Standardizing Cyber Threat Intelligence Information with the Structured Threat Information expression (STIX )
|
|
|
- Todd Thomas Roberts
- 10 years ago
- Views:
Transcription
1 THREAT-BASED DEFENSE Standardizing Cyber Threat Intelligence Information with the Structured Threat Information expression (STIX ) The MITRE Corporation. All rights reserved.
2 IT IS BECOMING INCREASINGLY NECESSARY FOR ORGANIZATIONS TO HAVE A CYBER THREAT INTELLI- GENCE CAPABILITY and a key component of success for any such capability is information sharing with partners, peers and others they select to trust. While cyber threat intelligence and information sharing can help focus and prioritize the use of the immense volumes of complex cyber security information organizations face today, they have a foundational need for standardized, structured representations of this information to make it tractable. The Structured Threat Information expression (STIX ) is a quickly evolving, collaborative communitydriven effort to define and develop a language to represent structured threat information. The STIX language is meant to convey the full range of cyber threat information and strives to be fully expressive, flexible, extensible, automatable, and as human-readable as possible. Though relatively new and still evolving, it is actively being adopted or considered for adoption by a wide range of cyber threat-related organizations and communities around the world. All interested parties are welcome to participate in evolving STIX as part of its open, collaborative community and leverage the upcoming STIX web site and collaborative forums. Table of Contents Introduction 1 Background 1 Current Approaches 4 History 4 What is STIX? 5 Use Cases 6 Guiding Principles 8 Architecture 10 STIX Structure 11 Implementations 15 Usage 16 Conclusion and Future Work 17 Acknowledgments 18 References 19
3 Introduction This document reflects ongoing efforts to create, evolve, and refine the community-based development of sharing and structuring cyber threat information. In the process of this research effort, as with other past efforts in evolving cybersecurity practices, DHS s Homeland Security Systems Engineering & Development Institute (HS SEDI) operated by The MITRE Corporation is engaging organizations and experts across a broad spectrum of industry, academia, and government. This includes consumers and producers of cyber threat information in security operations centers, CERTs, cyber threat intelligence cells, and security executives and decision makers, as well as numerous currently active information sharing groups, with a diverse set of sharing models. Background Cyber security is a complex and multifaceted problem domain and continues to become more so. Our dependence on complex technology continues to grow and, at the same time, the threat environment continues to grow and evolve in dynamic and daunting ways. Traditional approaches for cyber security, that focus inward on understanding and addressing vulnerabilities, weaknesses and configurations are necessary but insufficient. Effective defense against current and future threats also requires the addition of a balancing, outward focus, on understanding the adversary s behavior, capability, and intent. Only through a balanced understanding of both the adversary and ourselves can we hope to understand enough about the true nature of the threats we face to make intelligent defensive decisions. Today s evolving threat environment also brings with it far more complex attack scenarios. Alongside commoditized threats, more advanced capabilities that were rare in the past are now commonplace. Adversary behavior is not solely focused on widespread, disruptive activity, such as the Storm worm outbreak of years gone by, but rather it often involves more targeted, lower-profile multi-stage attacks that aim to achieve specific tactical objectives and establish a persistent foothold into our enterprises. This newer attack scenario, and how to defend against it, can be effectively understood from the defensive perspective of a kill chain 1 showing the multiple steps in an attack. As shown below, the adversary s attack unfolds in a series of steps, ending with the attacker having an established foothold in the victim s network. This is the modus operandi of the today s sophisticated advanced persistent threat, more commonly known as the APT. APT actors are typically assumed to be nation states but the same behaviors can also be exhibited by those engaged in conducting cyber crime, financial threats, industrial espionage, hacktivism, and terrorism
4 Left of Hack Right of Hack Recon Deliver Control Maintain Weaponize Exploit Execute Example Cyber Kill Chain The APT s desire and apparent capability to persist and cause ongoing damage is motivating the need to move beyond today s traditional reactive approaches to cyber security and become more proactive. Responding to incidents after the exploit has already occurred is very costly, both in the effective impact and in the level of effort necessary to root out the adversary s established foothold. To be proactive, cyber defenders need to fundamentally change the nature of the game by stopping the adversary s advance, preferably before the exploit stage of the attack illustrated in the kill chain (that is, moving left of the hack). Moving left of the hack requires defenders to evolve from a defensive strategy based primarily on after-the-fact incident investigation and response to one driven by cyber threat intelligence. Just as traditional intelligence ascertains an understanding of adversaries capabilities, actions, and intent, the same value carries over to the cyber domain. Cyber intelligence seeks to understand and characterize things like: what sort of attack actions have occurred and are likely to occur; how can these actions be detected and recognized; how can they be mitigated; who are the relevant threat actors; what are they trying to achieve; what are their capabilities, in the form of tactics, techniques, and procedures (TTP) they have leveraged over time and are likely to leverage in the future; what sort of vulnerabilities, misconfigurations, or weaknesses they are likely to target; what actions have they taken in the past; etc. A holistic understanding of the threat posed by the adversary enables more effective decision support, prioritization of courses of action and a potential opportunity to fundamentally affect the balance of power between the defender and the adversary. According to Hutchins, Cloppert, and Amin [11]: The effect of intelligence-driven CND [computer network defense] is a more resilient security posture. APT actors, by their nature, attempt intrusion after intrusion, adjusting their operations based on the success or failure of each attempt. In a kill chain model, just one mitigation breaks the chain and thwarts the adversary, therefore any repetition by the adversary is a liability that defenders must recognize and leverage. Through this model, defenders can develop resilient mitigations against intruders and intelligently prioritize investments in new technology or processes. If defenders implement countermeasures faster than adversaries evolve, it raises the costs an adversary must expend to achieve their objectives. This model shows, contrary to conventional wisdom, such aggressors have no inherent advantage over defenders. 2
