SlideShare a Scribd company logo
@infosectrain
INTELLIGENCE
THREAT
MODELING
ASSESSMENT
+
Gather and analyze current and emerging
threats within an organization
Analyze, evaluate, and prioritize potential
risks and vulnerabilities within an
organization
Proactively identify, analyze, and mitigate
risks during system design or development
FOCUS
@infosectrain
Threat
Intelligence
Threat
Assessment
Threat
Modeling
+
Enhance cybersecurity posture by
understanding adversaries' TTPs
Prioritize resources to protect critical assets
from identified risks
Reduce vulnerabilities before implementation
to prevent successful attacks
PURPOSE
@infosectrain
Threat
Intelligence
Threat
Assessment
Threat
Modeling
+
Broad scope, gathering data on existing
threats
Broad scope, evaluating risks and
vulnerabilities
Narrow scope, focusing on specific system
designs
SCOPE
@infosectrain
Threat
Intelligence
Threat
Assessment
Threat
Modeling
+
External threat data sources like threat feeds,
research, hacker forums, etc.
Internal and external data sources, past
incidents, security reports
Internal system design and architecture
DATA SOURCES
@infosectrain
Threat
Intelligence
Threat
Assessment
Threat
Modeling
+
Continuous
Periodic - Conducted at specific intervals
(e.g., quarterly or annually)
One-time or iterative
FREQUENCY
@infosectrain
Threat
Intelligence
Threat
Assessment
Threat
Modeling
+
Actionable threat intelligence reports and
IOCs (Indicators of Compromise)
Risk assessment reports, and mitigation
strategies
Threat model diagrams, risk mitigation
plans, and security control recommendations
OUTPUT
@infosectrain
Threat
Intelligence
Threat
Assessment
Threat
Modeling
+
Informed decision-making, early threat
detection, and response
Focused resource allocation, risk mitigation
strategies
Reduced security risks before deployment,
cost-effective solutions
BENEFITS
@infosectrain
Threat
Intelligence
Threat
Assessment
Threat
Modeling
To Get More Insights Through Our FREE
FOUND THIS USEFUL?
Courses | Workshops | eBooks | Checklists | Mock Tests
LIKE FOLLOW
SHARE

More Related Content

Similar to Threat Intelligence vs. Threat Assessment vs. Threat Modeling.pdf

Similar to Threat Intelligence vs. Threat Assessment vs. Threat Modeling.pdf (20)

tarunidhar
tarunidhartarunidhar
tarunidhar
 
Threats Intelligence and analysis . pptx
Threats Intelligence and analysis . pptxThreats Intelligence and analysis . pptx
Threats Intelligence and analysis . pptx
 
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
 
Unlock Your Ultimate SOC Career Guide - Infosectrain
Unlock Your  Ultimate SOC Career Guide - InfosectrainUnlock Your  Ultimate SOC Career Guide - Infosectrain
Unlock Your Ultimate SOC Career Guide - Infosectrain
 
The Ultimate Security Operations Center Career Guide
The Ultimate Security Operations Center  Career GuideThe Ultimate Security Operations Center  Career Guide
The Ultimate Security Operations Center Career Guide
 
Best SOC Career Guide InfosecTrain .pdf
Best SOC Career Guide  InfosecTrain .pdfBest SOC Career Guide  InfosecTrain .pdf
Best SOC Career Guide InfosecTrain .pdf
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...
Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...
Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...
 
SFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfSFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdf
 
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxOutsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
 
Resume justin kelso 2017
Resume justin kelso 2017Resume justin kelso 2017
Resume justin kelso 2017
 
What is Threat Modeling .pptx
What is Threat Modeling .pptxWhat is Threat Modeling .pptx
What is Threat Modeling .pptx
 
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for SecuritySplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
 
Splunk for Security
Splunk for SecuritySplunk for Security
Splunk for Security
 
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for SecuritySplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
 
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
 
Threat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devicesThreat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devices
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
 
Reorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's ThreatsReorganizing Federal IT to Address Today's Threats
Reorganizing Federal IT to Address Today's Threats
 

More from infosecTrain

More from infosecTrain (20)

Here are top Cyber Security tips for Travelers.pdf
Here  are top Cyber Security tips for Travelers.pdfHere  are top Cyber Security tips for Travelers.pdf
Here are top Cyber Security tips for Travelers.pdf
 
Top Cyber Security Tips for Home by InfosecTrain .pdf
Top Cyber Security Tips for Home by InfosecTrain .pdfTop Cyber Security Tips for Home by InfosecTrain .pdf
Top Cyber Security Tips for Home by InfosecTrain .pdf
 
Unlock the Power of Secure Coding - Infosectrain
Unlock the Power of Secure Coding - InfosectrainUnlock the Power of Secure Coding - Infosectrain
Unlock the Power of Secure Coding - Infosectrain
 
Level Up Your Email Security - DKIM, SPF & DMARC.pdf
Level Up Your Email Security - DKIM, SPF & DMARC.pdfLevel Up Your Email Security - DKIM, SPF & DMARC.pdf
Level Up Your Email Security - DKIM, SPF & DMARC.pdf
 
How to Become an IT Auditor.: A Step-by-Step Guide
How to Become an IT Auditor.: A Step-by-Step GuideHow to Become an IT Auditor.: A Step-by-Step Guide
How to Become an IT Auditor.: A Step-by-Step Guide
 
Top 5 Data Privacy Laws You Need to Know.pdf
Top 5 Data Privacy Laws You Need to Know.pdfTop 5 Data Privacy Laws You Need to Know.pdf
Top 5 Data Privacy Laws You Need to Know.pdf
 
Socail Media Data Loss Prevention(DLP).pdf
Socail Media Data Loss Prevention(DLP).pdfSocail Media Data Loss Prevention(DLP).pdf
Socail Media Data Loss Prevention(DLP).pdf
 
Discover the Dark Web - What It Is and How to Stay Safe.pdf
Discover the Dark Web - What It Is and How to Stay Safe.pdfDiscover the Dark Web - What It Is and How to Stay Safe.pdf
Discover the Dark Web - What It Is and How to Stay Safe.pdf
 
Azure Administrator & Security Online Training Course.pdf
Azure Administrator & Security Online Training Course.pdfAzure Administrator & Security Online Training Course.pdf
Azure Administrator & Security Online Training Course.pdf
 
SOC Specialist Online Training Course.pdf
SOC Specialist Online Training Course.pdfSOC Specialist Online Training Course.pdf
SOC Specialist Online Training Course.pdf
 
CISSP Domain 1 Security and Risk Management.pdf
CISSP Domain 1 Security and Risk Management.pdfCISSP Domain 1 Security and Risk Management.pdf
CISSP Domain 1 Security and Risk Management.pdf
 
THE DATA DEFENSE SQUAD TOOLS FOR SECURITY.pdf
THE DATA DEFENSE SQUAD TOOLS FOR SECURITY.pdfTHE DATA DEFENSE SQUAD TOOLS FOR SECURITY.pdf
THE DATA DEFENSE SQUAD TOOLS FOR SECURITY.pdf
 
Elevate your privacy knowledge with Cipt certification training.pdf
Elevate your privacy knowledge with Cipt certification training.pdfElevate your privacy knowledge with Cipt certification training.pdf
Elevate your privacy knowledge with Cipt certification training.pdf
 
Audit Scenario Based Interview Questions.pdf
Audit Scenario Based Interview Questions.pdfAudit Scenario Based Interview Questions.pdf
Audit Scenario Based Interview Questions.pdf
 
Understanding DNS Cache Poisoning: Threats and Countermeasures
Understanding DNS Cache Poisoning: Threats and CountermeasuresUnderstanding DNS Cache Poisoning: Threats and Countermeasures
Understanding DNS Cache Poisoning: Threats and Countermeasures
 
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
 
An Introduction of CompTIA Security+ (SY0-701) Domain 1.pdf
An Introduction of CompTIA Security+ (SY0-701) Domain 1.pdfAn Introduction of CompTIA Security+ (SY0-701) Domain 1.pdf
An Introduction of CompTIA Security+ (SY0-701) Domain 1.pdf
 
Top 10 Cyber Attacks of 2024: Trends, Impacts, and Responses
Top 10 Cyber Attacks of 2024: Trends, Impacts, and ResponsesTop 10 Cyber Attacks of 2024: Trends, Impacts, and Responses
Top 10 Cyber Attacks of 2024: Trends, Impacts, and Responses
 
Stay ahead in 2024 with These Cybersecurity.pdf
Stay ahead in 2024 with These Cybersecurity.pdfStay ahead in 2024 with These Cybersecurity.pdf
Stay ahead in 2024 with These Cybersecurity.pdf
 
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
Questions for a Risk Analyst Interview - Get Ready for Success.pdfQuestions for a Risk Analyst Interview - Get Ready for Success.pdf
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
 

Recently uploaded

Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
Avinash Rai
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
parmarsneha2
 

Recently uploaded (20)

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 

Threat Intelligence vs. Threat Assessment vs. Threat Modeling.pdf

  • 2. + Gather and analyze current and emerging threats within an organization Analyze, evaluate, and prioritize potential risks and vulnerabilities within an organization Proactively identify, analyze, and mitigate risks during system design or development FOCUS @infosectrain Threat Intelligence Threat Assessment Threat Modeling
  • 3. + Enhance cybersecurity posture by understanding adversaries' TTPs Prioritize resources to protect critical assets from identified risks Reduce vulnerabilities before implementation to prevent successful attacks PURPOSE @infosectrain Threat Intelligence Threat Assessment Threat Modeling
  • 4. + Broad scope, gathering data on existing threats Broad scope, evaluating risks and vulnerabilities Narrow scope, focusing on specific system designs SCOPE @infosectrain Threat Intelligence Threat Assessment Threat Modeling
  • 5. + External threat data sources like threat feeds, research, hacker forums, etc. Internal and external data sources, past incidents, security reports Internal system design and architecture DATA SOURCES @infosectrain Threat Intelligence Threat Assessment Threat Modeling
  • 6. + Continuous Periodic - Conducted at specific intervals (e.g., quarterly or annually) One-time or iterative FREQUENCY @infosectrain Threat Intelligence Threat Assessment Threat Modeling
  • 7. + Actionable threat intelligence reports and IOCs (Indicators of Compromise) Risk assessment reports, and mitigation strategies Threat model diagrams, risk mitigation plans, and security control recommendations OUTPUT @infosectrain Threat Intelligence Threat Assessment Threat Modeling
  • 8. + Informed decision-making, early threat detection, and response Focused resource allocation, risk mitigation strategies Reduced security risks before deployment, cost-effective solutions BENEFITS @infosectrain Threat Intelligence Threat Assessment Threat Modeling
  • 9. To Get More Insights Through Our FREE FOUND THIS USEFUL? Courses | Workshops | eBooks | Checklists | Mock Tests LIKE FOLLOW SHARE