SlideShare a Scribd company logo
© 2014 Tier-3 Pty Ltd, All rights reserved 1 Intelligent Security. We deliver it.
Intelligence-based
Computer Network Defence
Piers Wilson
Tier-3 Huntsman® - Head of Product Management
© 2014 Tier-3 Pty Ltd, All rights reserved 2 Intelligent Security. We deliver it.
• Cyber attacks continue to
increase
• Even closed networks are
vulnerable
• Both External and Internal
attacks
• Increasing sophistication
• Every organisation is at risk
Setting the Scene
© 2014 Tier-3 Pty Ltd, All rights reserved 3 Intelligent Security. We deliver it.
The Cyber security “kill chain” concept
Cyber Kill Chain – sequential chain of events for successful attack
© Lockheed Martin
Increasing risk / cost to contain and remediate
Pre-Compromise Post-CompromiseCompromise
© 2014 Tier-3 Pty Ltd, All rights reserved 4 Intelligent Security. We deliver it.
Considering Attack Cycles
• Harvesting email addresses, conference
information, staff bios, Press coverage
Reconnaissance
• Coupling exploit with backdoor into a
deliverable payload
Weaponisation
• Getting the payload to the victim via email,
web drive-by, USB
Delivery
• Exploiting the vulnerability to execute codeExploitation
• Installing the malware/payload on the
system
Installation
• Establishing channel back to the attack
source
Command &
Control
• Undertaking the automatic and attacker-
driven activity desired
Actions on
Objectives
• “Thinking like an attacker”
• The likelihood of being caught & ROI ?
• What's the best way to test the attack method ?
• Enumeration of the organisation
• Identify valuable/vulnerable assets
• Establish how to get the information out
• Acceptance that defences may not be sufficient
and thus detection and diagnosis are key
• Rapid detection means less cost, more chance to mitigate,
better chance of recovery
• Dealing with both external and insider threats
• Need to consider the “indicators of compromise”
at each stage
• Anomalies detected
• Events on boundary egress points
• Critical documents / information silos
• System performance and health
• Activity levels, session lengths, traffic and flow patterns

Recommended for you

[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...

Get an overview the threat groups targeting the legal and professional services industries, as well as the top 5 malware and crimewave families detected.

threat intelligencecyber securitylegal services
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL

Organizations must address the Cyber Kill Chain to defend against advanced threats. The Cyber Kill Chain describes the 7 stages of an attack - reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on targets. Traditionally, organizations focused on prevention at the perimeter, but attackers have bypassed these defenses. To improve security, organizations should detect, deny, disrupt, and recover at each stage of the Cyber Kill Chain rather than solely focusing on prevention. This involves technologies like network monitoring, endpoint protection, and threat intelligence across all phases of an attack.

Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams

Jim Aldridge from FireEye discusses what executives should ask their security teams. This is available on the FireEye Blog www.fireeye.com/blog/executive-perspective/2015/11/proactively_engaged.html

mitigationbreach preventionremediation
© 2014 Tier-3 Pty Ltd, All rights reserved 5 Intelligent Security. We deliver it.
Leverage Threat Intelligence
Consider ‘Indicators of Compromise’
Optimise and Automate
Incident response
Agenda - Three Components
© 2014 Tier-3 Pty Ltd, All rights reserved 6 Intelligent Security. We deliver it.
Threat Intelligence
Integration of external
TI feeds for detection
AND analysis purposes
to aid efficient operations
Capture of static or
dynamic internal
information and
intelligence on threats
and risks
Operational incident detection
and analysis process generate
real-time, interpreted Threat
Intelligence
Automation and confidence in
alerting, detection and
escalation processes
© 2014 Tier-3 Pty Ltd, All rights reserved 7 Intelligent Security. We deliver it.
Internal & Contextual
• Import and cross-reference to (internal) state databases
• E.g. users of different types, physical/location status, risk levels, system sensitivities,
even self-created lists of systems that are the subject of incidents and investigations
• Recent use case was a list of users who are “under increased vigilance”
• Integration of vulnerability assessment tools
• Network capture to derive asset information, deduce port usage,
flow statistics in real time
• Provides understanding of likely vulnerability/threat
• Understanding of ongoing incidents and system statuses/risks
• Integrated information from specific security/capture solutions
• Active response to capture real-time alert data
• Camera images
• System configuration, process, network sessions, file system snapshot
Internal
Intelligence
Databases
Contextual
Vulnerability,
Incident and
Asset Data
Internal Security,
Malware and
Attack Context
© 2014 Tier-3 Pty Ltd, All rights reserved 8 Intelligent Security. We deliver it.
• Import of external data for use in detection, correlation and alerting
• Compromised sites, malicious URLs, phishing sources, IP reputations
• Ensure you “know what everyone else knows” – throughout the kill
chain (diagnosis and response)
• Open source and/or commercial feeds
• Mapping from IP address
to world location
• Make decisions
based on risk profiles or
known operational
locations
External Threat Intelligence
External
Geographic
Information
External Threat
Intelligence
Sources

