Case study on radio station
Case study on radio stationCase study on radio station
Case study on radio station
 
Info_Sec&Cyber_Security_Intervention-v1
Info_Sec&Cyber_Security_Intervention-v1Info_Sec&Cyber_Security_Intervention-v1
Info_Sec&Cyber_Security_Intervention-v1
 
Tech reboot Jan All staff 2015 DRAFT 4
Tech reboot Jan All staff 2015 DRAFT 4Tech reboot Jan All staff 2015 DRAFT 4
Tech reboot Jan All staff 2015 DRAFT 4
 
Deploying a data centric approach to enterprise agility
Deploying a data centric approach to enterprise agilityDeploying a data centric approach to enterprise agility
Deploying a data centric approach to enterprise agility
 
Building analytics / AI capability Conference Presentation
Building analytics / AI capability Conference PresentationBuilding analytics / AI capability Conference Presentation
Building analytics / AI capability Conference Presentation
 
WEEK2-Analyzing the Business Case.pdf
WEEK2-Analyzing the    Business Case.pdfWEEK2-Analyzing the    Business Case.pdf
WEEK2-Analyzing the Business Case.pdf
 
Po session
Po sessionPo session
Po session
 
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
10 ESSENTIALS FOR A SUCCESSFUL OFFSHORE TRANSITION
 
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
White Paper: "Keys to a Successful Call Center Transition" (31West Knowledge ...
 
Implementing an enterprise architecture
Implementing an enterprise architectureImplementing an enterprise architecture
Implementing an enterprise architecture
 
La Dove Associates -- CRM/Customer Care Consulting Overview
La Dove Associates --  CRM/Customer Care Consulting Overview La Dove Associates --  CRM/Customer Care Consulting Overview
La Dove Associates -- CRM/Customer Care Consulting Overview
 
5 Keys to Mastering Today's Communication Domain
5 Keys to Mastering Today's Communication Domain5 Keys to Mastering Today's Communication Domain
5 Keys to Mastering Today's Communication Domain
 

More from MITRE ATT&CK

Dealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailDealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailMITRE ATT&CK
 
Automating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard ArchitectureAutomating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard ArchitectureMITRE ATT&CK
 
I can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CKI can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CKMITRE ATT&CK
 
CISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity AdvisoriesCISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity AdvisoriesMITRE ATT&CK
 
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)MITRE ATT&CK
 
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...MITRE ATT&CK
 
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK MappingEvaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK MappingMITRE ATT&CK
 
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)MITRE ATT&CK
 
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight BagMITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight BagMITRE ATT&CK
 
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSExploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSMITRE ATT&CK
 
MITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the CloudMITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the CloudMITRE ATT&CK
 
Using ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real dataUsing ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real dataMITRE ATT&CK
 
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...MITRE ATT&CK
 
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...MITRE ATT&CK
 
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...MITRE ATT&CK
 
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...MITRE ATT&CK
 
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...MITRE ATT&CK
 
MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK
 
The case for quishing
The case for quishingThe case for quishing
The case for quishingMITRE ATT&CK
 
Discussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataDiscussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataMITRE ATT&CK
 

More from MITRE ATT&CK (20)

Dealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailDealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of Detail
 
Automating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard ArchitectureAutomating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard Architecture
 
I can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CKI can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CK
 
CISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity AdvisoriesCISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity Advisories
 
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
 
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
 
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK MappingEvaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
 
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
 
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight BagMITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
 
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSExploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
 
MITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the CloudMITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the Cloud
 
Using ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real dataUsing ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real data
 
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
 
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
 
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
 
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
 
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
 
MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICS
 
The case for quishing
The case for quishingThe case for quishing
The case for quishing
 
Discussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataDiscussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber Data
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfalexjohnson7307
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 

Landing on Jupyter: The transformative power of data-driven storytelling for security operations

