Upgrade to Pro — share decks privately, control downloads, hide ads and more …

University of Dallas Threat Intelligence

University of Dallas Threat Intelligence

Rick Holland

February 24, 2016
Tweet

More Decks by Rick Holland

Other Decks in Technology

Transcript

  1. 2

  2. 5

  3. 6 Threat intelligence defined: Details of the motivations, intent, and

    capabilities of internal and external threat actors. Source: Forrester Research, Five Steps To Build An Effective Threat Intelligence Capability, 011513
  4. 7 Threat intelligence defined: Threat intelligence includes specifics on the

    tactics, techniques, and procedures of these adversaries. Source: Forrester Research, Five Steps To Build An Effective Threat Intelligence Capability, 011513
  5. 8 Threat intelligence defined: Threat intelligence's primary purpose is to

    inform business decisions regarding the risks and implications associated with threats. Source: Forrester Research, Five Steps To Build An Effective Threat Intelligence Capability, 011513
  6. 11

  7. 12 ‣  Before you invest in any commercial provider, you

    must scavenge your own intrusions ‣  No threat intel is more relevant than what is occurring within your own environment Rey is a scavenger
  8. 15 ‣  You don’t have the best technology and most

    expensive intel sources to be effective ‣  The Millennium Falcon approach (DIY / Open Source tools) is perfectly acceptable She may not look like much, but she's got it where it counts
  9. 17 ‣  For most sharing is putting the cart before

    the horse ‣  Share processes & tradecraft Don’t just share indicators
  10. 22 Avoid analytical pitfalls Daniel Kahneman reveals “where we can

    and cannot trust our intuitions and how we can tap into the benefits of slow thinking.”
  11. 24 ‣  Many are going to have to rely upon

    3rd parties (intel providers and MSSPs for support ) ‣  Look at providers who offer analysts on demand or tailored intelligence offerings Not enough analysts to go around
  12. 26 ‣  Work with universities ‣  Get on the advisory

    board for cyber security degree programs ‣  Help universities provide practical curriculum for their students Finding talent
  13. 27 ‣  Maturity doesn’t just evolve, it can devolve ‣ 

    You must be creative with retention strategies: •  Remote workers •  Training (Individual & team) •  Career pathing •  Work with HR to create salary exceptions Retention is critical
  14. 29 ‣  Buy Buy Buy! Chasing silver bullets ‣  Buy

    all the feedz! ‣  Not prepared to demonstrate the value of threat intelligence program Many security programs are setup for failure
  15. 30 ‣  Conduct after action reviews post intrusion and capture

    intelligence ‣  Measure and track - Time to detection, containment, remediation Do this
  16. 31 ‣  Analyze all intel sources and track sightings. Periodically

    reevaluate sources ‣  Produce your own strategic intelligence Do this