Recommended for you

The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story

This on-demand webcast shows you how you shield your organization from such attacks – as well as how to respond if ransomware does penetrate your organization. Baseline Technologies’ Mike Crowley gives you the inside track on how ransomware works and how to lower your risk of ransomware attacks.

softwareransomwarebackup
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS

This document provides an introduction to cyber forensics. It defines key terms like forensics science, digital forensics, and cyber forensics. It also discusses cyber attack and malware trends, GDPR requirements, core principles of cyber forensics investigations, and presents an overview of the goals, actions, and scope of activities in a cyber forensics investigation. Finally, it provides a case study example of a client database leak investigation.

forensicscyber securityframework
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security

The document discusses the importance of endpoint security and provides an overview of various endpoint security solutions. It notes that with increased mobility and remote access, the network perimeter is no longer well-defined, making endpoint security crucial. It summarizes some key endpoint security vendors and technologies, including Cisco NAC, Microsoft NAP, and Trusted Network Connect. The document emphasizes that effective endpoint security requires a strategic approach to balance connectivity and protection.

information securityrothkenba
© 2014 Tier-3 Pty Ltd, All rights reserved 9 Intelligent Security. We deliver it.
Leverage Threat Intelligence
Consider ‘Indicators of Compromise’
Optimise and Automate
Incident response
Agenda - Three Components
© 2014 Tier-3 Pty Ltd, All rights reserved 10 Intelligent Security. We deliver it.
Activity to/from risky or strange locations
Personal sensitivities (role, seniority, access)
Patterns of traffic between IP address pairs
Session durations
Data flow volumes and directions
Activity on sensitive internal hosts
Number of files open(ed)
Number of pages or documents printed
Query/search results (numbers)
User account group membership activity
Use of media like USB/CD
Connections to cloud-based storage
Indicators of Compromise
Think how
an Insider
might
behave,
what they
might do,
how they
would steal
data
What might
be the early
signs of an
external
attack or
Trojan, APT,
spear
phishing
activity
© 2014 Tier-3 Pty Ltd, All rights reserved 11 Intelligent Security. We deliver it.
Monitor / learn behavioural profile
automatically to create a dynamic
baseline of system behaviour
Continuously updated as the
environment changes
Correlating with other events,
detections for any deviations from
the “normal” baseline to alert
operators
Detecting Anomalous Behaviour
Hard in complex systems for analysts:
To know the network
To estimate thresholds
Have to constantly re-write rules
Make safe/reliable assumptions
Attack nature can be more easily
predictable
Start from the Indicator of Compromise
– or IoC - for APTs, zero-day & insider
threats
Indicators and behaviours play a role at
different stages of the kill chain
© 2014 Tier-3 Pty Ltd, All rights reserved 12 Intelligent Security. We deliver it.
Leverage Threat Intelligence
Consider ‘Indicators of Compromise’
Optimise and Automate
Incident response
Agenda - Three Components

Recommended for you

ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors

The document discusses the concept of defense in depth (DID) as it relates to cybersecurity. DID is defined as building mutually supporting layers of defense to reduce vulnerabilities and protect against attacks. The key aspects of DID include understanding threats, seeing the full battlefield, using defensive advantages, concentrating defenses, coordinating assets, and balancing security and legal constraints. The document advocates applying DID principles through multiple overlapping controls and frameworks, rather than relying on a single compliance standard, in order to provide comprehensive security that can withstand attacks from various threat actors.

iia ion-e risk security dagrossa
Crack the Code
Crack the CodeCrack the Code
Crack the Code

This document discusses the cyber attack lifecycle and strategies for advanced adversaries. It describes the typical stages an adversary goes through, including reconnaissance, exploitation, delivery, installation, command and control, and actions on objectives. The adversary's goal is to accomplish their task and exfiltrate information without detection. New strategic approaches are needed to detect threats across all points, including the network edge, endpoints, mobile devices, and clouds. Security controls must innovate faster to reduce the vulnerability gap against sophisticated global attackers.

