SlideShare a Scribd company logo
1 of 23
The Sweet Spot of Cyber
Intelligence
16-November-2015
Tieu Luu, Sr. Director, Advanced Technology Group, SuprTEK
Jay Ruhnke, Sr. Architect, Advanced Technology Group, SuprTEK
About Our Company
Established in 1996, SuprTEK
develops innovative software
solutions to support our
government clients in cyber
security, healthcare, and
defense missions.
Exceptional Solutions with Proven Results
www.suprtek.com
Agenda
 Cyber Intelligence
 Information Security Continuous Monitoring
 Threat Intelligence
 Information Overload
 The Sweet Spot
 Data Models and Standards
 How Do We Do This?
 Our R&D Efforts
Cyber Intelligence
Awareness of what your
adversaries are up to
Understanding of what’s
running on your networks
+
Intelligence Gathering, Information Sharing
and Analytics
Lots of Money Being Thrown At It
$1.6B
Size of the SIEM
market in 2014
(Gartner)
$3.2B
Size of the global
security analytics
market by 2018
(Markets & Markets)
$5.8B
Size of threat
intelligence security
market by 2020
(Research & Markets)
75%
Percentage of large
enterprises that will receive
custom threat intelligence
information tailored to them
by 2017 (IDC)
25%
Percentage of large global
companies that will have adopted
big data analytics for at least one
security use case by 2016 (Gartner)
Related Government Initiatives
DHS
Continuous
Diagnostics &
Mitigation
(CDM)
Cyber Threat
Intelligence
Integration Center
NIST SP800-137
OMB M-14-03
Cybersecurity Information
Sharing Act of 2015 (CISA)
Understanding of What’s Running on Your Networks …
Awareness of What Your Adversaries are Up To …
1856a6a28621f241698e4e4287cba7c9
1d016bb286980fd356cab21cdfcb49f4
3d2c2fdd4104978762b89804ba771e63
5ff5916c9f7c593d1d589c97c571b45a
3b3f46caffa4d5eccf9e063c620a7c23
4900d40f92408468f0c65942ac66749e
4a35fe1895aca6dc7df91b00e730b4df
7c2113d2d67926cc7b8c470b33ede5c4
825a5172dbd9abab7f14e0de8af3cc12
accessdest.strangled[.]net
bookstore.strangled[.]net
bug.ignorelist[.]com
cars-online.zapto[.]org
chinafood.chickenkiller[.]com
coldriver.strangled[.]net
developarea.mooo[.]com
downtown.crabdance[.]com
easport-news.publicvm[.]com
alert tcp any any -> any any (msg: "SYNful Knock
HTTP Header";
flow: from_server;
content: "HTTP/1.1 200 OK|0d 0a|Server:
Apache/2.2.17 (Ubuntu)|0d 0a|X-Powered-By:
PHP/5.3.5-1ubuntu7.7|0d 0a|Keep-Alive:
timeout=15, max=100|0d 0a|Connection: Keep-
Alive|0d 0a|Content-Type: text/html|0d 0a 0d
0a|<html><body><div>";
offset:0; flags:PA; sid:999999;)
alert tcp any any -> any any
(msg: "SYNful Knock HTTP
Request"; flow:to_server;
content: "text"; offset:78;
depth:4;
content: "|00 00 00|";
offset:83; depth:3;
content: "|45 25 6d|";
offset:87; depth:3;
sid:9999998;)
101.226.167.19
101.226.167.20
124.248.205.19
162.210.197.77
180.153.227.230
195.211.101.87
89.35.178.109
184.29.104.251
52.27.166.51
Information Overload
What
threats to
investigate?
Which
vulnerabilities
and findings to
remediate first?
Which
devices
to patch?
Which indicators are
relevant and reliable?
The Sweet Spot
The active threats
that are out there,
the vulnerabilities
they exploit, and the
assets that are
exposed to those
vulnerabilities
Threat Data Model
Proactive
Reactive
CDM Data Model
-CPE
-FirstObserved
-LastObserved
-Threat
-Impact
-DownstreamImpact
Object
-MitigationActions
-Threat
-Impact
-DownstreamImpact
Object_DefectCheck
0..*
-DateDetected
-ValueFound
-DateChanged
DefectInstance
1..*
-Name
-Description
-GracePeriod
-A
-B
-C
-D
-E
-M
-N
ScoringParams
2
Federal & Local Scoring Params
-RawScore
DefectInstance_Score
1..*
-Name
-Description
-isFederal
-IncludeThreat
-IncludeImpact
ScoreType
1 1
-Name
-Description
-SourceID
-MasterID
-Threat
-CommonEnumeration
-TestCriteria
-MitigationActions
-RelatedLinks
-SendToTop
DefectCheck
1
2
Federal & Local Scoring Params
-Name
-Description