5 Cyber threat intelligence itself poses a challenge in that no organization in and of itself has access to an adequate scope of relevant information for accurate situational awareness of the threat landscape. The way to overcome this limitation is via sharing of relevant cyber threat information among trusted partners and communities. Through information sharing, each sharing partner can potentially achieve a more complete understanding of the threat landscape not only in the abstract but also at the instantial level of what specifics they can look for to find the attacker. The threat that organization A is facing today may very well be one that organization B will face tomorrow. This is especially true when A and B both fall within the targeting scope of a given adversary s campaign. If organization A can share their personal instantial knowledge of what they learned/saw about a given threat in the form of a cyber threat indicator 2, organization B may be able to take advantage of this knowledge to address the threat while it s attack on them is still left of the hack (that is, pre-exploit). Given the evolving complexities of the threat landscape, the speed at which events occur, and the vast quantities of data involved in cyber threat intelligence and threat information sharing, establishing automation to aid human analysis or execute defensive actions at machine-speed is a prerequisite for any effective approach. Automation will require a feed of quality information and most defensive capabilities will typically be built not from homogenous architectures but rather from a diverse set of differing products and systems. The combination of all of these factors will require standardized, structured threat information representations so the widest possible community of information sources can contribute and leverage information without knowing ahead of time who will be providing what information. One of the challenges threat-sharing organizations face is the ability to standardize cyber threat information, yet not lose the human judgment and control involved in sharing. In many cases, organizations have a desire to exchange information in a way that is both human-readable as well as machine-parsable. This requirement is largely an artifact of many information sharing programs where organizations consume not just the data but also assess the data as part of an intelligence collection process. This intelligence process is largely driven by human intelligence analysts that are focused on types of analysis that are either inappropriate for automation or focused on making decisions that require a humanin-the-loop where the analyst directly benefits from reading threat information for situational awareness and context. In addition, because of the wide range in quality of the shared threat information, the intelligence analyst is often also assessing the fidelity based upon the sources and methods used to produce the threat information. Given all of these factors, there exists a need for standardized representations of structured threat information that is expressive, flexible, extensible, automatable and readable. This paper outlines a community-driven solution to this problem known as the Structured Threat Information expression, or STIX, that is continuing to evolve while at the same time attracting early prototyping and use among some parties and interest for adoption among numerous key players and communities around the world. 2 Cyber Threat Indicator: A set of cyber observables combined with contextual information intended to represent artifacts and/or behaviors of interest within a cyber security context. 3
6 Current Approaches STIX is relatively new, but the practice of cyber threat information sharing, particularly indicators, is not. The information being managed and exchanged today is typically very atomic, inconsistent, and very limited in sophistication and expressivity. Where standardized structures are used, they are typically focused on only an individual portion of the overall problem, do not integrate well with each other, or lack coherent flexibility. Many existing indicator sharing activities are human-to-human exchanges of unstructured or semi-structured descriptions of potential indicators, conducted via web-based portals or encrypted . A more recent trend is the machine-to-machine transfer of relatively simple sets of indicator data fitting already well-known attack models. Efforts fitting this description include the Research and Engineering Networking Information Sharing and Analysis Center s (REN-ISAC) Security Event System and its Collective Intelligence Framework component, the state of Washington s Public Regional Information Security Event Management (PRISEM), the Department of Energy s Cyber Federated Model, and CERT.FI s and CERT.EE s AbuseHelper. STIX, however, aims to extend indicator sharing to enable the management and exchange of significantly more expressive sets of indicators as well as other full-spectrum cyber threat information. Currently, automated management and exchange of cyber threat information is typically tied to specific security product lines, service offerings, or community-specific solutions. STIX will enable the sharing of comprehensive, rich, high-fidelity cyber threat information across organizational, community, and product/service boundaries. History STIX evolved out of discussions among the security operations and cyber threat intelligence experts on the IDXWG list (established by members of US-CERT and CERT.org in 2010 to discuss automated data exchange for cyber incidents) regarding the development of a standardized representation for cyber threat indicators. Out of these discussions a rough structured threat information architecture diagram was created. The original purpose of this architecture diagram was to clearly define the scope of what sorts of information should be included within a structured cyber threat indicator and what sorts of information should be defined in other related structures. This architecture diagram helped to clarify scope such that initial cuts at a standardized language for cyber threat indicators known as the Indicator Exchange expression (IndEX ) could be successfully drafted. As the concept and initial structure for cyber threat indicators matured, there was increasing interest from numerous parties in fleshing-out the rest of the structured threat information architecture in a concrete schematic implementation to advance its collaborative maturation and provide an initial structure for real-world prototyping and proof-of-concept implementations in structured threat information management and sharing. An XML Schema implementation of the STIX architecture, incorporating the IndEX representation among others, is the result of those discussions and the vehicle for current ongoing development of the STIX language. 4
7 What is STIX? STIX is a language, being developed in collaboration with any and all interested parties, for the specification, capture, characterization and communication of standardized cyber threat information. It does so in a structured fashion to support more effective cyber threat management processes and application of automation. A variety of high-level cyber security use cases rely on such information including: Analyzing cyber threats Specifying indicator patterns for cyber threat Managing cyber threat response activities Sharing cyber threat information STIX provides a common mechanism for addressing structured cyber threat information across and among this full range of use cases improving consistency, efficiency, interoperability, and overall situational awareness. In addition, STIX provides a unifying architecture tying together a diverse set of cyber threat information including: Cyber Observables Indicators Incidents Adversary Tactics, Techniques, and Procedures (including attack patterns, malware, exploits, kill chains, tools, infrastructure, targeting, etc.) Exploit Targets (e.g., vulnerabilities and weaknesses) Courses of Action (e.g., incident response or vulnerability/weakness remedies) Cyber Attack Campaigns Cyber Threat Actors To enable such an aggregate solution to be practical for any single use case, existing standardized languages are leveraged where appropriate and numerous flexibility mechanisms are designed into the language. In particular, almost everything in this definitively-structured language is optional such that any single use case could leverage only the portions of STIX that are relevant for it (from a single field to the entire language or anything in between) without being overwhelmed by the rest The MITRE Corporation. All rights reserved. 5
8 Use Cases STIX is targeted to support a range of core use cases involved in cyber threat management. Very simple overviews of these use cases are provided below. Core Use Cases Targeted by STIX (UC1) Analyzing Cyber Threats A cyber threat analyst reviews structured and unstructured information regarding cyber threat activity from a variety of manual or automated input sources. The analyst seeks to understand the nature of relevant threats, identify them, and fully characterize them such that all of the relevant knowledge of the threat can be fully expressed and evolved over time. This relevant knowledge includes threat-related actions, behaviors, capabilities, intents, attributed actors, etc. From this understanding and characterization the analyst may then specify relevant threat indicator patterns, suggest courses of action for threat response activities, and/or share the information with other trusted parties. For example, in the case of a potential phishing attack, a cyber threat analyst may analyze and evaluate a suspected phishing , analyze any attachments and links to determine if they are malicious, determine if the was sent to others, assess commonality of who/what is being targeted in the phishing attack, determine whether malicious attachments were opened or links followed, and keep a record of all analysis performed. 6
9 (UC2) Specifying Indicator Patterns for Cyber Threats A cyber threat analyst specifies measurable patterns representing the observable characteristics of specific cyber threats along with their threat context and relevant metadata for interpreting, handling, and applying the pattern and its matching results. This may be done manually or with the assistance of automated tooling and structured instantial threat information. For example, in the case of a confirmed phishing attack, a cyber threat analyst may harvest the relevant set of observables (e.g., to or from addresses, actual source, subject, embedded URLs, type of attachments, specific attachment, etc.) from the performed analysis of the phishing , identify the relevant TTPs exhibited in the phishing attack, perform kill chain correlation of the attack, assign appropriate confidence for the indicator, determine appropriate handling guidance, generate any relevant automated rule patterns for the indicator (e.g. Snort, YARA, OVAL, etc.), assign any suggested courses of action, and package it all up as a coherent record for sharing (UC4, below) and future reference. (UC3) Managing Cyber Threat Response Activities Cyber decision makers and cyber operations personnel work together to prevent or detect cyber threat activity and to investigate and respond to any detected incidences of such activity. Preventative courses of action may be remedial in nature to mitigate vulnerabilities, weaknesses, or misconfigurations that may be targets of exploit. After detection and investigation of specific incidents, reactive courses of action may be pursued. For example, in the case of a confirmed phishing attack with defined indicators, cyber decision makers and cyber operations personnel work together to fully understand the effects of the phishing attack within the environment including malware installed or malware executed, to assess the cost and efficacy of potential courses of action, and to implement appropriate preventative or detective courses of action. (UC3.1) Cyber Threat Prevention Cyber decision makers evaluate potential preventative courses of action for identified relevant threats and select appropriate actions for implementation. Cyber operations personnel implement selected courses of action in order to prevent the occurrence of specific cyber threats whether through general prophylactic application of mitigations or through specific targeted mitigations initiated by predictive interpretation of leading indicators. For example, in the case of a confirmed phishing attack with defined indicators, a cyber decision maker may evaluate a suggested preventative course of action (e.g., implementing a blocking rule at the gateway) defined within an indicator for the phishing attack, determine its relevant cost and risk, and decide whether or not to implement it. If it is decided to implement the suggested course of action, cyber operations personnel carry out the implementation. (UC3.2) Cyber Threat Detection Cyber operations personnel apply mechanisms (both automated and manual) to monitor and assess cyber operations in order to detect the occurrence of specific cyber threats whether in the past through historical The MITRE Corporation. All rights reserved. 7
10 evidence, currently ongoing through dynamic situational awareness, or apriori through predictive interpretation of leading indicators. This detection is typically via cyber threat indicator patterns. For example, in the case of a confirmed phishing attack with defined indicators, cyber operations personnel may harvest any specified observable patterns from defined indicators of the attack and apply them appropriately within the operational environment to detect any evidence of the phishing attack occurring. (UC 3.3) Incident Response Cyber operations personnel respond to detections of potential cyber threats, investigate what has occurred or is occurring, attempt to identify and characterize the nature of the actual threat, and potentially carry out specific mitigating or corrective courses of action. For example, in the case of a confirmed phishing attack, cyber operations personnel may conduct investigative activities to determine whether the phishing attack was successful in carrying out negative effects within the target environment (e.g., was malware installed or run) and if so, attempt to characterize in detail those effects (e.g., which systems were affected by malware, what data was exfiltrated, etc.). Once the effects are understood, cyber operations personnel would implement appropriate mitigating or corrective courses of action (e.g. wipe and restore systems, block exfil channels, etc.). (UC4) Sharing Cyber Threat Information Cyber decision makers establish policy for what sorts of cyber threat information will be shared with which other parties and how it should be handled based on agreed to frameworks of trust in such a way as to maintain appropriate levels of consistency, context and control. This policy is then implemented to share the appropriate cyber threat indicators and other cyber threat information. For example, in the case of a confirmed phishing attack with defined indicators, the policies predefined by cyber decision makers could enable the relevant indicators to be automatically or manually shared with trusted partners or communities such that they could take advantage of the knowledge gained by the sharing organization. Guiding Principles In its approach to defining a structured representation for cyber threat information the STIX effort strives to adhere to and implement a core set of guiding principles that community consensus has deemed necessary. These principles are as follows: Expressivity In order to fully support the diversity of threat-relevant use cases within the cyber security domain STIX is targeted to provide aggregated expressive coverage across all of its targeted use cases rather than specifically targeting one or two. STIX is intended to provide full expressivity for all relevant information within the cyber threat domain. 8
11 Integrate rather than Duplicate Wherever the scope of STIX encompasses structured information concepts for which adequate and available consensus standardized representations already exist, the default approach is to integrate these representations into the overall STIX architecture rather than attempt to unnecessarily duplicate them. Version 0.3 of STIX imports and leverages the following constituent schemas: Cyber Observable expression (CybOX ) v1.0 (Draft) Indicator Exchange expression (IndEX ) v0.4 The IndEX language is being developed in parallel with STIX and does not as yet have a public web site. Common Attack Pattern Enumeration and Classification (CAPEC ) v2.5 V2.5 of the CAPEC schema is a namespace separated version of the schema and has not yet been published on the CAPEC web site. V2.4 of the schema is identical to v2.5 other than the namespace separation and is available at: Malware Attribute Enumeration and Characterization (MAEC ) v2.1 Incident Object Description and Exchange Format (IODEF) v1.0 Data_Marking v0.3 The Data_Marking schema is being developed in parallel with STIX and does not as yet have a public web site. Flexibility In order to support a wide range of use cases and information of varying levels of fidelity, STIX is intentionally designed to offer as much flexibility as possible. STIX adheres to a policy of allowing users to employ any portions of the standardized representation that are relevant for a given context and avoids mandatory features wherever possible. Extensibility In order to support a range of use cases with potentially differing representation details and to ensure ease of community-driven refinement and evolution of the language, the STIX design intentionally builds in extension mechanisms for domain specific use, for localized use, for user-driven refinement and evolution, and for ease of centralized refinement and evolution. Automatability The STIX design approach intentionally seeks to maximize structure and consistency to support machine-processable automation The MITRE Corporation. All rights reserved. 9
12 Readability The STIX design approach intentionally seeks for content structures to not only be machine-consumable and processable but also to, as much as possible, be human-readable. This human readability is necessary for clarity and comprehensibility during the early stages of development and adoption, and for sustained use in diverse environments going forward. Architecture The STIX architecture diagram below identifies the core cyber threat concepts as independent and reusable constructs and characterizes all of their interrelationships based on the inherent meaning and content of each. Inside each main construct bubble on the diagram is a brief high-level list of types of content relevant for that construct. Bracketed content following any of these entries indicates the cardinality for that type of content. Connecting arrows between construct bubbles indicate relationships in the form of content elements within the bubble at the root of the connecting arrow, that is of the type of the bubble at the head of the connecting arrow. All content entries within each construct are fleshed out in detail within the language implementation (currently in the form of an XML Schema). The eight core constructs Observable, Indicator, Incident, TTP, ExploitTarget, CourseOfAction, Campaign and ThreatActor are briefly characterized below. 10
13 STIX Structure Observables Observables are the base element within the STIX structure. Observables are stateful properties and measurable events pertinent to the operation of computers and networks. Information about a file (name, hash, size, etc.), a registry key value, a service being started, or an HTTP request being sent are all simple examples of observables. STIX leverages the Cyber Observable expression (CybOX ) standardization effort for its representation of Observables. CybOX is a language for encoding and communicating standardized high-fidelity information about cyber observables, whether dynamic events or stateful measures that are observable in the operational cyber domain. CybOX, like STIX, is not targeted at a single cyber security use case but rather is intended to be flexible enough to offer a common solution for all cyber security use cases requiring the ability to deal with cyber observables. It is also intended to be flexible enough to allow both the high-fidelity description of instances of cyber observables that have been measured in an operational context as well as more abstract patterns for potential observables that may be targets for observation and analysis apriori. Indicators Indicators are a construct used to convey specific Observables combined with contextual information intended to represent artifacts and/or behaviors of interest within a cyber security context. They consist of one or more Observables potentially mapped to a related TTP context and adorned with other relevant metadata on things like confidence in the indicator s assertion, handling restrictions, valid time windows, likely impact, sightings of the indicator, structured test mechanisms for detection, suggested courses of action, the source of the Indicator, etc. STIX leverages the Indicator Exchange expression (IndEX) language for its representation of Indicators. IndEX is a language for expressing standardized cyber threat indicators that utilizes CybOX for representing cyber observables. IndEX is currently a work in progress, though rapidly maturing, and is currently being considered for the information basis of numerous cyber threat indicator sharing communities. IndEX is being actively worked by a broad community of experts interacting through the IDXWG list The MITRE Corporation. All rights reserved. 11