austintechnologyit
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company

Ransomware is typically initiated via phishing or social engineering tactics, these attacks often take advantage of human error for the successful delivery of the malware. These criminal organizations are impartial to the size of your organization. They target any company with data, and if you don't pay the ransom, your information could be posted to a public forum or sold on the Dark Web for profit. Most companies unfortunately are forced to pay due to system failure and file corruption. The scariest about these methods is that the Ransomware doesn't need to be developed by the attackers. Ransomware services can now be purchased on the DarkWeb and used at the Cybercriminal's will (RAAS). As these Ransomware attacks and services evolve, how can companies arm themselves with the right solutions to defend themselves from these evergrowing attacks? Join us in our latest webinar with Dr. Christine Izuakor (cybersecurity expert) and Jay Godse (head of product dev at Veriato).

veriatoransomware as a serviceveriato ransomsafe
© 2014 Tier-3 Pty Ltd, All rights reserved 13 Intelligent Security. We deliver it.
Automating Responses
Manual analysis and
triage
Automatic response
(can be risky)
Suspicion / Detection
Automatic
information/context
gathering
Making changes, turning things off,
closing sessions can help, but may
impact normal business
System, user, process, network
information is transient – needs to be
gathered at the time (later is no use)
Manual response
Making sense of the data to
understand the incident and effect
appropriate
containment/investigation/remediatio
n
© 2014 Tier-3 Pty Ltd, All rights reserved 14 Intelligent Security. We deliver it.
Process efficiency:
Automating as much as possible and streamlining everything else
More than just purely “actively responding”
closing sessions, disrupting attacker, disabling user accounts...
Key use case:
Gather data/context “at the time of an alert” ...
Webcam photo, screen shot
System configuration, running processes, network sessions
... and from “just before”
i.e. caching a rolling data set (e.g. network traffic) and freezing it when an alert occurs
Note:
Only really works with real-time analysis and detection systems
You have a way to work with the dataset that is collected
Automatic Response
© 2014 Tier-3 Pty Ltd, All rights reserved 15 Intelligent Security. We deliver it.
To close ...
© 2014 Tier-3 Pty Ltd, All rights reserved 16 Intelligent Security. We deliver it.
Remember the “kill chain” concept
Cyber Kill Chain – sequential chain of events for successful attack
© Lockheed Martin
Monitor, detect and respond throughout attack lifecycle
Pre-Compromise Post-CompromiseCompromise

Recommended for you

The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019

The document discusses the state of threat detection in 2018 and plans for improving threat detection and hunting in 2019. Some key points: - Email still delivers most malware while file-less attacks that evade prevention are rising. Cyber attacks are the top concern for many businesses. - Only 28% of respondents felt preventive defenses were highly effective against targeted attacks. Just 21% believed post-breach detection was highly effective. - Common pain points included insufficient resources, lack of automation for incident response, and alert overload. - Threat hunting involves proactive searching across systems based on expert hypotheses, unlike typical detection techniques. Many organizations do not threat hunt due to lack of time, skills or visibility. - To

threat detectionnetworknetwork security
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience

My presentation on ITBIZ/BAKOTECH event @UK Ambassador Residence win cooperation with Jason Steer, Director for Strategy, FireEye EMEA.

casesfireeyepov
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know

Like water, cybercrime moves effortlessly around obstacles. Today, security-conscious enterprises and federal governments choose FireEye™ for industry-leading protection against advanced cybercrime and targeted attacks. FireEye stops advanced malware, zero-day and targeted APT attacks. FireEye’s appliances supplement traditional and next-generation firewalls, IPS, AV, and gateways, adding integrated multi-stage protection against today’s multi-vectored Web, email, and file-based threats.

information securityadvanced malwareadvanced targeted attacks
© 2014 Tier-3 Pty Ltd, All rights reserved 17 Intelligent Security. We deliver it.
What will “good” look like?
More
Confident/Reliable
Detection
• Given that “something” has been
detected have to decide if it is
significant (with confidence)
• “Potential incident” investigated based
on the surrounding or associated
contextual data
• Maximise use of established data
sources and automation:
• Swifter “confirmed detection”
• Fewer false positives/negatives
• Single view of information across sources
• Throughout the kill chain, and as early
as possible
Earlier Understanding
/Faster Analysis
• Anticipate obvious questions for triage,
analysis, escalation process
• Predictable requests dealt with automatically
• Pre-emptive information gathering
• Leverage data available from at / before
the time of incident:
• Screen shots, systems’ configurations, file
contents, network sessions, open files ...
• Focus staff concentration on decision
making rather than manual information
gathering
© 2014 Tier-3 Pty Ltd, All rights reserved 18 Intelligent Security. We deliver it.
Thank you
Piers Wilson
piers.wilson@tier-3.com +44 (0) 7800 508517
info@tier-3.com
+44 (0) 118 900 1550
www.tier-3.com twitter.com/Tier3huntsman

