Top Banner
The Evolution of Cyber Threats and Cyber Threat Intelligence Greg Rattray CEO, Delta Risk LLC 22 March 2013
14

The Evolution of Cyber Threats and Cyber Threat Intelligence

Feb 03, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The Evolution of Cyber Threats and Cyber Threat Intelligence

The Evolution of Cyber Threats and

Cyber Threat Intelligence

Greg Rattray CEO, Delta Risk LLC

22 March 2013

Page 2: The Evolution of Cyber Threats and Cyber Threat Intelligence

2

Today’s Talk

Walk though History

What Does it Mean?

Page 3: The Evolution of Cyber Threats and Cyber Threat Intelligence

3

Before the Dawn

Intercept

Orange Book

Espionage as a Constant

Cold War Know Adversaries Signals Intelligence

Cyber Threat Intelligence

Phreaking

Technology

Public Switched Telephone Network

Little in Private Sector

Page 4: The Evolution of Cyber Threats and Cyber Threat Intelligence

4

Light on the Horizon

Info War

Hunting Hackers

Speculation on National Security Impact

First Gulf War

Morris Worm

Computers at Risk

President’s Commission on Critical Infrastructure Protection Networked

Reliance Growing

Web

Technology

Cyber Threat Intelligence

Page 5: The Evolution of Cyber Threats and Cyber Threat Intelligence

5

Early Wake Up Calls

2000 E-Commerce Attacks

Solar Sunrise

EP-3 and Patriotic Hacking

JTF-CND and others

Moonlight Maze

Rise of E-commerce

Cyber Threat Intelligence

Technology

Slammer Nimda

Code Red

Attribution Difficult Rise of CERTs

Page 6: The Evolution of Cyber Threats and Cyber Threat Intelligence

6

The Dark Times 9/11

Afghanistan

Internet Underground

GWOT

Botnets

Byzantine Hades

Global Crossing

Exposures of Espionage

Supply Chain Risks

Little on Adversary Capabilities

\

Iraq

Internet Bubble Bursts Reliance Still Grows

Cyber Threat Intelligence

Page 7: The Evolution of Cyber Threats and Cyber Threat Intelligence

7

A Rude Awakening Advanced Persistent Threats

Ghost Net

Estonia Georgia

Night Dragon Control Systems on Internet

Rise of Private Teams – CERTs; Providers and Collaboratives

Korea

Technology

Cyber Threat Intelligence Start Real Focus

RBN Attribution Progress

Page 8: The Evolution of Cyber Threats and Cyber Threat Intelligence

8

Rising Fear

STUXNET

Shamoon

Flame

DDoS vs. Banks Mobility

Cloud Social Media

APT 1

Dire Estimates; Need Method

Technology

Cyber Threat Intelligence

Info Sharing

Page 9: The Evolution of Cyber Threats and Cyber Threat Intelligence

Improving Enterprise Defense

9

Castle Walls Eroded Enemy Inside Gates

Must Manage Risk > Know Your Attacker

Channel the Attacks

“If you know the enemy and know yourself you need not fear the results of a hundred battles”

Page 10: The Evolution of Cyber Threats and Cyber Threat Intelligence

10

What’s Going Well

• Tactical Knowledge and Attribution

• Information Sharing

• Private Sector Intelligence

• Push to Automation & Professionalization

Page 11: The Evolution of Cyber Threats and Cyber Threat Intelligence

11

What’s Missing

• Analysis of Operational Risk • Understanding Strategic Impact

• Estimative Analysis

Page 12: The Evolution of Cyber Threats and Cyber Threat Intelligence

12

What are the Challenges? •

Avoiding Militarization of Cyberspace

Cyber Risk Management

Growing Full Spectrum Geeks

Page 13: The Evolution of Cyber Threats and Cyber Threat Intelligence

13

What Might Happen

Guerilla Conflict

Eradication of Disease

Waveform Attack

Page 14: The Evolution of Cyber Threats and Cyber Threat Intelligence

14

Parting Shots

Technology Drives Risks Take a Global Perspective

Collaboration

Learning