Cyber Threat Intelligence Sharing: Lessons Learned, ObservaMons, RecommendaMons
|
|
|
- Herbert Ray
- 10 years ago
- Views:
Transcription
1 Cyber Threat Intelligence Sharing: Lessons Learned, ObservaMons, RecommendaMons Bob Gourley, Partner, Cognitio September 9, 2015 How we think.
2 Disclaimer There is a great deal of text on these slides. Don t try to read them now, I ll verbally summarize and will you a copy to read slowly later. 2 2 How we think.
3 About This Presentation Ø Cyber Threat Intelligence is informa:on on the adversary (capabili:es, inten:ons, ongoing ac:on) of use to enterprise defense. Ø Goal is to mi:gate risks by knowing your adversary, their intent and even their next move. Ø This session provides lessons in cyber threat intelligence from across government and industry in ways designed to help inform your approach to cyber threat intelligence 3 3 How we think.
4 Foreshadowing Ø There is cyber threat intelligence in both industry and government. If par:es on both sides could increase their sharing it would be good for collec:ve defense. Understanding the issues each face and some key percep:ons may help enhance this sharing. Ø There is info in government of value to enterprises, but when informa:on is provided it is usually provided too late or is not of value. Ø There are some cases where informa:on is shared to those with clearances and that has been called very valuable by some CISOs. Ø There is informa:on in industry that can help government bener defend itself and help government help industry. Ø A frequently overlooked challenge to info sharing is culture. 4 4 How we think.
5 Table of Contents Ø About This Presenta:on Ø Methodology Ø Observa:ons/Recommenda:ons for Industry Ø Observa:ons/Recommenda:ons for Government Ø Observa:ons/Recommenda:ons for Academia Ø Discussion 5 5 How we think.
6 Methodologies Know Cyber Intel Know the threat Know technology Know defensive concepts Know standards Know cultures of who is involved Know The Law and Gov Policy and Regulations Includes SOX, GLBA, SEC and FINRA guidance, HIPAA and many others (see business.usa.gov) Global privacy regulations Know What Info Is Available In Gov and Industry What might gov have that industry would want? What might industry have that gov might want? I discussed conclusions with many, but blame me for any faults here and let me know what you think. Draft Assessments and Lessons Learned Generate assessments, conclusions and recommendations Check assumptions by asking trusted CISOs with government and industry experience to review conclusions and comment Conclusions Seek to produce conclusions that can help people get things done Look for new insights vice just revamping old conclusions and assessments Keep iterating to ensure conclusions of value to real decision-makers This presenta:on was reviewed by over 150 security execu:ves in industry, government and academia. 6 6 How we think.
7 More On Our Bias and Background Ø TheCyberThreat.com Ø Lessons from history and current ops Ø Insights from companies under anack Ø Ways to Enhance Cyber Intelligence Support Ø Insaonline.org Ø Products resul:ng from government- industry partnership study of cyber intelligence issues Ø Best prac:ces and lessons learned from the IC Ø ThreatBrief.com Ø Free daily report on cyber threat actors and their strategic ac:ons and impact 7 7 How we think.
8 Security Officers/CISOs We Spoke With Ø We spoke with security execu:ves In several industries Ø Finance Ø Retail Ø Food and Beverage Ø Automo:ve Ø State/Local/Federal Government Note: we did not speak with and large DIB members on this, they may well have different views if they get classified info. Ø We asked the readership of ThreatBrief.com to provide inputs on lessons learned and observa:ons on the current state of cyber intelligence informa:on sharing Results Follow 8 8 How we think.
9 The Rise Of Cyber Intelligence Ø Legacy firms are enhancing their cyber intel prac:ces and offerings Ø New startups are anrac:ng significant investments Ø Data feeds of threat intelligence are growing and hard to track (see ThreatIntelligenceReview.com) Ø Most firms now leveraging managed security service providers in some capacity, providing new ways to make intel ac:onable. Ø Secure collabora:on spaces and managed service providers are very hot topics 9 9 How we think.
10 Now For The Meat Ø The slides that follow capture relevant lessons and recommenda:ons for Ø Industry Ø Government Ø Academia How we think.
11 Observations For Government Ø Many in industry see value in cyber threat intel from gov. But many others view it as not relevant. Many view sharing with government as a one way street. Ø Many big company security professionals have doubts that the situa:on will ever improve. Ø Some government info is helpful to industry, but there is nothing government had that could have prevented anacks on Sony, Home Depot, JP Morgan, Anthem etc Ø Many companies (especially mid- sized ones) find informa:on from law enforcement (FBI and Secret Service) useful. Ø The commercial trend towards managed security services is one to watch and leverage. Ø There are many legal and contractual reasons why industry cannot share some key cyber threat intel informa:on How we think.
12 Recommendations For Government Ø It may be sub- op:mal to spend too much energy to try to enhance info sharing, so focus on what is important (see comment below on speed). Share what you are best at, like standards, methods, models, experiences. And hold more events like this one. Ø Understand that info has a :me value. If sent too late it will have zero impact on defense. If you find ways to speed info release, that might help you help industry. Ø Understand that industry is prevented from sharing some cyber threat info due to law, regula:ons and contractual issues. Be empathe:c. Ø Consider how you can leverage commercial managed service providers and commercial threat intel feeds. This will enhance your cyber intelligence capabili:es. Ø When industry shares informa:on with government that must be well protected. Loss of data in a breach will hurt trust and hurt future informa:on sharing efforts. Ø Con:nue your support and encouragement for ISACs. Support ISACs for the good they do the na:on How we think.
13 Observations For Industry Ø The government is larger than you realize. No single agency, department or branch speaks for en:re government. Ø For many in industry best source of gov cyber threat intel is NCICC and their US CERT (us- cert.gov) Ø Greatest sources of ac:onable informa:on for business are groups like the ISACs, commercial cyber intelligence firms and managed security service providers. Informal Info sharing between industry is also important. Spend more :me on this than you spend seeking info from gov. Ø Cyber informa:on shared by the FBI and Secret Service can be helpful to small to mid- sized businesses. Ø There are risks to sharing info with government. If done wrong you can violate law, industry regula:ons and your contracts with others. There are also risks to your business that you need to mi:gate How we think.
14 Recommendations For Industry Ø Since you cannot expect any one office to speak for the en:re government on issues of informa:on sharing you need to know the facts about who you are working with and how they work with others. Ø If you had to pick just one organiza:on in government to share with, pick the US CERT. But it is also advisable to establish rela:onships with either the FBI or Secret Service. When you get breached you will wish you knew your local agents by first name. Ø Since there are risks to sharing informa:on with government, engage your CRO and GC in your informa:on sharing strategy. If they are not involved you may be puhng yourself in danger of viola:ng law, government regula:ons, or contracts, even if you are sharing with good inten:ons. You may also be puhng your firm at risk. Ø If you are not involved in your sector ISAC engage with them now. Also cri:cal to build trust- based rela:onships with your peers for informal sharing. Find the right managed services provider for your firm How we think.
15 For Academia Ø Observa:ons: Ø The na:on would benefit from more educa:on and training around cyber intelligence. Large companies need a workforce educated in cyber intelligence methodologies and trained in technologies that make up the modern enterprise. Government needs this too. Ø Work by INSA is a huge start in outlining what is needed for a cyber intelligence curriculum. Ø Recommenda:ons: Ø Cyber intelligence is a mul:- disciplinary ac:vity, and educa:on/training in that should be as well. Ø Engage with INSA to accelerate development of cyber intelligence curriculum development Ø This field gets technical quick. Ensure you are teaching details of policy, technology and informa:on sharing standards How we think.
16 Concluding Recommendation Knowing The Threat Will Help You Share Intelligence On The Threat and Will Help You Crak The Best Intelligence Sharing Programs, So, Never Stop Studying The Threat ThreatBrief.com Insaonline.org TheCyberThreat.com How we think.
17 Contact Us Bob Gourley On- line: ThreatBrief.com On- line: CTOVision.com Cogni&o Corp 1750 Tysons Blvd, Ste 1500 McLean, VA (703) How we think.
18 How we think.
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November
Achieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department November 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
Disrup've Innova'ons Track
Disrup've Innova'ons Track Product Disrup-ons: Medical Device Cybersecurity Presenter: Adam Brand, Associate Director, Pro-vi- V. 1.1 FACULTY DISCLOSURE The faculty reported the following financial relationships
Computer Security Incident Handling Detec6on and Analysis
Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION
Part 1 : STRATEGIC : But let s begin with WHY : Why are we doing this?
Part 1 : STRATEGIC : Why DO we care?? What is YOUR cri=cal message? And WHO do you need to reach? : I ll try and give you some pointers and ideas for where to look and how to figure that out for your cons=tuents
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So? Bruce Heiman K&L Gates September 10, 2015 [email protected] (202) 661-3935 Why share information? Prevention
HIPAA Breaches, Security Risk Analysis, and Audits
HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC What cons?tutes PHI? HIPAA provides a list of 18 iden?fiers that cons?tute PHI. Any one of these iden?fiers
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895
Pu?ng B2B Research to the Legal Test
With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the
White Paper: Leveraging Web Intelligence to Enhance Cyber Security
White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence
Reducing Cyber Risk in Your Organization
Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
Cyber Information-Sharing Models: An Overview
PARTNERSHIP Cyber Information-Sharing Models: An Overview October 2012. The MITRE Corporation. All rights reserved. Approved for Public Release. Case Number 11-4486. Distribution Unlimited. Table of Contents
Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the
Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS
Unifying Incident Response Teams Via Multi Lateral Cyber Exercise for Mitigating Cros Border Incidents: Malaysia CERT Case Study
Unifying Incident Response Teams Via Multi Lateral Cyber Exercise for Mitigating Cros Border Incidents: Malaysia CERT Case Study Sharifah Roziah Mohd Kassim MyCERT CyberSecurity Malaysia Agenda Introduction
Splunk and Big Data for Insider Threats
Copyright 2014 Splunk Inc. Splunk and Big Data for Insider Threats Mark Seward Sr. Director, Public Sector Company Company (NASDAQ: SPLK)! Founded 2004, first sohware release in 2006! HQ: San Francisco
How Do You Secure An Environment Without a Perimeter?
How Do You Secure An Environment Without a Perimeter? Using Emerging Technology Processes to Support InfoSec Efforts in an Agile Data Center PTC Briefing January 18, 2015 About the Presenters CHARLA GRIFFY-BROWN
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
CForum: A Community Driven Solution to Cybersecurity Challenges
SESSION ID: AST3-R01 CForum: A Community Driven Solution to Cybersecurity Challenges Tom Conkle Cybersecurity Engineer G2, Inc. @TomConkle Greg Witte Sr. Security Engineer G2, Inc. @thenetworkguy Organizations
Health Industry Implementation of the NIST Cybersecurity Framework
Health Industry Implementation of the NIST Cybersecurity Framework A Collaborative Presentation by HHS, NIST, HITRUST, Deloitte and Seattle Children s Hospital 1 Your presenters HHS Steve Curren, Acting
The Onslaught of Cyber Security Threats and What that Means to You
The Onslaught of Cyber Security Threats and What that Means to You No End in Sight for Cyber Crime Growth Number of mobile devices affected IBM Number of accounts hacked CNN Money Number of malware samples
Top 5 Ways to Improve Your Billing & Collec=ons
Top 5 Ways to Improve Your Billing & Collec=ons Presenters: Jillian Longpre Vice President Franco Rizzolo, DC CEO Brought to you by: Industry leading Educa1on Cer1fied Partner Program Please ask ques1ons
Keynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
Eight Essential Elements for Effective Threat Intelligence Management May 2015
INTRODUCTION The most disruptive change to the IT security industry was ignited February 18, 2013 when a breach response company published the first research that pinned responsibility for Advanced Persistent
State of New Hampshire Department of Safety Division of Homeland Security and Emergency Management
State of New Hampshire Department of Safety Division of Homeland Security and Emergency Management State of New Hampshire. Department of Safety. Division of Homeland Security and Emergency Management Historical
WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons
WSECU Cyber Security Journey David Luchtel VP IT Infrastructure & Opera:ons Objec:ve of Presenta:on Share WSECU s journey Overview of WSECU s Security Program approach Overview of WSECU s self- assessment
Adversary ROI: Why Spend $40B Developing It, When You Can Steal It for $1M?
Adversary ROI: Why Spend $40B Developing It, When You Can Steal It for $1M? Joshua Corman Akamai Technologies David Etue SafeNet Session ID: GRC-202 Session Classification: Intermediate About Joshua Corman
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
Privileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
Cyber Supply Chain Risk Management Portal
Cyber Supply Chain Risk Management Portal Dr. Sandor Boyson, Director, Supply Chain Management Center& Holly Mann, Chief InformaBon Officer R.H. Smith School Of Business The Cyber Supply Chain Challenge
WHY ANALYSE? BOB APOLLO
WHY ANALYSE? BOB APOLLO Analy-cs are the key that enables the VP of sales, sales opera-ons and front- end sales organiza-ons to move from a culture based only on gut feeling and percep-on- based decision
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael
Cyber Intelligence Workforce
Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives
SecureNinja. SecureNinja. The CyberSecurity Experts
Shakeel The Experts Chief Ninja (CEO) The Experts Washington DC The Experts Pentagon Force Protection Agency US Air Force SecureNinj a America Online JP Cigital General Morgan CompUSA Dynamics Fortify
U. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
Information Technology in the Automotive Aftermarket
Information Technology in the Automotive Aftermarket March 2015 AASA Thought Leadership: The following white paper consists of key takeaways from three AASA surveys conducted in 2014, which focused on
TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures
TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing
SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts
SAP Cybersecurity Solution Brief Objectives Solution Benefits Quick Facts Secure your SAP landscapes from cyber attack Identify and remove cyber risks in SAP landscapes Perform gap analysis against compliance
MISSION-ESSENTIAL INTELLIGENCE AND CYBER SOLUTIONS
Presentation to the Cyber Security & Critical Infrastructure Protection Symposium March 20, 2013 PREPARED REMARKS BARBARA ALEXANDER, DIRECTOR OF CYBER INTELLIGENCE TASC INFRASTRUCTURE PROTECTION AND SECURITY
Don t Get Left in the Dust: How to Evolve from CISO to CIRO
SESSION ID: CXO-W04 Don t Get Left in the Dust: How to Evolve from CISO to CIRO JC-JC James Christiansen VP Information Risk Management Accuvant [email protected] Bradley J. Schaufenbuel, CISSP
How To Manage Threat Intelligence On A Microsoft Microsoft Iphone Or Ipad Or Ipa Device
Product Brochure ThreatStream Optic ThreatStream Threat Intelligence Platform Imagine being able to make sense of all the threat information that s flowing through your security controls and coming from
Welcome. HITRUST 2014 Conference April 22, 2014 HITRUST. Health Information Trust Alliance
Welcome HITRUST 2014 Conference April 22, 2014 HITRUST Health Information Trust Alliance The Evolving Information Security Organization Challenges and Successes Jason Taule, Chief Security and Privacy
Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst
ESG Solution Showcase Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Information security practices are in the midst
Introduc)on to the Joint Money Laundering Intelligence Taskforce (JMLIT Toolkit)
Introduc)on to the Joint Money Laundering Intelligence Taskforce (JMLIT Toolkit) 1 Why launch the JMLIT? Ini$a$ve driven by UK banks and LEAs with full support of HM Government and Home Secretary. Project
Splunk Cloud as a SIEM for Cybersecurity CollaboraFon
Copyright 2015 Splunk Inc. Splunk Cloud as a SIEM for Cybersecurity CollaboraFon Timothy Lee CISO, City of Los Angeles Disclaimer During the course of this presentafon, we may make forward looking statements
U.S.UCAN and its role in Wisconsin
U.S.UCAN and its role in Wisconsin Mark Johnson Interim Execu=ve Director, U.S. UCAN May 8, 2012 1 6/6/12, 2011 U.S. UCAN February 2009: An inflec=on point From BroadbandUSA.gov: The American Reinvestment
IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance
IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance Mohan Natraj Content Collec(on & Archiving Informa(on Lifecycle Governance Enterprise Content Management 2011 IBM Corporation
We are pleased to offer the following program to Woodstock Area Educators:
DATE: Spring 2016 TO: RE: Woodstock Area Educators Upcoming Cohort Programs Presently, many teachers are enrolled in cohort graduate programs through partnerships between local regional offices of education,
Managing the Unpredictable Human Element of Cybersecurity
CONTINUOUS MONITORING Managing the Unpredictable Human Element of Cybersecurity A WHITE PAPER PRESENTED BY: May 2014 PREPARED BY MARKET CONNECTIONS, INC. 14555 AVION PARKWAY, SUITE 125 CHANTILLY, VA 20151