-CPERequired
-Impact
-DefinitionalView
-DefinitionalWhereClause
ObjectType
-Name
-Description
-CommonEnumerationRequired
-CommonEnumerationType
-Threat
DefectGroup
-Name
-Description
-IsBasic
-MutuallyExclusive
-Exhaustive
ObjectContainerType
-Name
-Description
-SendToTop
ObjectContainer
ParentObjectType
ParentDefectGroup
0..1
ScoreableObjectType
2
Federal & Local Scoring Params
ObjectDetails
ParentObjectContainerType
ParentObjectContainer
1
0..*
-LocalCPE
-NetworkSwitch
-NetworkPort
-PhysicalLocation
-SerialNumber
-RAM
Hardware
-LocalCPE
-HostPlatform
-InstallDate
Software
-Name
-Description
-DefectGroup
-DefectCheck
-CreationDate
-ActivationDate
-ExpirationDate
-TargetDashboard
Risk Transfer
1
source object container 1
target object container
Correlating the Two Datasets
Campaign
TTP
Exploit
Target
CVE
CCE
CWE
Defect
Instance
Asset
Threat Intelligence ConMon Findings
Defect
Checks
How Do We Do This?
•Collect and correlate threat intelligence from multiple sources
with information on your internal IT landscape collected from
continuous monitoring
Collection and
Correlation
•Focus on the proactive elements of threat intel such as the threat
campaigns that are relevant to your organization, the threat
actors perpetrating these campaigns, the TTPs that they use and
the weaknesses and vulnerabilities that they exploit
Proactive
Threat Intel
•Extract actionable information such as tactics, techniques, and
procedures (TTPs) and exploit targets that are used by threat
actors
Actionable
Information
•Identify targeted assets and develop specific preventive courses of
action to thwart these TTPs
Targeted
Assets
•Score and prioritize threat intelligence that are most relevant and
critical to your organizationPrioritization
System Architecture
Threat
intelligence
HW & SW
Inventory
Sensor
Findings
Ingest Topologies
Correlation Analytics Scoring
• High performance &
scalability
• Based on open standards such
as SCAP, ARF, ASR, STIX
• Open source big data and
analytics components
High Speed Data Ingest
Threat
Intelligenc
e
SW
Inventory
HW
Inventory
Findings
Vulnerability
Alerts
Security
Policies
Ingest Topologies
ARF
XCCDF
ASR
ASR
XCCDF
Multiple
formats
SCAP Formats for Asset and Findings Data
• ARF – Asset
Reporting Format
• ASR –
Assessment
Summary Results
• XCCDF – Policies,
IAVMs, STIGs,
Benchmarks
• CPE - Inventory
<device>
<operational_attributes>ID reference to operational
attributes group</operational_attributes>
<FDQDN>realm & hostname</FQDN>
<connection_mac_address>some MAC
address</connection_mac_address>
<connection_ip>IPv4/IPv6 address</connection_ip>
<cpe_inventory>a bunch of CPE records</cpe_inventory>
<taggedString name=“” value=“”/>
<taggedBoolean name=“” value=“”/>
…
</device>
…
<operational_attributes>
<operational_attribute_ID>resource & record
IDs</operational_attribute_ID>
<owning_unit>ID reference to some org</owning_unit>
<administration_unit>ID reference to some
org</administration_unit>
<cnd_service_provider>ID reference to some
org</cnd_service_provider>
<mac_level>some mac level</mac_level>
<por_managed>true/false</por_managed>
…
</operational_attributes>
…
<organization_info>
<organization_ID>resource & record IDs</organization_ID>
<name>some name</name>
<email>some email</email>
…
</organization_info>
…
<ResultsPackage>
<PopulationCharacteristics>
…
</PopulationCharacteristics>
<benchmark>
<benchMarkID>resource & record IDs</benchMarkID>
<ruleResult ruleID=“some ruleID”>
<ruleComplianceItem ruleResult="pass“>
<result count=“some count of devices”>
<deviceRecord record_identifier=“some
record ID“/>
…
</result>
</ruleComplianceItem>
<ruleComplianceItem ruleResult=“fail“>
<result count=“some count of devices”>
<deviceRecord record_identifier=“some
record ID“/>
…
</result>
</ruleComplianceItem>
</ruleResult>
<ruleResult ruleID=“another ruleID”>
…
</ruleResult>
…
</benchmark>
</ResultsPackage>
Extraction of Exploit Targets from Threat Intelligence
"The CK Vip Exploit Kit is an exploit kit that allows a remote attacker to compromise systems
by attempting to exploit multiple vulnerabilities. It is a multiplatform attack, utilizing exploits for
Windows and Android platforms. The CK Vip exploit kit leverages vulnerabilities in products
such as Oracle’s Java, Adobe Flash, and Internet Explorer’s ActiveX controls. Infection
typically occurs by visiting a malicious URL pointing to the exploit kit or by visiting a
compromised website which redirects to a server hosting the exploit kit."
With the recent addition of the Android exploits in the last year, this Exploit Kit is poised to
wreak havoc in the mobile market.
MD5s associated with malware served by this Exploit Kit:
d7826d3a9d1ca961e5c989c980507087
ad760c37c4198449b81b4992a3f2d561
4a562094a9d2771507e50faf08a6ca79
URLs associated with this Exploit Kit:
http://count11.51yes.com/click.aspx?id=115861800&logo=7
http://count19.51yes.com/click.aspx?id=193675419&logo=1
IP addresses associated with this Exploit Kit:
222.191.251.98
58.215.76.136
98.126.71.38
CVEs associated with CK Vip Exploit Kit:
CVE-2014-6332
CVE-2013-0634
Blog posts covering this Exploit Kit:
http://www.cysecta.com/tag/ck-vip-exploit-kit/
Extract
Exploit Targets
Vulnerabilities,
weaknesses or
misconfigurations that are
exploited by the attacker to
compromise the systems
Computation of Vulnerability Exposure and Patch Compliance
• Installed/removed
software
• Installed patches
• Identified using
Common Platform
Enumeration (CPE)
• Affected software
• Required versions
• Prohibited versions
• Required patches
• IP address
• MAC address
• Other identifiers
• Operational
metadata
Evaluate CPE expressions over
collected software inventory
data
Scalable
Map/Reduce-based
algorithm
CPE
expressions
Correlation of Exploit Targets with Findings and Identification
of Exploitable Assets
Threat
Intelligence
Findings
Vulnerability
Alerts
Exploit Target
Exploitable assets (hardware & software)
Correlation analytics using
graph-based algorithms
Prioritization Through Scoring
𝑆𝑐𝑜𝑟𝑒 𝐷 =
𝑖=1
𝑛
𝑇𝑖 𝑎 × 𝐾𝑖 + 𝑏 × 𝑈𝑖
D = Defect check being scored
n = Number of threats that have defect check D as an Exploit Target
Ti = Weight of Threati
Ki = Number of assets that are known to be exploitable by Threati
Ui = Number of assets that are potentially exploitable by Threati
a = Weight applied to K, constant value greater than b
b = Weight applied to U, constant value less than a
Score findings based on known threats that utilize the weakness,
vulnerability or misconfiguration in each finding as exploit targets.
An asset is known to be exploitable by a threat if it fails all of the defect checks required for exploit by that threat. E.g. if a
threat requires failures in three defect checks for exploit and the asset fails all three defect checks, then that asset is known to
be exploitable; or, if a threat requires a failure in any one of the defect checks for exploit and the asset fails one of those
defect checks, then it is also known to be exploitable.
An asset is potentially exploitable by a threat if it fails some of the defect checks required for exploit by that threat.
What’s Next?
 Need better threat intel – focus more on proactive elements, e.g. TTPs,
exploit targets, rather than reactive elements, e.g. IoCs, malicious IPs,
domains, etc.
 Machine learning to infer relevant security controls, mis-configurations,
weaknesses, vulnerabilities, etc. from TTPs and exploit targets extracted
from threat intel
 Validation on a larger enterprise network
Contact
 Tieu Luu
 Sr. Director Advanced Technology
Group
 tluu@suprtek.com
 @TechTieu
 Jay Ruhnke
 Sr. Architect Advanced Technology
Group
 jruhnke@suprtek.com
 @JRuhnke

