the organized mess business ethics of cyber threat intel
play

The Organized Mess & Business Ethics of Cyber Threat Intel Ron - PowerPoint PPT Presentation

The Organized Mess & Business Ethics of Cyber Threat Intel Ron Schlecht Introduction Ron Schlecht , Managing Partner 18 years of Information Security experience G Contracting, Law Enforcement, Consulting, CISO Founded BTB


  1. The Organized Mess & Business Ethics of Cyber Threat Intel Ron Schlecht

  2. Introduction • Ron Schlecht , Managing Partner – 18 years of Information Security experience • G Contracting, Law Enforcement, Consulting, CISO • Founded BTB Security in 2006

  3. Company Profile Company Profile • The BTB Group, LLC / BTB Security – Founded in 2006 – Offices in Philadelphia, Chicago, Austin – coverage nationally – Backgrounds include years of experience with Big Four and similarly sized organizations, and experience building, managing, and operating corporate security groups. – 3 partners • Brian Bailey, Managing Partner (Chicago) • Chris McGinley, Managing Partner (Philly) • Ron Schlecht, Founder / Managing Partner (Philly/Chicago)

  4. Cyber Threat Intel • Gartner definition: – evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject's response to that menace or hazard.

  5. Current State …with less yelling

  6. Velocity and Volume • Disturbing Trends (continue) – Commercialization of malware – Attack kits readily available – Botnets readily available – spam/attack/DDoS – Adaptation is now the norm for attackers…not NEW

  7. Who’s doing it? • National Governments • Terrorists • Organized Crime • Hacktivists • Hackers

  8. What are ”WE” doing about it? ecurity Woman (or Man if you are one

  9. Sources of Cyber Threat Intel (CTI) • Endpoint Security Vendor • UTM/Firewall/IDS Vendor • Vulnerability Management Vendor • SIEM Vendor • Application Security Vendor • Log Management Vendor • Forensics Vendor • Identity and Access Management Vendor • CTI Intel Platform Vendor • CTI Intel Subscription Feed Vendor

  10. Improvements • Better context, accuracy and/or speed in handling incidents • Improved visibility into attack methodologies • Faster and more accurate detection and response • Reduction in incidents through early prevention • Plus it sounds really cool

  11. The Problems • Vendor Driven • Standards and Interoperability around feeds • Ethics – G and Commercial won’t share! – Research input – Dark Web

  12. Company Profile

  13. What do we do? • Open Threat Exchange – Alienvault • OpenIOC - FireEye • STIX – Structured Threat Information Expression • Cybox – Cyber Observable eXpression • TAXII – Trusted Automated eXchange of Indicator Information • OASIS – A nonprofit consortium that drives the development, convergence and adoption of open standards for the global information security

  14. OASIS

  15. Why Is This Important? • Malware • Attack Kits • Botnets / Bad networks • Security data correlation • Plus it sounds really cool

  16. Questions? Ron Schlecht ron.schlecht@btbsecurity.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend