26 May 2015
www.sensecy.com
IMPORTANT NOTICE
This presentation is for informational purposes
only. It may contain features that are still in
development and/or certain financial forecasts
that are “forward-looking statements,” which are
subject to risks and uncertainties. SenseCy may
update, amend, supplement or otherwise alter
the information without prior notice
Cyber threat information
vs
Cyber threat intelligence
Dori Fisher – VP intelligence solutions
www.sensecy.com
Intelligence is older than Cyber (no kidding)
#OPJericho
These are the names of the men which Moses sent to spy out the land.
And Moses called Oshea the son of Nun Jehoshua.
www.sensecy.com
7 days of DDOSing Jericho, Walls do not work and never did
First DDOS
www.sensecy.com
What is Information vs Intelligence
Intelligence Defined (FBI definition)
Simply defined, intelligence is information that has been
analyzed and refined so that it is useful to policymakers in
making decisions—specifically, decisions about potential
threats to our national security.
www.sensecy.com
Gartner threat intelligence definition
Threat intelligence is evidence-based knowledge, including context,
mechanisms, indicators, implications and actionable advice, about an
existing or emerging menace or hazard to assets that can be used to inform
decisions regarding the subject's response to that menace or hazard.
Source:
https://www.gartner.com/doc/2487216/definition-threat-intelligence
www.sensecy.com
Threat Information
• Gazillion IP Addresses suspected of something
• Trillion “Bad” URL’s
• Million MD5 signatures
• News items saying “XYZ was hacked”
Any input saying the internet is dangerous but not providing actionable measures
www.sensecy.com
Threat Intelligence
• IP Addresses that are a part of a malware targeting you
• A url of a phishing site replicating your site
• An MD5 of a tool that is planned to be delivered to your employees
• A news item that pertains specifically to your business and what to do about it
• A hacktivist campaign date and methods planned to attack you
• Your credit cards leakage
www.sensecy.com
The law of instrument, Maslow hammer
Why are we getting Cyber threat Information
We use Cyber security tools that dictate the intelligence we implement
www.sensecy.com
Thank you
Q&D at our small table
Also find us at:
www.sensecy.com and blog.sensecy.com
Dori at sensecy.com
Q&D at our small table
Also find us at:
www.sensecy.com and blog.sensecy.com
Dori at sensecy.com

Sensecy cti vs cti

  • 1.
    26 May 2015 www.sensecy.com IMPORTANTNOTICE This presentation is for informational purposes only. It may contain features that are still in development and/or certain financial forecasts that are “forward-looking statements,” which are subject to risks and uncertainties. SenseCy may update, amend, supplement or otherwise alter the information without prior notice Cyber threat information vs Cyber threat intelligence Dori Fisher – VP intelligence solutions
  • 2.
    www.sensecy.com Intelligence is olderthan Cyber (no kidding) #OPJericho These are the names of the men which Moses sent to spy out the land. And Moses called Oshea the son of Nun Jehoshua.
  • 3.
    www.sensecy.com 7 days ofDDOSing Jericho, Walls do not work and never did First DDOS
  • 4.
    www.sensecy.com What is Informationvs Intelligence Intelligence Defined (FBI definition) Simply defined, intelligence is information that has been analyzed and refined so that it is useful to policymakers in making decisions—specifically, decisions about potential threats to our national security.
  • 5.
    www.sensecy.com Gartner threat intelligencedefinition Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject's response to that menace or hazard. Source: https://www.gartner.com/doc/2487216/definition-threat-intelligence
  • 6.
    www.sensecy.com Threat Information • GazillionIP Addresses suspected of something • Trillion “Bad” URL’s • Million MD5 signatures • News items saying “XYZ was hacked” Any input saying the internet is dangerous but not providing actionable measures
  • 7.
    www.sensecy.com Threat Intelligence • IPAddresses that are a part of a malware targeting you • A url of a phishing site replicating your site • An MD5 of a tool that is planned to be delivered to your employees • A news item that pertains specifically to your business and what to do about it • A hacktivist campaign date and methods planned to attack you • Your credit cards leakage
  • 8.
    www.sensecy.com The law ofinstrument, Maslow hammer Why are we getting Cyber threat Information We use Cyber security tools that dictate the intelligence we implement
  • 9.
    www.sensecy.com Thank you Q&D atour small table Also find us at: www.sensecy.com and blog.sensecy.com Dori at sensecy.com Q&D at our small table Also find us at: www.sensecy.com and blog.sensecy.com Dori at sensecy.com