More Related Content

What's hot

Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Rahul Neel Mani
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
David Sweigert
 
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
FireEye, Inc.
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Michael Bunn
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
FireEye, Inc.
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
Quest
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS
Sylvain Martinez
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
Ben Rothke
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
mdagrossa
 
Crack the Code
Crack the CodeCrack the Code
Crack the Code
InnoTech
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
Veriato
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
Fidelis Cybersecurity
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
Valery Yelanin
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
FireEye, Inc.
 
Anatomy of a Ransomware Event
Anatomy of a Ransomware EventAnatomy of a Ransomware Event
Anatomy of a Ransomware Event
Art Ocain
 
FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not
MarketingArrowECS_CZ
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
James Anderson
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscape
yohansurya2
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
Prime Infoserv
 

What's hot (20)

Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security Fabric
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Crack the Code
Crack the CodeCrack the Code
Crack the Code
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
Anatomy of a Ransomware Event
Anatomy of a Ransomware EventAnatomy of a Ransomware Event
Anatomy of a Ransomware Event
 
FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscape
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 

Viewers also liked

Towards a mathematical understanding of intelligence
Towards a mathematical understanding of intelligenceTowards a mathematical understanding of intelligence
Towards a mathematical understanding of intelligence
Vadim Kosoy
 
Understanding the Importance of Emotional Intelligence in Sales Professionals
Understanding the Importance of Emotional Intelligence in Sales ProfessionalsUnderstanding the Importance of Emotional Intelligence in Sales Professionals
Understanding the Importance of Emotional Intelligence in Sales Professionals
Diane Hamilton, Ph.D.
 
Understanding and Growing Your Emotional Intelligence with Darby Fetzer
Understanding and Growing Your Emotional Intelligence with Darby FetzerUnderstanding and Growing Your Emotional Intelligence with Darby Fetzer
Understanding and Growing Your Emotional Intelligence with Darby Fetzer
HPCareer.Net / State of Wellness Inc.
 
Understanding the Aging Process with Artificial Intelligence
Understanding the Aging Process with Artificial IntelligenceUnderstanding the Aging Process with Artificial Intelligence
Understanding the Aging Process with Artificial Intelligence
Mark Farrell
 
Understanding Business Intelligence
Understanding Business IntelligenceUnderstanding Business Intelligence
Understanding Business Intelligence
Michael Lamont
 
Understanding Artificial Intelligence with Pop Culture
Understanding Artificial Intelligence with Pop CultureUnderstanding Artificial Intelligence with Pop Culture
Understanding Artificial Intelligence with Pop Culture
Jaidev Deshpande
 
Understanding Cortana Intelligence Suite & Power BI Demo
Understanding Cortana Intelligence Suite & Power BI DemoUnderstanding Cortana Intelligence Suite & Power BI Demo
Understanding Cortana Intelligence Suite & Power BI Demo
Elizabeth Beutjer-Feldman
 
Social intelligence understanding your audience to enhance your business
Social intelligence understanding your audience to enhance your businessSocial intelligence understanding your audience to enhance your business
Social intelligence understanding your audience to enhance your business
Alterian
 
Understanding Your Audience: Business Intelligence Workshop 1
Understanding Your Audience: Business Intelligence Workshop 1Understanding Your Audience: Business Intelligence Workshop 1
Understanding Your Audience: Business Intelligence Workshop 1
Nuscreen Digital
 
Understanding Artificial intelligence
Understanding Artificial intelligenceUnderstanding Artificial intelligence
Understanding Artificial intelligence
Ila Group
 
The Banking Brand Data Intelligence Report 2016 - Understanding the customer ...
The Banking Brand Data Intelligence Report 2016 - Understanding the customer ...The Banking Brand Data Intelligence Report 2016 - Understanding the customer ...
The Banking Brand Data Intelligence Report 2016 - Understanding the customer ...
MRS
 
Mobile Intelligence: Truly understanding your mobile customers
Mobile Intelligence: Truly understanding your mobile customersMobile Intelligence: Truly understanding your mobile customers
Mobile Intelligence: Truly understanding your mobile customers
Luisella Giani
 
Understanding Emotional Intelligence
Understanding Emotional IntelligenceUnderstanding Emotional Intelligence
Understanding Emotional Intelligence
Adil Aziz Khan
 
SharePoint and Business Intelligence: Understanding the Microsoft BI Portal C...
SharePoint and Business Intelligence: Understanding the Microsoft BI Portal C...SharePoint and Business Intelligence: Understanding the Microsoft BI Portal C...
SharePoint and Business Intelligence: Understanding the Microsoft BI Portal C...
Perficient, Inc.
 
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
Alex Pinto
 
Employability Intelligence: Understanding the ‘Employableness’ Model to Fut...
Employability Intelligence:  Understanding the ‘Employableness’ Model  to Fut...Employability Intelligence:  Understanding the ‘Employableness’ Model  to Fut...
Employability Intelligence: Understanding the ‘Employableness’ Model to Fut...
LessonsGoWhere
 
Interpersonal intelligence
Interpersonal intelligenceInterpersonal intelligence
Interpersonal intelligence
Maricel Pinzon
 
Understanding Emotional Intelligence
Understanding Emotional IntelligenceUnderstanding Emotional Intelligence
Understanding Emotional Intelligence
Rahila Narejo
 
Edomae 2015 - マルウェアを解析してみよう
Edomae 2015 - マルウェアを解析してみようEdomae 2015 - マルウェアを解析してみよう
Edomae 2015 - マルウェアを解析してみよう
Satoshi Mimura
 
Emotional Intelligence - Understanding emotional resonance for leadership dev...
Emotional Intelligence - Understanding emotional resonance for leadership dev...Emotional Intelligence - Understanding emotional resonance for leadership dev...
Emotional Intelligence - Understanding emotional resonance for leadership dev...
Mick Lavin, MBA
 

Viewers also liked (20)

Towards a mathematical understanding of intelligence
Towards a mathematical understanding of intelligenceTowards a mathematical understanding of intelligence
Towards a mathematical understanding of intelligence
 
Understanding the Importance of Emotional Intelligence in Sales Professionals
Understanding the Importance of Emotional Intelligence in Sales ProfessionalsUnderstanding the Importance of Emotional Intelligence in Sales Professionals
Understanding the Importance of Emotional Intelligence in Sales Professionals
 
Understanding and Growing Your Emotional Intelligence with Darby Fetzer
Understanding and Growing Your Emotional Intelligence with Darby FetzerUnderstanding and Growing Your Emotional Intelligence with Darby Fetzer
Understanding and Growing Your Emotional Intelligence with Darby Fetzer
 
Understanding the Aging Process with Artificial Intelligence
Understanding the Aging Process with Artificial IntelligenceUnderstanding the Aging Process with Artificial Intelligence
Understanding the Aging Process with Artificial Intelligence
 
Understanding Business Intelligence
Understanding Business IntelligenceUnderstanding Business Intelligence
Understanding Business Intelligence
 
Understanding Artificial Intelligence with Pop Culture
Understanding Artificial Intelligence with Pop CultureUnderstanding Artificial Intelligence with Pop Culture
Understanding Artificial Intelligence with Pop Culture
 
Understanding Cortana Intelligence Suite & Power BI Demo
Understanding Cortana Intelligence Suite & Power BI DemoUnderstanding Cortana Intelligence Suite & Power BI Demo
Understanding Cortana Intelligence Suite & Power BI Demo
 
Social intelligence understanding your audience to enhance your business
Social intelligence understanding your audience to enhance your businessSocial intelligence understanding your audience to enhance your business
Social intelligence understanding your audience to enhance your business
 
Understanding Your Audience: Business Intelligence Workshop 1
Understanding Your Audience: Business Intelligence Workshop 1Understanding Your Audience: Business Intelligence Workshop 1
Understanding Your Audience: Business Intelligence Workshop 1
 
Understanding Artificial intelligence
Understanding Artificial intelligenceUnderstanding Artificial intelligence
Understanding Artificial intelligence
 
The Banking Brand Data Intelligence Report 2016 - Understanding the customer ...
The Banking Brand Data Intelligence Report 2016 - Understanding the customer ...The Banking Brand Data Intelligence Report 2016 - Understanding the customer ...
The Banking Brand Data Intelligence Report 2016 - Understanding the customer ...
 
