Incorporating Cyber Threat Intelligence into Security Assessment Programs



Similar documents
VULNERABILITY MANAGEMENT AND RESEARCH PENETRATION TESTING OVERVIEW

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

Things To Do After You ve Been Hacked

Overview TECHIS Carry out security testing activities

Social-Engineering. Hacking a mature security program. Strategic Penetration Testing

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Cyber R &D Research Roundtable

Information Security Organizations trends are becoming increasingly reliant upon information technology in

Penetration Testing in Romania

Principle of Information Security. Asst. Prof. Kemathat Vibhatavanij Ph.D.

About Effective Penetration Testing Methodology

What Directors need to know about Cybersecurity?

Guide to Penetration Testing

Pentests more than just using the proper tools

MassMutual Cyber Security. University of Massachusetts Internship Opportunities Within Enterprise Information Risk Management

Metasploit The Elixir of Network Security

Hackers: Detection and Prevention

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Breakthrough Cyber Security Strategies. Introducing Honeywell Risk Manager

Cyber Adversary Characterization. Know thy enemy!

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Pentests more than just using the proper tools

Deloitte Cyber Risk Services Providing trust in a digital world

Penetration Testing Is A Bad Idea. Anton Aylward, CISSP, CISA System Integrity


Hacking (and securing) JBoss AS

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Paul Vlissidis Group Technical Director NCC Group plc

Goals. Understanding security testing

ESKISP Manage security testing

Measuring Software Security

GUIDE TO IMPROVING INFORMATION SECURITY IDENTIFYING WEAKNESSES & STRENGTHENING SECURITY

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Overview TECHIS Carry out risk assessment and management activities

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Hackers are here. Where are you?

Building the Next Generation of Computer Security Professionals. Chris Simpson

Combating a new generation of cybercriminal with in-depth security monitoring

FREQUENTLY ASKED QUESTIONS

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

Introduction to Penetration Testing Graham Weston

3 day Workshop on Cyber Security & Ethical Hacking

NETWORK PENETRATION TESTING

Ty Miller. Director, Threat Intelligence Pty Ltd

EC-Council. Certified Ethical Hacker. Program Brochure

Web Application security testing: who tests the test?

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

PENETRATION TESTING GUIDE. 1

TAKING SECURITY TESTING TO THE NEXT LEVEL 5 MAY 2014 STAN HEGT

National Initiative for Cybersecurity Education

Application Security Testing

Access FedVTE online at: fedvte.usalearning.gov

Data Analytics & Information Security

Train Like You Will Fight

FORBIDDEN - Ethical Hacking Workshop Duration

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

How to Justify Your Security Assessment Budget

Ethical Hacking & Cyber Security Workshop

External Scanning and Penetration Testing in PCI DSS 3.0. Gary Glover, Sr. Director of Security Assessments

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Anti-Gaming in the OnePipe Optimal Liquidity Network

The Vision of the OSSTMM

Unstructured Threat Intelligence Processing using NLP

Color Code Drug Doses L.A. County Kids

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats

Enterprise Computing Solutions

Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

Anatomy of Cyber Threats, Vulnerabilities, and Attacks

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Careers in Cyber Operations. Defence Signals Directorate

CBEST/STAR Threat Intelligence

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

OVERVIEW DEGREES & CERTIFICATES

FERPA: Data & Transport Security Best Practices

Transcription:

Incorporating Cyber Threat Intelligence into Security Assessment Programs

Security Assessment Team SATBLUE Identifying Vulnerabilities SATRed Simulating Threats Identifying what works and what needs working on with respect to preventing, detecting, and responding to cyber threats

Tumble, Twiddle, Spin & Roll the Black Hat Tumble Terminology: what s in a word? Twiddle Threats: vulnerable, moi? Spin CTI: how to use your intelligence? Roll Reports: show em the light! Doggy Bag - Um, I ll take those thoughts to go, please.

Tumble the Black Hat

Tumbling the Black Hat I don t think that word means what you think it means. The Buzzwords? RED: Simulating Threats Red Teaming, Pentesting Black Box, Grey Box, White Box, Purple Box, Pink Box Florescent Box (80s) Tie-dye Box (70s) Tandem Pentest Blind Pentest, Double-Blind Crystal Box Pentesting Ethical Hacking BLUE: Finding Vulnerabilities Blue Teaming Security Assessment Vulnerability Assessment Security Scan Security Testing What works. What needs working on.

Tumbling the Black Hat I don t think that word means what you think it means. Builders Vs Breakers Beyond the Security Auditor s Perspective System boundaries - well-defined, political, arbitrary Threats just look for vulnerabilities and exploit them Identify failures scripted, criteria open to interpretation Threats just look for vulnerabilities and exploit them Technical generalists they scan, heavily restricted Threats are diverse and they just look for vulnerabilities and exploit them Fancy graphs, bucket lists, detailed matrices about your state of risk Threats found vulnerabilities and exploited them

Twiddle the Black Hat

Twiddling the Black Hat Vulnerable, moi? Cyber Threat Intelligence Get to know the bad guys and gals Who are the threats? What are their motivations? What are their objectives? What tools & techniques do they use?

Twiddling the Black Hat Vulnerable, moi? Use your CTI collection Kung Fu to Get to know yourself 1 The big picture Business risks: financial, regulator, market Hacking at the speed of light 2 Technology & mission What is on your networks? A vulnerability, isn t a vulnerability, isn t a vulnerability

Spin the Black Hat

Spin the Black Hat Using your cyber threat intelligence Approaching Blue/Red Team Security Assessments From a threats perspective Priorities/Objectives Scope Duration Frequency Driven by what matters, Effective use of resources Driven by the threat perspective Not politics, personalities, or auditors Take the time it takes to do good work No scans, one day pentest Continuous blue/red assessments Once a year is not good enough

Spin the Black Hat Using your cyber threat intelligence Approaching Blue/Red Team Security Assessments From a threats perspective Test Points Information Rules of Engagement People Blue Everything / Red - Threats Use your access, be comprehensive Blue Everything / Red - Everything No politics, personalities, or p p auditors Realistic, use creativity Not too constraining to be useful Teams of security professionals Security professionals are not one size fits all

Roll the Black Hat

Roll the Black Hat Show em the light! A Few Ideas The REPORT is EVERYTHING Don t just hack around for the fun of it. It s irresponsible. Blue Team Reports Real world examples Language your customers understand Provide context impact to mission Red Team Reports It is not about you! Details - what did not work? Why? Identify real problems, provide real solutions Don t forget DETECTION and INCIDENT RESPONSE

Roll the Black Hat Show em the light! A Few Ideas The Many Ways to Disseminate Information Use your intelligence, use your results, and use your creativity Road show Tailored presentations techies, security, management Demo TTPs hacker series

The Doggy Bag

The Doggy Bag Some thoughts to take home 1. Assess from a threat perspective - Builders vs. Breakers 2. Continuously discover what works, does not work, and what needs working on 3. Assess prevention, detection, and response all three! 4. Understand the threats, understand your business, and provide real solutions to real problems 5. Influence vs. dictate change 6. Free your people let them be creative

The End