  • 1. Landing on Jupyter Stephan Chenette & Jose Barajas MITRE ATT&CK 3.0, March 2022 The Transformative Power of Data-Driven Storytelling for Security Operations
  • 3. Data driven storytelling is a powerful tool
  • 4. Jupyter notebooks can be a very valuable tool for data driven storytelling... Let me show you with a few examples...
  • 6. Attack Flows and Technology Investment Gaps
  • 7. Attack Flows and Technology Investment Gaps Presenter CISO / Security Team Audience Technical Management (e.g. CISO, CIO, CRO, etc.) Question How can I demonstrate our current security posture against relevant threat actor campaigns to the management team and demonstrate where where we have gaps and where we are focused on improving? Desired reaction I want the management team to see the results and support our budget and prioritization of security and risk projects. Narrative As the presenter, you should be able to confidentiality present the organizational security posture as well as how the above threat actor campaigns were emulated and how they are relevant. You can then discuss which behavior have coverage or where a gaps exists. For any cells that are red, you can discuss what projects or actions are in progress, what further tools/resources are needed to close the gap, and how investing in those tools or resources will close the gap.
  • 8. Attack Flows Detection Coverage and Discrepancies
  • 9. Attack Flows Detection Coverage and Discrepancies Presenter CISO / Security Team Audience Technical Operations Question How can I provide all details to my technical operations team related to existing detection rules or enabled capabilities and mapping to the related threat emulation results we executed so that they have all the necessary details to improve our security posture? Desired Reaction I want my technical operations team to investigate and take action regarding remediation and/or mitigation strategies to improve the security controls and overall security posture of the organization. Narrative As the presenter, you’re able to preempt any questions and provide all the necessary details so that the individuals on the technical operations team can investigate the scenarios and the endpoint control policy to see what can be configured to improve prevention and detection coverage. If nothing can be done natively, then these details will allow discussion with the endpoint control vendor so that the vendor can improve its capabilities. Ultimately, once mitigation or remediation has happened, the technical operations team can re-test themselves directly or collaborate with the security testing team to re-test and verify that the changes do, in fact, improve coverage. Presenter CISO / Security Team Audience Technical Management Question How can I provide all details to my technical management team related to the threat emulation exercises we executed so they can see at a MITRE ATT&CK tactical level what gaps we have within the attack lifecycle and if gaps existing at the beginning, middle or end or all of the above. Desired Reaction I want my technical management team to support our efforts regarding investigation, remediation and/or mitigation strategies so we can improve the security controls and overall security posture of the organization. Narrative As the presenter mapping to a framework like MITRE ATT&CK and utilizing the tactics as a means to describe where in the attack lifecycle gaps exists, is crucial to gaining support and being enabled to prioritize resources appropriately to improve security operations and response.
  • 11. Historical Performance Presenter CISO / Security Team Audience Technical Operations Question How can we demonstrate and prove improvement over time of our investments, controls and detection logic rules while demonstrating remaining gaps? Desired reaction I want the technical operations to see with evidence and details that the improvements they made had an effect and improved our security posture while also seeing gaps still exist and there is either room for improvement or a need to justify not making changes so that they can take action! Narrative As the presenter, it’s important to provide a view historically of progress and demonstrate that progress or demand a certain sense of urgency if no progress is being made. Demonstrating improvement will create a momentum of energy to continue to improve and take any existing gaps more seriously for the purpose of allocating resources appropriately and to continue to improve. It’s important to note that new attack flows can be updated or added so this process will never end. Presenter CISO / Security Team Audience Technical Management Question How can I provide both high level detail and technical details to show to our management team that we are improving over time and resources are being spent effectively but there is more to be done? Desired Reaction I want my technical management team to support our efforts by seeing credible proof of improvement and existing gaps. Narrative As a presenter, it’s important to abstract detail away so the picture is crystal clear of historical performance while also providing accompanying technical details as a means of credibility that the issues are known, some have been fixed but more work is ahead and it’s being prioritized efficiently.
  • 12. The Transformative Storytelling Power of the Jupyter Notebook: Unlike static PowerPoints where data was extracted and is quickly out of date, Jupyter Notebooks allow users to tell a real-time data-driven story Unlike a customized dashboard where data might be extract in real-time, Jupyter Notebooks can allow a sequential storytelling element Build a Jupyter Notebook for your audience that: • Provides visual data insights • Anticipates top level questions • Provokes emotion • Enable data-driven decision making Conclusion: