Top Banner
Leveraging OSINT for Enhanced Detection Capabilities TAMER EL BAHEY Senior Director, Security Monitoring and Operations Emirates Integrated Telecommunication Co. (du) 1
26

Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

Aug 05, 2015

Download

Technology

promediakw
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

1

Leveraging OSINT for Enhanced Detection CapabilitiesTAMER EL BAHEYSenior Director, Secur i ty Monitor ing and Operat ions

Emirates Integrated Telecommunicat ion Co. (du)

Page 2: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

OSINT

Page 3: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

3

Threat Evolution

Page 4: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

4

Limited Visibility

Page 5: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

5

Tight Budgets

Page 6: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

6

The Cyber Kill Chain

1Reconnaissance

Page 7: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

7

Page 8: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

8

Page 9: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

9

1 2

The Cyber Kill Chain

Reconnaissance Delivery

Page 10: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

10

Page 11: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

11

Page 12: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

Reconnaissance Delivery Compromise1 2 3

The Cyber Kill Chain

Page 13: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

13

Page 14: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

14

Page 15: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

15

1 3

4

The Cyber Kill Chain

2

Command & Control

Reconnaissance Delivery Compromise

Page 16: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

16

Page 17: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

17

Page 18: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

18

Lateral Movement

1 3

45

The Cyber Kill Chain

2

Command & Control

Reconnaissance Delivery Compromise

Page 19: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

Security

Compliance

Behavior

analysis

Processes

understanding

Violations

monitoring

Access

Confinement

Page 20: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

1 3

456

Attack Directives

The Cyber Kill Chain

2

Lateral Movement

Command & Control

Reconnaissance Delivery Compromise

Page 21: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

21

Page 22: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

22

Page 23: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

Recon

aiss

ance

Attac

k Del

ieve

ry

Compro

mise

C&C

Late

ral m

ovem

ent

Attac

k dire

ctiv

es

How did this help us?

24% of security

alerts are associated with OSINT

Page 24: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

24

How did this help us?

19%of security incidents are

discovered due to information provided

through OSINT

Page 25: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

25

Accuracy

Timeliness

Automation

Continuation

Challenges!

Page 26: Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1

26

Thank you