14 Incidents Incidents are discrete instances of Indicators affecting an organization along with information discovered or decided during an incident response investigation. They consist of data such as time-related information, location of effect, related Indicators, leveraged TTP, suspected intent, impact assessment, response Course of Action requested, response Course of Action taken, source of the Incident information, log of actions taken, etc. Recognizing limitations in current standardized approaches of representation, STIX leverages community knowledge and best practices to define a new STIX-Incident structure for representing Incident information. Tactics, Techniques and Procedures (TTP) TTPs are representations of the behavior or modus operandi of cyber adversaries. It is a term taken from the traditional military sphere and is used to characterize what an adversary does and how they do it in increasing levels of detail. For instance, to give a simple example, a tactic may be to use malware to steal credit card credentials. A related technique (at a lower level of detail) may be to send targeted s to potential victims, which have documents attached containing malicious code which executes upon opening, captures credit card information from keystrokes, and uses http to communicate with a command and control server to transfer information. A related procedure (at a lower level of detail) may be to perform open source research to identify potentially gullible individuals, craft a convincing socially engineered and document, create malware/exploit that will bypass current antivirus detection, establish a command and control server by registering a domain called mychasebank.org, and send mail to victims from a Gmail account called [email protected]. TTPs play a central role in cyber threat information and cyber threat intelligence. They are relevant for Indicators, Incidents, Campaigns, and ThreatActors. In addition, they hold a close relationship with ExploitTargets that characterize the specific targets that the TTPs seek to exploit. In a structured sense, TTPs consist of the specific adversary behavior (attack patterns, malware, exploits) exhibited, resources leveraged (tools, infrastructure), information on targeted assets, relevant ExploitTargets being targeted, suspected intent of the behavior, relevant kill chain phases, source of the TTP information, etc. 12
15 Recognizing a lack of current standardized approaches, STIX leverages community knowledge and best practices to define a new STIX-TTP structure for representing TTP information. However, portions of the TTP structure leverage other existing standardized approaches for characterizing things like behaviors in the form of attack patterns and malware and resources in the form of tools and infrastructure. The Common Attack Pattern Enumeration and Classification (CAPEC ) is utilized for structured characterization of TTP attack patterns. The Malware Attribute Enumeration and Characterization (MAEC ) is utilized for structured characterization of TTP malware. CybOX is utilized for characterization of tools and infrastructure. Campaigns Campaigns are instances of ThreatActors pursuing an intent, as observed through sets of Incidents and/or TTP, potentially across organizations. In a structured sense, Campaigns may consist of the suspected intent of the adversary, the related TTP leveraged within the Campaign, the related Incidents believed to be part of the Campaign, related Indicators for behavior associated with the Campaign, attribution to the ThreatActors believed responsible for the Campaign, other Campaigns believed related to the Campaign, confidence in the assertion of aggregated intent and characterization of the Campaign, activity taken in response to the Campaign, source of the Campaign information, etc. Recognizing a lack of current standardized approaches, STIX leverages community knowledge and best practices to define a new STIX-Campaign structure for representing Campaign information. ThreatActors ThreatActors are characterizations of malicious actors (or adversaries) representing a cyber attack threat including presumed intent and historically observed behavior. In a structured sense, ThreatActors consist of a characterization of identity, suspected intent, historically observed TTP used by the ThreatActor, historical Campaigns believed associated with the ThreatActor, other ThreatActors believed associated with the ThreatActor, handling restrictions, confidence in the asserted characterization of the ThreatActor, record of all activity taken in regards to the ThreatActor, source of the ThreatActor information, etc. Recognizing a lack of current standardized approaches, STIX leverages community knowledge and best practices to define a new STIX-ThreatActor structure for representing ThreatActor information The MITRE Corporation. All rights reserved. 13
16 ExploitTargets ExploitTargets are vulnerabilities or weaknesses in software, systems, or configurations that are targeted for exploitation by the TTP of a ThreatActor. In a structured sense, ExploitTargets consist of vulnerability identifications or characterizations, weakness identifications or characterizations, configuration identifications or characterizations, potential Courses of Action, source of the ExploitTarget information, etc. Recognizing a lack of current standardized approaches for generalized characterizations, STIX leverages community knowledge and best practices to define a new STIX-ExploitTarget structure for representing ExploitTarget information. However, portions of the ExploitTarget structure leverage other existing standardized approaches for characterizing things like vulnerabilities, weaknesses, and configurations. The Common Vulnerabilities and Exposures (CVE ) and the Open Source Vulnerability Database (OSVDB) are utilized for identification of publicly disclosed vulnerabilities. The Common Vulnerability Reporting Framework (CVRF) format is utilized for structured characterization of vulnerabilities not identified in CVE or OSVDB including the potential for characterizing 0-day vulnerabilities. The Common Weakness Enumeration (CWE ) is utilized for identification of weaknesses. The Common Configuration Enumeration (CCE ) is utilized for identification of configuration issues. CoursesOfAction (COA) CoursesOfAction are specific measures to be taken to address threat whether they are corrective or preventative to address ExploitTargets, or responsive to counter or mitigate the potential impacts of Incidents. In a structured sense, COA consist of their relevant stage in cyber threat management (e.g., remedy of an ExploitTarget or response to an Incident), type of COA, description of COA, objective of the COA, structured representation of the COA (e.g., IPS rule or automated patch/remediation), the likely impact of the COA, the likely cost of the COA, the estimated efficacy of the COA, etc. Recognizing a lack of current standardized approaches for generalized characterizations, STIX leverages community knowledge and best practices to define a new STIX-COA structure for representing Courses of Action information. 14