More Related Content

What's hot

Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Puneet Kukreja
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightDeep Shankar Yadav
 
Threat intelligence in security
Threat intelligence in securityThreat intelligence in security
Threat intelligence in securityOsama Ellahi
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsIain Dickson
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat IntelligenceSirius
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsMark Arena
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence WorkshopPriyanka Aash
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Priyanka Aash
 
Cyber intelligence for corporate security
Cyber intelligence for corporate securityCyber intelligence for corporate security
Cyber intelligence for corporate securityG3 intelligence Ltd
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementPriyanka Aash
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghOWASP Delhi
 

What's hot (20)

Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
 
Threat intelligence in security
Threat intelligence in securityThreat intelligence in security
Threat intelligence in security
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
Building an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence ProgramBuilding an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence Program
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
TiC
TiCTiC
TiC
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
 
Cyber intelligence for corporate security
Cyber intelligence for corporate securityCyber intelligence for corporate security
Cyber intelligence for corporate security
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
 

Similar to The Sweet Spot of Cyber Intelligence

So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in CybersecurityTeri Radichel
 
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk
 
The CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market ReviewThe CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market Reviewresultsig
 
Edgescan 2022 Vulnerability Statistics Report
Edgescan 2022 Vulnerability Statistics ReportEdgescan 2022 Vulnerability Statistics Report
Edgescan 2022 Vulnerability Statistics ReportEoin Keary
 
2022 Vulnerability Statistics Report.pdf
2022 Vulnerability Statistics Report.pdf2022 Vulnerability Statistics Report.pdf
2022 Vulnerability Statistics Report.pdfssuserc3d7ec1
 
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Cybersecurity Education and Research Centre
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsBen Rothke
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxInfosectrain3
 
Introduction to PolySwarm
Introduction to PolySwarmIntroduction to PolySwarm
Introduction to PolySwarmPolySwarm
 
Introduction to PolySwarm
Introduction to PolySwarmIntroduction to PolySwarm
Introduction to PolySwarmBlakeReyes
 
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...Alan Kan
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management SystemIRJET Journal
 
Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)TzahiArabov
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscapeyohansurya2
 
Business cases for software security
Business cases for software securityBusiness cases for software security
Business cases for software securityMarco Morana
 

Similar to The Sweet Spot of Cyber Intelligence (20)

Security assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP PrepSecurity assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP Prep
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
 
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat Defense
 
The CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market ReviewThe CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market Review
 
Edgescan 2022 Vulnerability Statistics Report
Edgescan 2022 Vulnerability Statistics ReportEdgescan 2022 Vulnerability Statistics Report
Edgescan 2022 Vulnerability Statistics Report
 
2022 Vulnerability Statistics Report.pdf
2022 Vulnerability Statistics Report.pdf2022 Vulnerability Statistics Report.pdf
2022 Vulnerability Statistics Report.pdf
 
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
 
Introduction to PolySwarm
Introduction to PolySwarmIntroduction to PolySwarm
Introduction to PolySwarm
 
Introduction to PolySwarm
Introduction to PolySwarmIntroduction to PolySwarm
Introduction to PolySwarm
 
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 
Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Cost effective cyber security
Cost effective cyber securityCost effective cyber security
Cost effective cyber security
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscape
 
Business cases for software security
Business cases for software securityBusiness cases for software security
Business cases for software security
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

The Sweet Spot of Cyber Intelligence

  • 1. The Sweet Spot of Cyber Intelligence 16-November-2015 Tieu Luu, Sr. Director, Advanced Technology Group, SuprTEK Jay Ruhnke, Sr. Architect, Advanced Technology Group, SuprTEK
  • 2. About Our Company Established in 1996, SuprTEK develops innovative software solutions to support our government clients in cyber security, healthcare, and defense missions. Exceptional Solutions with Proven Results www.suprtek.com
  • 3. Agenda  Cyber Intelligence  Information Security Continuous Monitoring  Threat Intelligence  Information Overload  The Sweet Spot  Data Models and Standards  How Do We Do This?  Our R&D Efforts
  • 4. Cyber Intelligence Awareness of what your adversaries are up to Understanding of what’s running on your networks + Intelligence Gathering, Information Sharing and Analytics
  • 5. Lots of Money Being Thrown At It $1.6B Size of the SIEM market in 2014 (Gartner) $3.2B Size of the global security analytics market by 2018 (Markets & Markets) $5.8B Size of threat intelligence security market by 2020 (Research & Markets) 75% Percentage of large enterprises that will receive custom threat intelligence information tailored to them by 2017 (IDC) 25% Percentage of large global companies that will have adopted big data analytics for at least one security use case by 2016 (Gartner)
  • 6. Related Government Initiatives DHS Continuous Diagnostics & Mitigation (CDM) Cyber Threat Intelligence Integration Center NIST SP800-137 OMB M-14-03 Cybersecurity Information Sharing Act of 2015 (CISA)
  • 7. Understanding of What’s Running on Your Networks …
  • 8. Awareness of What Your Adversaries are Up To … 1856a6a28621f241698e4e4287cba7c9 1d016bb286980fd356cab21cdfcb49f4 3d2c2fdd4104978762b89804ba771e63 5ff5916c9f7c593d1d589c97c571b45a 3b3f46caffa4d5eccf9e063c620a7c23 4900d40f92408468f0c65942ac66749e 4a35fe1895aca6dc7df91b00e730b4df 7c2113d2d67926cc7b8c470b33ede5c4 825a5172dbd9abab7f14e0de8af3cc12 accessdest.strangled[.]net bookstore.strangled[.]net bug.ignorelist[.]com cars-online.zapto[.]org chinafood.chickenkiller[.]com coldriver.strangled[.]net developarea.mooo[.]com downtown.crabdance[.]com easport-news.publicvm[.]com alert tcp any any -> any any (msg: "SYNful Knock HTTP Header"; flow: from_server; content: "HTTP/1.1 200 OK|0d 0a|Server: Apache/2.2.17 (Ubuntu)|0d 0a|X-Powered-By: PHP/5.3.5-1ubuntu7.7|0d 0a|Keep-Alive: timeout=15, max=100|0d 0a|Connection: Keep- Alive|0d 0a|Content-Type: text/html|0d 0a 0d 0a|<html><body><div>"; offset:0; flags:PA; sid:999999;) alert tcp any any -> any any (msg: "SYNful Knock HTTP Request"; flow:to_server; content: "text"; offset:78; depth:4; content: "|00 00 00|"; offset:83; depth:3; content: "|45 25 6d|"; offset:87; depth:3; sid:9999998;) 101.226.167.19 101.226.167.20 124.248.205.19 162.210.197.77 180.153.227.230 195.211.101.87 89.35.178.109 184.29.104.251 52.27.166.51
  • 9. Information Overload What threats to investigate? Which vulnerabilities and findings to remediate first? Which devices to patch? Which indicators are relevant and reliable?
  • 10. The Sweet Spot The active threats that are out there, the vulnerabilities they exploit, and the assets that are exposed to those vulnerabilities
  • 12. CDM Data Model -CPE -FirstObserved -LastObserved -Threat -Impact -DownstreamImpact Object -MitigationActions -Threat -Impact -DownstreamImpact Object_DefectCheck 0..* -DateDetected -ValueFound -DateChanged DefectInstance 1..* -Name -Description -GracePeriod -A -B -C -D -E -M -N ScoringParams 2 Federal & Local Scoring Params -RawScore DefectInstance_Score 1..* -Name -Description -isFederal -IncludeThreat -IncludeImpact ScoreType 1 1 -Name -Description -SourceID -MasterID -Threat -CommonEnumeration -TestCriteria -MitigationActions -RelatedLinks -SendToTop DefectCheck 1 2 Federal & Local Scoring Params -Name -Description -CPERequired -Impact -DefinitionalView -DefinitionalWhereClause ObjectType -Name -Description -CommonEnumerationRequired -CommonEnumerationType -Threat DefectGroup -Name -Description -IsBasic -MutuallyExclusive -Exhaustive ObjectContainerType -Name -Description -SendToTop ObjectContainer ParentObjectType ParentDefectGroup 0..1 ScoreableObjectType 2 Federal & Local Scoring Params ObjectDetails ParentObjectContainerType ParentObjectContainer 1 0..* -LocalCPE -NetworkSwitch -NetworkPort -PhysicalLocation -SerialNumber -RAM Hardware -LocalCPE -HostPlatform -InstallDate Software -Name -Description -DefectGroup -DefectCheck -CreationDate -ActivationDate -ExpirationDate -TargetDashboard Risk Transfer 1 source object container 1 target object container
  • 13. Correlating the Two Datasets Campaign TTP Exploit Target CVE CCE CWE Defect Instance Asset Threat Intelligence ConMon Findings Defect Checks
  • 14. How Do We Do This? •Collect and correlate threat intelligence from multiple sources with information on your internal IT landscape collected from continuous monitoring Collection and Correlation •Focus on the proactive elements of threat intel such as the threat campaigns that are relevant to your organization, the threat actors perpetrating these campaigns, the TTPs that they use and the weaknesses and vulnerabilities that they exploit Proactive Threat Intel •Extract actionable information such as tactics, techniques, and procedures (TTPs) and exploit targets that are used by threat actors Actionable Information •Identify targeted assets and develop specific preventive courses of action to thwart these TTPs Targeted Assets •Score and prioritize threat intelligence that are most relevant and critical to your organizationPrioritization
  • 15. System Architecture Threat intelligence HW & SW Inventory Sensor Findings Ingest Topologies Correlation Analytics Scoring • High performance & scalability • Based on open standards such as SCAP, ARF, ASR, STIX • Open source big data and analytics components
  • 16. High Speed Data Ingest Threat Intelligenc e SW Inventory HW Inventory Findings Vulnerability Alerts Security Policies Ingest Topologies ARF XCCDF ASR ASR XCCDF Multiple formats
  • 17. SCAP Formats for Asset and Findings Data • ARF – Asset Reporting Format • ASR – Assessment Summary Results • XCCDF – Policies, IAVMs, STIGs, Benchmarks • CPE - Inventory <device> <operational_attributes>ID reference to operational attributes group</operational_attributes> <FDQDN>realm & hostname</FQDN> <connection_mac_address>some MAC address</connection_mac_address> <connection_ip>IPv4/IPv6 address</connection_ip> <cpe_inventory>a bunch of CPE records</cpe_inventory> <taggedString name=“” value=“”/> <taggedBoolean name=“” value=“”/> … </device> … <operational_attributes> <operational_attribute_ID>resource & record IDs</operational_attribute_ID> <owning_unit>ID reference to some org</owning_unit> <administration_unit>ID reference to some org</administration_unit> <cnd_service_provider>ID reference to some org</cnd_service_provider> <mac_level>some mac level</mac_level> <por_managed>true/false</por_managed> … </operational_attributes> … <organization_info> <organization_ID>resource & record IDs</organization_ID> <name>some name</name> <email>some email</email> … </organization_info> … <ResultsPackage> <PopulationCharacteristics> … </PopulationCharacteristics> <benchmark> <benchMarkID>resource & record IDs</benchMarkID> <ruleResult ruleID=“some ruleID”> <ruleComplianceItem ruleResult="pass“> <result count=“some count of devices”> <deviceRecord record_identifier=“some record ID“/> … </result> </ruleComplianceItem> <ruleComplianceItem ruleResult=“fail“> <result count=“some count of devices”> <deviceRecord record_identifier=“some record ID“/> … </result> </ruleComplianceItem> </ruleResult> <ruleResult ruleID=“another ruleID”> … </ruleResult> … </benchmark> </ResultsPackage>
  • 18. Extraction of Exploit Targets from Threat Intelligence "The CK Vip Exploit Kit is an exploit kit that allows a remote attacker to compromise systems by attempting to exploit multiple vulnerabilities. It is a multiplatform attack, utilizing exploits for Windows and Android platforms. The CK Vip exploit kit leverages vulnerabilities in products such as Oracle’s Java, Adobe Flash, and Internet Explorer’s ActiveX controls. Infection typically occurs by visiting a malicious URL pointing to the exploit kit or by visiting a compromised website which redirects to a server hosting the exploit kit." With the recent addition of the Android exploits in the last year, this Exploit Kit is poised to wreak havoc in the mobile market. MD5s associated with malware served by this Exploit Kit: d7826d3a9d1ca961e5c989c980507087 ad760c37c4198449b81b4992a3f2d561 4a562094a9d2771507e50faf08a6ca79 URLs associated with this Exploit Kit: http://count11.51yes.com/click.aspx?id=115861800&logo=7 http://count19.51yes.com/click.aspx?id=193675419&logo=1 IP addresses associated with this Exploit Kit: 222.191.251.98 58.215.76.136 98.126.71.38 CVEs associated with CK Vip Exploit Kit: CVE-2014-6332 CVE-2013-0634 Blog posts covering this Exploit Kit: http://www.cysecta.com/tag/ck-vip-exploit-kit/ Extract Exploit Targets Vulnerabilities, weaknesses or misconfigurations that are exploited by the attacker to compromise the systems
  • 19. Computation of Vulnerability Exposure and Patch Compliance • Installed/removed software • Installed patches • Identified using Common Platform Enumeration (CPE) • Affected software • Required versions • Prohibited versions • Required patches • IP address • MAC address • Other identifiers • Operational metadata Evaluate CPE expressions over collected software inventory data Scalable Map/Reduce-based algorithm CPE expressions
  • 20. Correlation of Exploit Targets with Findings and Identification of Exploitable Assets Threat Intelligence Findings Vulnerability Alerts Exploit Target Exploitable assets (hardware & software) Correlation analytics using graph-based algorithms
  • 21. Prioritization Through Scoring 𝑆𝑐𝑜𝑟𝑒 𝐷 = 𝑖=1 𝑛 𝑇𝑖 𝑎 × 𝐾𝑖 + 𝑏 × 𝑈𝑖 D = Defect check being scored n = Number of threats that have defect check D as an Exploit Target Ti = Weight of Threati Ki = Number of assets that are known to be exploitable by Threati Ui = Number of assets that are potentially exploitable by Threati a = Weight applied to K, constant value greater than b b = Weight applied to U, constant value less than a Score findings based on known threats that utilize the weakness, vulnerability or misconfiguration in each finding as exploit targets. An asset is known to be exploitable by a threat if it fails all of the defect checks required for exploit by that threat. E.g. if a threat requires failures in three defect checks for exploit and the asset fails all three defect checks, then that asset is known to be exploitable; or, if a threat requires a failure in any one of the defect checks for exploit and the asset fails one of those defect checks, then it is also known to be exploitable. An asset is potentially exploitable by a threat if it fails some of the defect checks required for exploit by that threat.
  • 22. What’s Next?  Need better threat intel – focus more on proactive elements, e.g. TTPs, exploit targets, rather than reactive elements, e.g. IoCs, malicious IPs, domains, etc.  Machine learning to infer relevant security controls, mis-configurations, weaknesses, vulnerabilities, etc. from TTPs and exploit targets extracted from threat intel  Validation on a larger enterprise network
  • 23. Contact  Tieu Luu  Sr. Director Advanced Technology Group  tluu@suprtek.com  @TechTieu  Jay Ruhnke  Sr. Architect Advanced Technology Group  jruhnke@suprtek.com  @JRuhnke