Top Banner
Cyber Threat Intelligence Management
13

TiC

Apr 13, 2017

Download

Documents

Cory Kennedy
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: TiC

Cyber Threat Intelligence Management

Page 2: TiC

Agenda for the next 13:37 minutes01

02

03

Cyber Threat Intelligence (CTI)

Threat Intelligence Center (TIC)

Tools and Solutions

Sharing Collectives

Standards and Getting involved

#Outhouse Shenanigans

Page 3: TiC

Where does this talk fit?

Intro

Intermediate

Advanced

Expert

1337 Tier

Page 4: TiC

Was that a fat joke?

Page 5: TiC

Open Source Threat Intelligence ManagementSecKC 5

You aren't my manager pal!

?Context

Response times

Proactive

Contribute

Page 6: TiC

Open Source Threat Intelligence ManagementSecKC 6

Observable

05

04

03

02

01

Indicator

Tactics, Techniques and Procedures

Campaign

Threat Actor

Cyber Threat Intelligence Common Language

Page 7: TiC

Open Source Threat Intelligence ManagementSecKC 7

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command & Control

Actions on Objectives

Lockheed Martin Cyber Kill Chain ®

Page 8: TiC

Open Source Threat Intelligence ManagementSecKC 8

10

09

08

07

06

Intelligence Disciplines (*INT)

Lockheed Martin Cyber Kill Chain®

Traffic Light Protocol

F3EAD Framework

Cyber Threat Intelligence Common Language

STIX, TAXII, CybOX & OASIS

Page 9: TiC

Open Source Threat Intelligence ManagementSecKC

F3EAD Framework

9

01

02

03

04

05

06

Find

Finish

Fix

Exploit

Analyze

Disseminate

Page 10: TiC

Open Source Threat Intelligence ManagementSecKC

Operations Intelligence

10

06

SIEM

TIC

è

Disseminate

05

MAS

!

è

Analyze

04

!

TIC

Exploit

03

IR

Finish

02

SIEM

Fix

01

SIEM

Ħ

Find

F3EAD Framework related to IR

Page 11: TiC

Open Source Threat Intelligence ManagementSecKC

How to build a Threat Intelligence Center (TIC)

11

Internal Development

Internal Tools

Documentation

Internal Relationships

External Relationships

Plan

!

Ĥ

é

"

è

50%

50%

IIn Ĥ

Page 12: TiC

Open Source Threat Intelligence ManagementSecKC 12

TAXII

soltra.com

SOLTRACRITs friendly

Eats whatever you feed it

TAXII Gateway for partners

FS-ISAC

Utilizes TLP

Notifications

Development

gitlab.com

GitLabDeveloper friendly

Local Version Control

Track Issues

Locally crowdsource dev

Integrates with Slack

For teams of 1 - 30K

The tools to build an Open Source Threat Intelligence Center (TIC)

STIX

crits.github.io

CRITsSTIX friendly

Mongo

Python Friendly

Over 30 Services

CTI repository

Campaign Tracking

Malware

cuckoosandbox.org

CuckooCRITs friendly

STIX Friendly

Python Friendly

Automated Malware Analysis

Win/OSX/Linux Analysis

Volatility

Page 13: TiC

Open Source Threat Intelligence ManagementSecKC 13

TIC.SecKC. rg:443

[email protected]

Powered By: Threat Note