Mobile Intelligence: Truly understanding your mobile customers
Mobile Intelligence: Truly understanding your mobile customersMobile Intelligence: Truly understanding your mobile customers
Mobile Intelligence: Truly understanding your mobile customers
 
Understanding Emotional Intelligence
Understanding Emotional IntelligenceUnderstanding Emotional Intelligence
Understanding Emotional Intelligence
 
SharePoint and Business Intelligence: Understanding the Microsoft BI Portal C...
SharePoint and Business Intelligence: Understanding the Microsoft BI Portal C...SharePoint and Business Intelligence: Understanding the Microsoft BI Portal C...
SharePoint and Business Intelligence: Understanding the Microsoft BI Portal C...
 
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
Sharing is Caring: Understanding and Measuring Threat Intelligence Sharing Ef...
 
Employability Intelligence: Understanding the ‘Employableness’ Model to Fut...
Employability Intelligence:  Understanding the ‘Employableness’ Model  to Fut...Employability Intelligence:  Understanding the ‘Employableness’ Model  to Fut...
Employability Intelligence: Understanding the ‘Employableness’ Model to Fut...
 
Interpersonal intelligence
Interpersonal intelligenceInterpersonal intelligence
Interpersonal intelligence
 
Understanding Emotional Intelligence
Understanding Emotional IntelligenceUnderstanding Emotional Intelligence
Understanding Emotional Intelligence
 
Edomae 2015 - マルウェアを解析してみよう
Edomae 2015 - マルウェアを解析してみようEdomae 2015 - マルウェアを解析してみよう
Edomae 2015 - マルウェアを解析してみよう
 
Emotional Intelligence - Understanding emotional resonance for leadership dev...
Emotional Intelligence - Understanding emotional resonance for leadership dev...Emotional Intelligence - Understanding emotional resonance for leadership dev...
Emotional Intelligence - Understanding emotional resonance for leadership dev...
 

Similar to Intelligence-based computer network defence: Understanding the cyber kill chain (Royal Holloway University conference)

Using automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operationsUsing automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operations
Huntsman Security
 
Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)
Huntsman Security
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
misecho
 
Mis
MisMis
Mis
misecho
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
Vallie Joseph
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of things
Huntsman Security
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidente
Damir Delija
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
Shritam Bhowmick
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
EMERSON EDUARDO RODRIGUES
 
Mis
MisMis
Mis
misecho
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
muhammad awais
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Lastline, Inc.
 
Unit v
Unit vUnit v
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
msd11
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
mishogelashvili28
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 

Similar to Intelligence-based computer network defence: Understanding the cyber kill chain (Royal Holloway University conference) (20)

Using automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operationsUsing automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operations
 
Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Mis
MisMis
Mis
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of things
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidente
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Mis
MisMis
Mis
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Unit v
Unit vUnit v
Unit v
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 

More from Huntsman Security

Infosecurity Europe 2016 - Low-friction Security
Infosecurity Europe 2016 - Low-friction SecurityInfosecurity Europe 2016 - Low-friction Security
Infosecurity Europe 2016 - Low-friction Security
Huntsman Security
 
Infosec 2015 - Using threat intelligence to improve security response
Infosec 2015 - Using threat intelligence to improve security responseInfosec 2015 - Using threat intelligence to improve security response
Infosec 2015 - Using threat intelligence to improve security response
Huntsman Security
 
Huntsman - Threat intelligence (for IAP2015)
Huntsman - Threat intelligence (for IAP2015)Huntsman - Threat intelligence (for IAP2015)
Huntsman - Threat intelligence (for IAP2015)
Huntsman Security
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)
Huntsman Security
 
Infosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPInfosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSP
Huntsman Security
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
Huntsman Security
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)
Huntsman Security
 

More from Huntsman Security (7)

Infosecurity Europe 2016 - Low-friction Security
Infosecurity Europe 2016 - Low-friction SecurityInfosecurity Europe 2016 - Low-friction Security
Infosecurity Europe 2016 - Low-friction Security
 
Infosec 2015 - Using threat intelligence to improve security response
Infosec 2015 - Using threat intelligence to improve security responseInfosec 2015 - Using threat intelligence to improve security response
Infosec 2015 - Using threat intelligence to improve security response
 
Huntsman - Threat intelligence (for IAP2015)
Huntsman - Threat intelligence (for IAP2015)Huntsman - Threat intelligence (for IAP2015)
Huntsman - Threat intelligence (for IAP2015)
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)
 
Infosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPInfosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSP
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)
 

Recently uploaded

Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
welrejdoall
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
BookNet Canada
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Mydbops
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
Awais Yaseen
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
ScyllaDB
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 

Recently uploaded (20)

Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 

Intelligence-based computer network defence: Understanding the cyber kill chain (Royal Holloway University conference)

  • 1. © 2014 Tier-3 Pty Ltd, All rights reserved 1 Intelligent Security. We deliver it. Intelligence-based Computer Network Defence Piers Wilson Tier-3 Huntsman® - Head of Product Management
  • 2. © 2014 Tier-3 Pty Ltd, All rights reserved 2 Intelligent Security. We deliver it. • Cyber attacks continue to increase • Even closed networks are vulnerable • Both External and Internal attacks • Increasing sophistication • Every organisation is at risk Setting the Scene
  • 3. © 2014 Tier-3 Pty Ltd, All rights reserved 3 Intelligent Security. We deliver it. The Cyber security “kill chain” concept Cyber Kill Chain – sequential chain of events for successful attack © Lockheed Martin Increasing risk / cost to contain and remediate Pre-Compromise Post-CompromiseCompromise
  • 4. © 2014 Tier-3 Pty Ltd, All rights reserved 4 Intelligent Security. We deliver it. Considering Attack Cycles • Harvesting email addresses, conference information, staff bios, Press coverage Reconnaissance • Coupling exploit with backdoor into a deliverable payload Weaponisation • Getting the payload to the victim via email, web drive-by, USB Delivery • Exploiting the vulnerability to execute codeExploitation • Installing the malware/payload on the system Installation • Establishing channel back to the attack source Command & Control • Undertaking the automatic and attacker- driven activity desired Actions on Objectives • “Thinking like an attacker” • The likelihood of being caught & ROI ? • What's the best way to test the attack method ? • Enumeration of the organisation • Identify valuable/vulnerable assets • Establish how to get the information out • Acceptance that defences may not be sufficient and thus detection and diagnosis are key • Rapid detection means less cost, more chance to mitigate, better chance of recovery • Dealing with both external and insider threats • Need to consider the “indicators of compromise” at each stage • Anomalies detected • Events on boundary egress points • Critical documents / information silos • System performance and health • Activity levels, session lengths, traffic and flow patterns
  • 5. © 2014 Tier-3 Pty Ltd, All rights reserved 5 Intelligent Security. We deliver it. Leverage Threat Intelligence Consider ‘Indicators of Compromise’ Optimise and Automate Incident response Agenda - Three Components
  • 6. © 2014 Tier-3 Pty Ltd, All rights reserved 6 Intelligent Security. We deliver it. Threat Intelligence Integration of external TI feeds for detection AND analysis purposes to aid efficient operations Capture of static or dynamic internal information and intelligence on threats and risks Operational incident detection and analysis process generate real-time, interpreted Threat Intelligence Automation and confidence in alerting, detection and escalation processes
  • 7. © 2014 Tier-3 Pty Ltd, All rights reserved 7 Intelligent Security. We deliver it. Internal & Contextual • Import and cross-reference to (internal) state databases • E.g. users of different types, physical/location status, risk levels, system sensitivities, even self-created lists of systems that are the subject of incidents and investigations • Recent use case was a list of users who are “under increased vigilance” • Integration of vulnerability assessment tools • Network capture to derive asset information, deduce port usage, flow statistics in real time • Provides understanding of likely vulnerability/threat • Understanding of ongoing incidents and system statuses/risks • Integrated information from specific security/capture solutions • Active response to capture real-time alert data • Camera images • System configuration, process, network sessions, file system snapshot Internal Intelligence Databases Contextual Vulnerability, Incident and Asset Data Internal Security, Malware and Attack Context
  • 8. © 2014 Tier-3 Pty Ltd, All rights reserved 8 Intelligent Security. We deliver it. • Import of external data for use in detection, correlation and alerting • Compromised sites, malicious URLs, phishing sources, IP reputations • Ensure you “know what everyone else knows” – throughout the kill chain (diagnosis and response) • Open source and/or commercial feeds • Mapping from IP address to world location • Make decisions based on risk profiles or known operational locations External Threat Intelligence External Geographic Information External Threat Intelligence Sources
  • 9. © 2014 Tier-3 Pty Ltd, All rights reserved 9 Intelligent Security. We deliver it. Leverage Threat Intelligence Consider ‘Indicators of Compromise’ Optimise and Automate Incident response Agenda - Three Components
  • 10. © 2014 Tier-3 Pty Ltd, All rights reserved 10 Intelligent Security. We deliver it. Activity to/from risky or strange locations Personal sensitivities (role, seniority, access) Patterns of traffic between IP address pairs Session durations Data flow volumes and directions Activity on sensitive internal hosts Number of files open(ed) Number of pages or documents printed Query/search results (numbers) User account group membership activity Use of media like USB/CD Connections to cloud-based storage Indicators of Compromise Think how an Insider might behave, what they might do, how they would steal data What might be the early signs of an external attack or Trojan, APT, spear phishing activity
  • 11. © 2014 Tier-3 Pty Ltd, All rights reserved 11 Intelligent Security. We deliver it. Monitor / learn behavioural profile automatically to create a dynamic baseline of system behaviour Continuously updated as the environment changes Correlating with other events, detections for any deviations from the “normal” baseline to alert operators Detecting Anomalous Behaviour Hard in complex systems for analysts: To know the network To estimate thresholds Have to constantly re-write rules Make safe/reliable assumptions Attack nature can be more easily predictable Start from the Indicator of Compromise – or IoC - for APTs, zero-day & insider threats Indicators and behaviours play a role at different stages of the kill chain
  • 12. © 2014 Tier-3 Pty Ltd, All rights reserved 12 Intelligent Security. We deliver it. Leverage Threat Intelligence Consider ‘Indicators of Compromise’ Optimise and Automate Incident response Agenda - Three Components
  • 13. © 2014 Tier-3 Pty Ltd, All rights reserved 13 Intelligent Security. We deliver it. Automating Responses Manual analysis and triage Automatic response (can be risky) Suspicion / Detection Automatic information/context gathering Making changes, turning things off, closing sessions can help, but may impact normal business System, user, process, network information is transient – needs to be gathered at the time (later is no use) Manual response Making sense of the data to understand the incident and effect appropriate containment/investigation/remediatio n
  • 14. © 2014 Tier-3 Pty Ltd, All rights reserved 14 Intelligent Security. We deliver it. Process efficiency: Automating as much as possible and streamlining everything else More than just purely “actively responding” closing sessions, disrupting attacker, disabling user accounts... Key use case: Gather data/context “at the time of an alert” ... Webcam photo, screen shot System configuration, running processes, network sessions ... and from “just before” i.e. caching a rolling data set (e.g. network traffic) and freezing it when an alert occurs Note: Only really works with real-time analysis and detection systems You have a way to work with the dataset that is collected Automatic Response
  • 15. © 2014 Tier-3 Pty Ltd, All rights reserved 15 Intelligent Security. We deliver it. To close ...
  • 16. © 2014 Tier-3 Pty Ltd, All rights reserved 16 Intelligent Security. We deliver it. Remember the “kill chain” concept Cyber Kill Chain – sequential chain of events for successful attack © Lockheed Martin Monitor, detect and respond throughout attack lifecycle Pre-Compromise Post-CompromiseCompromise
  • 17. © 2014 Tier-3 Pty Ltd, All rights reserved 17 Intelligent Security. We deliver it. What will “good” look like? More Confident/Reliable Detection • Given that “something” has been detected have to decide if it is significant (with confidence) • “Potential incident” investigated based on the surrounding or associated contextual data • Maximise use of established data sources and automation: • Swifter “confirmed detection” • Fewer false positives/negatives • Single view of information across sources • Throughout the kill chain, and as early as possible Earlier Understanding /Faster Analysis • Anticipate obvious questions for triage, analysis, escalation process • Predictable requests dealt with automatically • Pre-emptive information gathering • Leverage data available from at / before the time of incident: • Screen shots, systems’ configurations, file contents, network sessions, open files ... • Focus staff concentration on decision making rather than manual information gathering
  • 18. © 2014 Tier-3 Pty Ltd, All rights reserved 18 Intelligent Security. We deliver it. Thank you Piers Wilson piers.wilson@tier-3.com +44 (0) 7800 508517 info@tier-3.com +44 (0) 118 900 1550 www.tier-3.com twitter.com/Tier3huntsman

Editor's Notes

  1. Foot printing Art of Gathering information Profile your intranet/extranet Determining your security posture Critical to foot printing are:- Network Domain Your Website IP Ranges Blocks Access Controls IDS SCANNING:- Ping and Port Sweeps Enumeration Probing your Network