the anatomy of cyber threat intelligence cti
play

THE ANATOMY OF CYBER THREAT INTELLIGENCE (CTI) Noureen Njoroge - PowerPoint PPT Presentation

THE ANATOMY OF CYBER THREAT INTELLIGENCE (CTI) Noureen Njoroge OVERVIEW Define Cyber Threat Intelligence (CTI) Define Cyber Intelligence (CI) Understand the importance of CTI to an organization Components of Threat Sources of


  1. THE ANATOMY OF CYBER THREAT INTELLIGENCE (CTI) Noureen Njoroge

  2. OVERVIEW • Define Cyber Threat Intelligence (CTI) • Define Cyber Intelligence (CI) • Understand the importance of CTI to an organization • Components of Threat • Sources of Cyber Threat Intelligence (CTI) • Categories of Cyber Threat Intelligence (CTI) • Benefits of Cyber Threat Intelligence (CTI) • Importance of real-time Cyber Threat Intelligence (CTI) Noureen Njoroge

  3. DEFINITION Cyber Threat Intelligence (CTI) Is the analysis of information related to adversaries who have the intent, opportunity and capability to do harm. Noureen Njoroge

  4. DEFINITION Cyber Intelligence (CI) Is the ability to gain knowledge about an enterprise and it’s existing conditions and capabilities. Noureen Njoroge

  5. COMPONENTS OF A SUCCESSFUL THREAT INTELLIGENCE STRATEGY Three Important components 1. Good Data Sources 2. Good Policies, Procedures and chain of command. 3. Good Threat Intelligence Analysts Noureen Njoroge

  6. CTI ON A CYBERSECURITY CHART

  7. Noureen Njoroge

  8. CTI IS INTELLIGENCE FOCUS Know the three components of threats: 1. Intent 2. Capability 3. Opportunity Noureen Njoroge

  9. CYBER THREAT INTELLIGENCE (CTI) SOURCES Past Incidents • Commercial Feeds • Govt & Non- Profit sharing programs • Threat Intel Reports • Noureen Njoroge

  10. CATEGORIES OF CYBER THREAT INTELLIGENCE Know the three categories of threats: 1. Tactical 2. Operational 3. Strategic Noureen Njoroge

  11. CATEGORIES OF CYBER THREAT INTELLIGENCE

  12. THE FIVE W ’ S & HOW Know threat and answer the 5 w ’s and How. WHEN WHERE WHY WHO WHAT HOW Noureen Njoroge

  13. CASE FOR CYBER THREAT INTELLIGENCE (CTI) Before Attack During an Attack After Attack Noureen Njoroge

  14. KEY BENEFITS OF CTI TO AN ORGANIZATION • It provides organizations a fighting chance to defeat ever-changing threats. • Provides a holistic view of the threat landscape and provide a posture to protect the organization from the multitude of threats they face ever day. Noureen Njoroge

  15. INTEGRITY OF CTI REPORTS “All organizations that share threat information to customers or the public through any channel should employ guidelines that help them ensure accuracy in their reporting. Even if all the facts aren’t clear, organizations can still communicate what they know—and avoid guessing. Being right is better than being first”. https://www.cisco.com/c/dam/m/hu_hu/campaigns/security-hub/pdf/acr-2018.pdf Noureen Njoroge

  16. BENEFITS OF REAL-TIME -- DYNAMIC CTI Provide visibility of threat landscape • Freshness of data • Collaboration • Threat context • Noureen Njoroge

  17. KEY TAKEAWAYS Detection • Context • Advance Persistent Threat (APT) • Community Defense • Noureen Njoroge

  18. FREE CTI RESOURCES https://www.mitre.org/capabilities/cybersecurity/cyber-threat-intelligence https://www.misp-project.org/feeds/ https://cymon.io https://www.us-cert.gov/ncas/alerts https://talosintelligence.com Noureen Njoroge

  19. CONTACT Noureen Njoroge cybersecmentorship@gmail.com or nnjoroge@cisco.com Linkedin @ Noureen Njoroge Thank you for your time Noureen Njoroge

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend