MRO Security Advisory Council (SAC) Webinar
“One Company’s Path to Establishing Threat Intelligence and Hunting”
Jamie Buening, Manager, Threat Intelligence and Hunting, MISO
August 21, 2019
MRO Security Advisory Council (SAC) Webinar One Companys Path to - - PowerPoint PPT Presentation
MRO Security Advisory Council (SAC) Webinar One Companys Path to Establishing Threat Intelligence and Hunting Jamie Buening, Manager, Threat Intelligence and Hunting, MISO August 21, 2019 MRO SAC Update Technical Training and Social
“One Company’s Path to Establishing Threat Intelligence and Hunting”
Jamie Buening, Manager, Threat Intelligence and Hunting, MISO
August 21, 2019
1
August 21,2019
2
4
5
7
ThreatActors
Activists / Extremists Insiders NationState CyberCriminal Enterprise
8
9
FALSE POSITIVE
11
CISO Cyber Security
12
CISO Threat Intelligence andHunting Information SecurityRisk Cyber Security Operations Physical Security
13
14
15
17
18
https://www.sans.org/reading-room/whitepapers/ActiveDefense/sliding-scale-cyber-security-36240
19
David Bianco, “A Simple Hunting Maturity Model,”EnterpriseDetection & Responseblog,Oct. 15, 2015, http://detect-respond.blogspot.com/2015/10/a-simple-hunting-maturity-model.html
Initial
alerting
data
Minimal
searches
high data
Procedural
procedures
high data
Innovative
procedures
high data
Leading
procedures
high data
HMM0 HMM1 HMM2 HMM3 HMM4
20
22
23
24
House Security Technology Fence, windows, doors Firewalls, IAM Motion detectors IDS House Method Routine searches Statistical Analysis Safe pried open? Consequence driven hunt
25
26
Understand and know our environment in the same wayour adversaries will attempt todo.
27 ALLANITE What: Informationgathering to prepare disruptive capabilities How:Phishingand wateringholes Who:DHSassociateswithRussia COVELLITE What: Gathers intellectualproperty and industrial operations intelligence How: Targeted phishing Who:DHSassociateswithNorthKorea ELECTRUM What: Disruptoperations How:Commonexploitationbehaviors(no 0-days) Who:DHSassociateswithRussia RASPITE What: Information gatheringand remote access How: Strategic websitecompromise Who:Symantec associateswithIran
Adversary Reports,https://dragos.com/adversaries/
Threat huntingmethodology
Hypothesisbased Human analystusing
Machineassistance
28
Hypothesis: ALLANITE has gained access to MISO’s network and is gathering informationon Control Roomoperations. Tests:
campaign to stealcredentials?
connections into MISO’snetwork?
Control Room consolescreenshots?
30
31
32
33
35
37
https://www.sans.org/reading-room/whitepapers/threathunting
38
39
40
Determine acommon base set oftraining. Get people onthe samepage.
42
MISO Threat Hunting Training at the MRO Security Conference