17 Data Markings A consistent requirement across many of the core STIX constructs is the ability to represent markings of the data to specify things like handling restrictions given the potentially sensitive nature of many forms of cyber threat information. This construct is not conveyed as a separate entity in the STIX architecture diagram but exists as a crosscutting structure within several of the top-level constructs briefly described above. There currently exists no broad consensus standardized approach for such markings but rather various approaches within differing communities and driven by different motivations and usage contexts. Rather than adopting a single marking approach (e.g., Traffic Light Protocol (TLP) 3 ) and attempting to force everyone else to accept it, STIX has taken a flexible and generic approach. The Data Markings structure defined for STIX is flexible in two ways. First, instances are specified independent of the structures being tagged (pointing to their locations) rather than embedded everywhere which is typically less efficient and more difficult to update and refine. Second, it allows the definition and use of any data marking structure simply as an abstraction from a base type structure. This allows varying marking schemes to be leveraged and when combined with the independent specification described above it can also easily enable marking any given data structure with multiple different marking schemes for leveraging within different use cases or by different communities. The initial implementation of this Data Marking structure has been created utilizing XML Schema (XSD) and has the potential to be leveraged not only throughout an XML implementation of STIX but also for any other XMLbased structured representation. Implementations The initial implementation for STIX is utilizing XML Schema as a ubiquitous, portable and structured mechanism for detailed discussion, collaboration and refinement among the communities involved. It is primarily intended as a concrete strawman for ongoing collaborative development of a structured threat information expression language among a community of relevant experts. It is also targeted to provide an initial practical structure for early real-world prototyping and proof-of-concept implementations in structured threat information management and sharing. This sort of real-world usage of the language will be encouraged and supported through the development of various supporting utilities such as programmatic language bindings, representation translation transforms, APIs, etc. Only through appropriate levels of collaborative iteration among a relevant community of experts and vetted through real-world data and use cases can a practical and effective solution evolve. Once an initial stable structure for the language evolves it is planned to be abstracted into an implementation-independent specification. This will then enable other potential implementations to be derived including possibilities such as semantic web (RDF/OWL), JSON-centric, protobuf, etc
18 Usage Even in its early, developing stages STIX has garnered a good deal of interest from a broad range of organizations and communities facing the challenges of undertaking or supporting cyber threat intelligence and information sharing. Examples of organizations that have already chosen to begin leveraging STIX (or its constituent components) to convey cyber threat information include: The U.S. Department of Homeland Security (DHS) intends to leverage STIX in a number of critical areas including the Trusted Automated exchange of Indicator Information (TAXII) effort which will allow US-CERT and its partners in both government and the private sector to exchange data elements and relationships defined by STIX using secure automated mechanisms. Through the use of STIX, they seek to enable the rapid detection, prevention and mitigation of cyber threats and where possible, automate key elements of this process. Initial proof-of-concept efforts for TAXII are currently underway. US-CERT is working on integration of STIX as an enabler for its internal incident response and incident management processes. In Q2 2012, the Financial Services Information Sharing and Analysis Center (FS-ISAC) agreed to implement the STIX architecture (including CybOX and IndEX) for cyber threat information sharing amongst its constituent members in the financial services arena. The MITRE Corporation is currently in the process of integrating STIX and the underlying components into its cyber threat intelligence platform known as CRITs (Collaborative Research Into Threats) [16]. The Japanese IPA (Information-technology Promotion Agency, Japan) is currently undertaking an active feasibility study of applying elements of the STIX architecture (CybOX, MAEC, etc.) as an international exchange format for cyber observables and threat information. In addition, STIX (and its constituent components) is under active consideration for use among a variety of different U.S. and international public-public, public-private and private-private cyber threat information sharing communities and by several vendors supporting the domain. 16
19 Conclusion and Future Work There is an urgent need for new and more outward-looking collaborative approaches to cyber security defense. Cyber threat intelligence and cyber threat information sharing are on the leading edge of novel approaches with a high potential for shifting the balance of power between the attacker and the defender. A core requirement for maturing effective cyber threat intelligence and cyber threat information sharing is the availability of an openstandardized structured representation for cyber threat information. STIX is a community-driven effort to provide such a representation solution adhering to guiding principles to maximize expressivity, flexibility, extensibility, automatability, and readability. STIX provides expressive coverage of the full-spectrum of cyber threat information observables, indicators, incidents, TTP, exploit targets, courses of action, threat actors and campaigns to provide support for a broad set of cyber security defense use cases. Though relatively new and still evolving, STIX has already generated a great deal of interest from a wide range of stakeholders and communities, both public and private. Evidence so far indicates that STIX has a high potential to be a solution to the cyber threat information problem that is effective, practical, and acceptable to the community of practitioners and supporting entities. The STIX effort is planning on increasing levels of community involvement as it continues to gain awareness and initial real-world use. Community effort will be focused on evaluation and refinement of the schematic implementation of the language (eventually leading to the abstraction to an implementation-independent language specification), on continued prototyping and use, and on development of supporting utilities. In addition, effort will be applied for establishing supportive web sites and discussion forums, and the establishment of a branding and adoption program to facilitate and support the emerging ecosystem of products, services, and information sources that can be leveraged together to address cyber threat information sharing. All parties interested in becoming part of the collaborative community discussing, developing, refining, using and supporting STIX are welcome and invited to join the effort The MITRE Corporation. All rights reserved. 17
20 Acknowledgments MITRE s services as community coordinator of the STIX effort and editor of this paper are provided under the sponsorship of the U.S. Department of Homeland Security. While the summary work contained in this paper is based on the efforts, comments, and conversations on these topics by a large number of individuals from many organizations, special thanks is made for those individuals that took time to review and comment on the specific text in this document. A sampling of some of the organizations contributing to the STIX discussion includes: MITRE Corporation United States Computer Emergency Readiness Team (US-CERT) National Institute of Standards and Technology (NIST) Financial Services Information Sharing and Analysis Center (FS-ISAC) CERT Coordination Center (CERT/CC) Research and Engineering Networking Information Sharing and Analysis Center (REN-ISAC) Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) Department of Defense Cyber Crime Center (DC3) National Cyber Investigative Joint Task Force Analytical Group (NCIJTF-AG) Depository Trust & Clearing Corporation (DTCC) CrowdStrike, Inc. Mandiant CyberIQ LookingGlass isight Partners Red Sky Alliance Tripwire Verisign idefense Verizon Business Lockheed Martin General Dynamics USAA Booz Allen Hamilton Cyber2 Internet Identity StegoSystems G2, Inc. Punch Cyber Analytics Group NCI Security LLC SHARKSEER Program Public Regional Information Security Event Management (PRISEM) NATO World Bank UK Software Security, Dependability and Resilience Initiative (S S D R I) 18
21 References [1] Cyber Observable expression (CybOX). URL [2] Common Attack Pattern Enumeration and Classification (CAPEC). URL [3] Malware Attribute Enumeration and Characterization (MAEC). URL [4] Common Vulnerabilities and Exposures (CVE). URL [5] Common Weakness Enumeration (CWE). URL [6] Common Configuration Enumeration (CCE). URL [7] Common Platform Enumeration (CPE). URL [8] Incident Object Description & Exchange Format (IODEF). URL [9] Open Source Vulnerability Database (OSVDB). URL [10] Common Vulnerability Reporting Framework (CVRF). [11] E.M. Hutchins, M.J. Cloppert and R.M Amin PH.D., Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains, Proc. 6th Int l Conf. Information Warfare and Security (ICIW 11), Academic Conferences Ltd., 2010, pp ; URL LM-White-Paper-Intel-Driven-Defense.pdf [12] Luc Dandurand, Emmanuel Bouillon and Philippe Lagadec, High-level Requirements for a Cyber Defence Data Collaboration and Exchange Infrastructure, Reference Document 3175, NATO Consultation, Command and Control Agency, April [13] TAXII: The Trusted Automated exchange of Indicator Information, U.S. Department of Homeland Security [14] Cyber Information-Sharing Models: An Overview, MITRE Corporation, May [15] Active Defense Strategy for Cyber, MITRE Corporation, July [16] A New Cyber Defense Playbook, MITRE Corporation, July [17] [email protected], Oct June 2012 [18] Traffic Light Protocol (TLP). URL The MITRE Corporation. All rights reserved. 19
22
23
24 MITRE
Attackers are reusing attacks (because they work)
The Problem Attackers are reusing attacks (because they work) Defenders are collecting and/or sharing information, but Often a manual process (copy-paste from a PDF) Different sources provide different
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily
Eight Essential Elements for Effective Threat Intelligence Management May 2015
INTRODUCTION The most disruptive change to the IT security industry was ignited February 18, 2013 when a breach response company published the first research that pinned responsibility for Advanced Persistent
Common Attack Pattern Enumeration and Classification CAPEC A Community Knowledge Resource for Building Secure Software
Common Attack Pattern Enumeration and Classification CAPEC A Community Knowledge Resource for Building Secure Software CAPEC is a publicly available catalog of attack patterns along with a comprehensive
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
The Third Rail: New Stakeholders Tackle Security Threats and Solutions
SESSION ID: CXO-R03 The Third Rail: New Stakeholders Tackle Security Threats and Solutions Ted Ross Director, Threat Intelligence HP Security Research @tedross Agenda My brief background An example of
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
After the Attack. The Transformation of EMC Security Operations
After the Attack The Transformation of EMC Security Operations Thomas Wood Senior Systems Engineer, GSNA CISSP RSA, The Security Division of EMC [email protected] 1 Agenda Review 2011 Attack on RSA
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS
SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS Samir Saklikar RSA, The Security Division of EMC Session ID: CLE T05 Session Classification: Intermediate Agenda Advanced Targeted
Separating Signal from Noise: Taking Threat Intelligence to the Next Level
SESSION ID: SPO2-T09 Separating Signal from Noise: Taking Threat Intelligence to the Next Level Doron Shiloach X-Force Product Manager IBM @doronshiloach Agenda Threat Intelligence Overview Current Challenges
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.
18th Annual Space & Missile Defense Symposium IAMD Evolution and Integration/Key Topic: Predictive Cyber Threat Analysis Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015
Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Threat Intelligence Sharing in a Connected World
a Cohort plc company Threat Intelligence Sharing in a Connected World Mass Consultants Ltd November 2015 Prepared by: MASS Enterprise House Great North Road Little Paxton St Neots Cambridgeshire PE19 6BN
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT Rashmi Knowles RSA, The Security Division of EMC Session ID: Session Classification: SPO-W07 Intermediate APT1 maintained access to
idata Improving Defences Against Targeted Attack
idata Improving Defences Against Targeted Attack Summary JULY 2014 Disclaimer: Reference to any specific commercial product, process or service by trade name, trademark, manufacturer, or otherwise, does
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
Symantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape
WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
FROM INBOX TO ACTION EMAIL AND THREAT INTELLIGENCE:
WHITE PAPER EMAIL AND THREAT INTELLIGENCE: FROM INBOX TO ACTION There is danger in your email box. You know it, and so does everyone else. The term phishing is now part of our daily lexicon, and even if
Soltra edge open cyber intelligence platform report
Soltra edge open cyber intelligence platform report Prepared By: Alan Magar Sphyrna Security 340 Ridgeside Farm Drive Kanata, Ontario K2W 0A1 PWGSC Contract Number: W7714-08FE01/001/ST Task 33 CSA: Melanie
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
PENETRATION TESTING GUIDE. www.tbgsecurity.com 1
PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
After the Attack: RSA's Security Operations Transformed
After the Attack: RSA's Security Operations Transformed Ben Smith, CISSP RSA Field CTO (East), Security Portfolio Senior Member, ISSA Northern Virginia 1 The Environment ~ 2,000 security devices ~55M security
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats
Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
A New Approach to Assessing Advanced Threat Solutions
A New Approach to Assessing Advanced Threat Solutions December 4, 2014 A New Approach to Assessing Advanced Threat Solutions How Well Does Your Advanced Threat Solution Work? The cyber threats facing enterprises
Cyber Information-Sharing Models: An Overview
PARTNERSHIP Cyber Information-Sharing Models: An Overview October 2012. The MITRE Corporation. All rights reserved. Approved for Public Release. Case Number 11-4486. Distribution Unlimited. Table of Contents
Security Controls Implementation Plan
GIAC Enterprises Security Controls Implementation Plan Group Discussion and Written Project John Hally, Erik Couture 08/07/2011 Table of Contents Executive Summary 3 Introduction 3 Security Controls Implementation
US-CERT Year in Review. United States Computer Emergency Readiness Team
US-CERT Year in Review United States Computer Emergency Readiness Team CY 2012 US-CERT Year in Review United States Computer Emergency Readiness Team CY 2012 What s Inside Welcome 1 Vison, Mission, Goals
Post-Access Cyber Defense
Post-Access Cyber Defense Dr. Vipin Swarup Chief Scientist, Cyber Security The MITRE Corporation November 2015 Approved for Public Release; Distribution Unlimited. 15-3647. 2 Cyber Security Technical Center
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products
Threat Intelligence: The More You Know the Less Damage They Can Do Charles Kolodgy Research VP, Security Products IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 Agenda Evolving Threat Environment
Cyberspace Situational Awarness in National Security System
Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, [email protected], [email protected]
Comprehensive Advanced Threat Defense
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
Perspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations
Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations September 2015 Copyright 2015 Deloitte Development LLC. All rights reserved. This presentation
The Emergence of Security Business Intelligence: Risk
The Emergence of Security Business Intelligence: Risk Management through Deep Analytics & Automation Mike Curtis Vice President of Technology Strategy December, 2011 Introduction As an industry we are
Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity
Cyber threat intelligence and the lessons from law enforcement kpmg.com/cybersecurity Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many
The Path Ahead for Security Leaders
The Path Ahead for Security Leaders Executive Summary What You Will Learn If you asked security leaders five years ago what their primary focus was, you would likely get a resounding: securing our operations.
Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel
Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel @Ben_Smith Ben Smith, CISSP Field CTO (US East), Security Portfolio A Security Maturity Path CONTROLS COMPLIANCE IT RISK BUSINESS
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
Threat Intelligence: Friend of the Enterprise
SECURELY ENABLING BUSINESS Threat Intelligence: Friend of the Enterprise Danny Pickens Principal Intelligence Analyst MSS FishNet Security DANNY PICKENS Principal Intelligence Analyst, FishNet Security
Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec
Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
A Primer on Cyber Threat Intelligence
A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly
Anatomy of Cyber Threats, Vulnerabilities, and Attacks
Anatomy of Cyber Threats, Vulnerabilities, and Attacks ACTIONABLE THREAT INTELLIGENCE FROM ONTOLOGY-BASED ANALYTICS 1 Anatomy of Cyber Threats, Vulnerabilities, and Attacks Copyright 2015 Recorded Future,
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
I N T E L L I G E N C E A S S E S S M E N T
I N T E L L I G E N C E A S S E S S M E N T (U//FOUO) Malicious Cyber Actors Target US Universities and Colleges 16 January 2015 Office of Intelligence and Analysis IA-0090-15 (U) Warning: This document
Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security
Next-Generation Penetration Testing Benjamin Mossé, MD, Mossé Security About Me Managing Director of Mossé Security Creator of an Mossé Cyber Security Institute - in Melbourne +30,000 machines compromised
Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective
Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective Reaching the Cloud era in the EU Riga 16 June 2015 Jonathan Sage Government and Regulatory Affairs Cyber Security
Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC
WHITE PAPER Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC www.openioc.org OpenIOC 1 Table of Contents Introduction... 3 IOCs & OpenIOC... 4 IOC Functionality... 5
Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC
Threat Intelligence: An Essential Component of Cyber Incident Response Jeanie M Larson, CISSP-ISSMP, CISM, CRISC What are we going to cover? Setting the Stage Why is Incident Response Critical? Cyber Threat
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
An Enterprise Continuous Monitoring Technical Reference Architecture
An Enterprise Continuous Monitoring Technical Reference Architecture 12/14/2010 Presenter: Peter Mell Senior Computer Scientist National Institute of Standards and Technology http://twitter.com/petermmell
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
Threat Intelligence Buyer s Guide
Threat Intelligence Buyer s Guide SANS CTI Summit, 10 February 2014 Rick Holland @rickhholland Principal Analyst Last year 2014 Forrester Research, Inc. Reproduction Prohibited 2 This year, Arnold s back!!
CyberReady Solutions. Integrated Threat Intelligence and Cyber Operations MONTH DD, YYYY SEPTEMBER 8, 2014
CR CyberReady Solutions Actionable Insight for the Digital Enterprise Integrated Threat Intelligence and Cyber Operations MONTH DD, YYYY SEPTEMBER 8, 2014 INTELLIGENCE-DRIVEN OPERATIONS The Game Has Changed
Threat Intelligence Platforms: The New Essential Enterprise Software
Gitomer-1 Threat Intelligence Platforms: The New Essential Enterprise Software Due to the ever-increasing volume of cyber attacks and regulatory pressures, there is a need for a new type of enterprise
Practical Threat Intelligence. with Bromium LAVA
Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful
Cisco SAFE: A Security Reference Architecture
Cisco SAFE: A Security Reference Architecture The Changing Network and Security Landscape The past several years have seen tremendous changes in the network, both in the kinds of devices being deployed
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
The Business Justification for Cyber Threat Intelligence. How advanced intelligence improves security, operational efficiency and strategic planning
The Business Justification for Cyber Threat Intelligence How advanced intelligence improves security, operational efficiency and strategic planning What Executives Need to Know about Cyber Threat Intelligence
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
