CISO Platform
Decision Summit
June 4-5, New Delhi
Threat Intelligence
Bikash Barai
Threat Intelligence Drivers
Overview
• Growing field. Expected to be 1.5 Billion in
2018
• Top buzzword for last 3 years
• High adoption in mature organizations
Threat Intelligence Basics
Key Elements of Threat Intel
What is actionable intelligence?
• Accurate
• Relevant
• Timely
• Aligned
• Predictive
• Integrated
Types of Intel
• Strategic Intel
• Operational Intel
• Tactical Intel
• Technical Intel
What is pyramid of pain?
Intel 101
• Data vs Intelligence
– Context, Intent, Capability
• Tactical vs Strategic
– How and what?
– Who and why?
• Atomic vs Composite
– IP, packet string, hash
– Combine multiple things
• TTP- Tactics, Techniques and Procedures
People
Organization Chart
CISO
SOC
VM
Planning Collection Analysis
Technical Strategic
Presentation IR
Process
Planning
• What issues to be addressed?
• What info to be gathered?
• What is the leadership and business priority?
5 stage process
• Planning
– What are you looking for?
• Collection
– OSINT/HUMINT
– Logs/Data points inside the org
– Honeypots/nets/docs, social networks
– FM-5
• Processing
– Synthesis so that intelligence analysts can use
• Analysis
– Finished Intel- Top of the pyramid of pain
• Dissemination
– Customize and present to the right audience
Technology
Taxonomy for Threat Intelligence
Threat
intelligence
Threat
Intelligence
Platform
Threat
Intelligence
Enrichment
Threat
Intelligence
Integration
Open Source
Intel Human Intel
Technical
Intel
Adversary
Intel
Vulnerability
Intel
Strategic
Intel
Critical Technological capabilities
Key Critical Technologies Capabilities
Host Based Collection
Network Based Collection
External Threat Collection
Threat Intelligence Ingestion
Threat Intelligence Analysis
Threat Intelligence Enrichment
Threat Intelligence
Internal Threat Intelligence Collaboration and sharing
External Threat Intelligence Collaboration and sharing
Vendor Landscape
• Total Vendors studied: 23
• Prominent Vendors
– Open Source Intel: Recorded Future, Digital Shadows, Cyveillance
– Human Intel: Booz Allen Hamilton, CrowdStrike, iSIGHT Partners,
Verisign iDefence, Cyveillance
– Technical Intel: Norse Corporation , Anubis Networks, Emerging
Threats
– Adversary Intel: Booz Allen Hamilton, CrowdStrike, iSIGHT Partners,
Verisign iDefence, Symantec Deepsight
– Vulnerability Intel: iSIGHT Partners, Verisign iDefence
– Strategic Intel: , Surfwatch labs, Cytegic
Vendor Landscape
• Threat Intelligence Platform: Lookingglass ScoutPlatform, Threat Stream
Optic, ThreatQuotient ThreatQ, ThreatConnect Threat Intelligence
Platorm, Vorstack Automated and Collaborated threat Intelligence.
• Threat Intelligence Enrichment: Passive DNS( Farsight Security), GeoIP
(MaxMind), WhoisData(Domain Tools)
• Threat Intelligence Integration: Centripetal Networks, Lookingglass
CloudShield
Vendor Analysis
Integrating Threat Intel
STIX
• STIX provides a common language for
describing cyber threat information so it can
be shared, stored, and otherwise used in a
consistent manner that facilitates automation.
TAXII
• Trusted Automated eXchange of Indicator
Information (TAXII™) is a U.S. Department of
Homeland Security (DHS)-led, community-
driven effort to standardize the trusted,
automated exchange of cyber threat
information.
How to build a program?
Let’s do it next time…
But what can we do today?
Let’s start sharing- CISO Platform ISG
Thank You

Threat Intelligence Workshop

  • 1.
  • 2.
  • 3.
  • 4.
    Overview • Growing field.Expected to be 1.5 Billion in 2018 • Top buzzword for last 3 years • High adoption in mature organizations
  • 5.
  • 6.
    Key Elements ofThreat Intel
  • 7.
    What is actionableintelligence? • Accurate • Relevant • Timely • Aligned • Predictive • Integrated
  • 8.
    Types of Intel •Strategic Intel • Operational Intel • Tactical Intel • Technical Intel
  • 9.
  • 10.
    Intel 101 • Datavs Intelligence – Context, Intent, Capability • Tactical vs Strategic – How and what? – Who and why? • Atomic vs Composite – IP, packet string, hash – Combine multiple things • TTP- Tactics, Techniques and Procedures
  • 11.
  • 12.
    Organization Chart CISO SOC VM Planning CollectionAnalysis Technical Strategic Presentation IR
  • 13.
  • 14.
    Planning • What issuesto be addressed? • What info to be gathered? • What is the leadership and business priority?
  • 15.
    5 stage process •Planning – What are you looking for? • Collection – OSINT/HUMINT – Logs/Data points inside the org – Honeypots/nets/docs, social networks – FM-5 • Processing – Synthesis so that intelligence analysts can use • Analysis – Finished Intel- Top of the pyramid of pain • Dissemination – Customize and present to the right audience
  • 16.
  • 17.
    Taxonomy for ThreatIntelligence Threat intelligence Threat Intelligence Platform Threat Intelligence Enrichment Threat Intelligence Integration Open Source Intel Human Intel Technical Intel Adversary Intel Vulnerability Intel Strategic Intel
  • 18.
    Critical Technological capabilities KeyCritical Technologies Capabilities Host Based Collection Network Based Collection External Threat Collection Threat Intelligence Ingestion Threat Intelligence Analysis Threat Intelligence Enrichment Threat Intelligence Internal Threat Intelligence Collaboration and sharing External Threat Intelligence Collaboration and sharing
  • 19.
    Vendor Landscape • TotalVendors studied: 23 • Prominent Vendors – Open Source Intel: Recorded Future, Digital Shadows, Cyveillance – Human Intel: Booz Allen Hamilton, CrowdStrike, iSIGHT Partners, Verisign iDefence, Cyveillance – Technical Intel: Norse Corporation , Anubis Networks, Emerging Threats – Adversary Intel: Booz Allen Hamilton, CrowdStrike, iSIGHT Partners, Verisign iDefence, Symantec Deepsight – Vulnerability Intel: iSIGHT Partners, Verisign iDefence – Strategic Intel: , Surfwatch labs, Cytegic
  • 20.
    Vendor Landscape • ThreatIntelligence Platform: Lookingglass ScoutPlatform, Threat Stream Optic, ThreatQuotient ThreatQ, ThreatConnect Threat Intelligence Platorm, Vorstack Automated and Collaborated threat Intelligence. • Threat Intelligence Enrichment: Passive DNS( Farsight Security), GeoIP (MaxMind), WhoisData(Domain Tools) • Threat Intelligence Integration: Centripetal Networks, Lookingglass CloudShield
  • 21.
  • 22.
  • 23.
    STIX • STIX providesa common language for describing cyber threat information so it can be shared, stored, and otherwise used in a consistent manner that facilitates automation.
  • 24.
    TAXII • Trusted AutomatedeXchange of Indicator Information (TAXII™) is a U.S. Department of Homeland Security (DHS)-led, community- driven effort to standardize the trusted, automated exchange of cyber threat information.
  • 25.
    How to builda program?
  • 26.
    Let’s do itnext time…
  • 27.
    But what canwe do today?
  • 28.
    Let’s start sharing-CISO Platform ISG
  • 29.