Threat Intelligence is Like Three Day Potty Training



Similar documents
Threat Intelligence Buyer s Guide

Report on CAP Cybersecurity November 5, 2015

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

THE EVOLUTION OF SIEM

The National Cybersecurity Workforce Framework Delaware Cyber Security Workshop September 29, 2015

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Click to edit Master title style

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

The PNC Financial Services Group, Inc. Business Continuity Program

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

FIVE PRACTICAL STEPS

How To Write A National Cybersecurity Act

Don t Get Left in the Dust: How to Evolve from CISO to CIRO

Cybersecurity The role of Internal Audit

Cybersecurity: What CFO s Need to Know


Cyber Security Operations Center (CSOC) for Critical Infrastructure Protection

Intelligence Driven Security

Succession Management/Planning Talent Management

After the Attack: RSA's Security Operations Transformed

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

Big Data: trends and governance

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

IT AUDIT WHO WE ARE. Current Trends and Top Risks of /9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Business Continuity for Cyber Threat

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

WHITE PAPER. Attack the Attacker HOW A MANAGED SECURITY SERVICE IMPROVES EFFICIENCY AND SAVES COST

Cybersecurity Awareness for Executives

Eight Essential Elements for Effective Threat Intelligence Management May 2015

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Workforce Planning & Analytics: Advancing Your Organization s Capability

Explore the Possibilities

The PNC Financial Services Group, Inc. Business Continuity Program

Obtaining Enterprise Cybersituational

The Future of the Advanced SOC

Defending Against Data Beaches: Internal Controls for Cybersecurity

Threat Intelligence Platforms: The New Essential Enterprise Software

Cybersecurity. Are you prepared?

Middle Class Economics: Cybersecurity Updated August 7, 2015

Talent Management: Benchmarks, Trends, & Best Practices

Talent Management Leadership in Professional Services Firms

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Information Technology Integration Putting IT to work in driving deal success

ETCIC Internships Open to Sophomores:

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Train Like You Will Fight

Big data, big opportunities. Your digital guide to people analytics.

Update On Smart Grid Cyber Security

Zak Khan Director, Advanced Cyber Defence

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

Defending against modern cyber threats

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Strengthening the Link Between Pay & Performance

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

PRIORITIZING CYBERSECURITY

Institutional Maturity Model: A tool to fill gaps in measuring development of procurement systems. Jeanmarie Meyer

Advanced Threats: The New World Order

Hit the Ground Running Modernizing Your Sales New Hire Onboarding. January 28, 2015

After the Attack. The Transformation of EMC Security Operations

Adversary ROI: Why Spend $40B Developing It, When You Can Steal It for $1M?

Supply Chain Talent: The Missing Link?

NIST Cybersecurity Framework & A Tale of Two Criticalities

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Cybersecurity: Mission integration to protect your assets

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

THE EVOLUTION OF CYBERSECURITY

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

Vendor Risk Management Financial Organizations

Top 5 reasons incident response is failing. kpmg.com

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

WRITTEN TESTIMONY OF

Cyber Intelligence Workforce

Accenture Cyber Security Transformation. October 2015

Security Operations. Key technologies for your Security Operations Center. Davide Veneziano - RSA Technology Consultant

SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS

BT Assure Rethink the Risk

The fast track to top skills and top jobs in cyber. Guaranteed.

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

ADVANCED KILL CHAIN DISRUPTION. Enabling deception networks

Transcription:

SESSION ID: CXO-T08R Threat Intelligence is Like Three Day Potty Training Rick Holland Principal Analyst Forrester Research @rickhholland

Potty training method that guarantees success so you can say goodbye to diapers permanently in 3 days or less! 2

We are 320 days into 3 day potty training. 3

Incentive program 4

Unexpected outcomes 5

Unexpected outcomes 6

3 day threat intelligence? 7

3 day threat intelligence? 8

Threat intelligence to the rescue 9

Agenda Threat intelligence to the rescue Threat intelligence maturity model People Process Technology Apply #3daythreatintel 10

Threat intelligence maturity model

We have a guide Intelligence lifecycle For more: US Army Field Manual 2-0 - Intelligence Joint Publication 2-0 - Joint Intelligence 12

Threat intelligence maturity 24-48 months 18-24 months 12-18 months <12 months 13

Perceived maturity 14

Actual maturity 15

People, Process and Technology 16

#3daythreatintel People

People 18

Example organizational structure 19

Finding a particular set of skills is difficult Technical skills + soft skills required. You must have a farm system to develop talent with the skills you need. Work with local universities Provide internships. Join advisory boards. 20

Mature organizations focus on critical thinking 21

Mature organizations focus on critical thinking Written by Daniel Kahneman. Kahneman reveals where we can and cannot trust our intuitions and how we can tap into the benefits of slow thinking. 22

Training 23

Real world training You fight like you train and you train like you fight. Team based training, not just individual. isight Partners & Symantec provide cyber ranges. 24

Sponsor events at intelligence/cyber epicenters 25

Retention is critical, your program can regress Maturity doesn t just evolve, it can devolve. You must be creative with retention strategies: Remote workers Training Career pathing Work with HR to create exceptions 26

#3daythreatintel Process

Process 28

Intel requirements are the foundation of your program Occurs during the Planning & Direction phase of the intel cycle Develop requirements based upon: Your threat model Understanding the success criteria for your business 29

Developing intelligence requirements 30

Example intelligence requirements Have Chinese threat actors targeted health insurance provider x? What is likelihood that Lizard Squad will seek to disrupt the online gaming services of vendor x? What is the risk of adversary targeting the intellectual property associated with a 2017 product launch? 31

Collection management 32

Why reinvent the wheel? 33

Actionable intelligence 34

Mature firms invest in relevant intelligence 35

Mature firms measure threat intelligence source effectiveness 36

Avoid Expense in Depth 37

#3daythreatintel Technology

Technology 39

Operationalizing threat intelligence 40

When actionable intelligence isn t integrated 41

Mature orgs integrate actionable intelligence 42

Threat intelligence market overview 43

Operationalizing threat intelligence This? 44

Operationalizing threat intelligence Or This? 45

Mature orgs rely upon Threat Intelligence Platforms You need a quarterback to orchestrate your intelligence work. You don t manage threat intel, you analyze and integrate it. 46

Threat Intelligence Platform functions Ingest threat intelligence and normalize it. Rate intelligence sources (over time.) Provide an analyst workspace. Provide visualization and pivoting. Provide enrichment. Enable internal and external collaboration/sharing. 47

Threat intelligence sharing Sharing alone does not a threat intel platform make. Sharing is a function of a threat intel platform. If you cannot take action on shared intel it has little value. 48

Speed of sharing We need to close the gap between sharing speed and attack speed. 75% of attacks spread from Victim 0 to Victim 1 within one day (24 hours). 49

STIX could be the answer STIX gained momentum in 2014, but still has a long way to go. Be on the look out for checkbox STIX. Ask vendors what specific use cases do they support. Join the conversation: https://stix.mitre.org/community/registr ation.html 50

Oversight 51

Prepare for the Bobs How effective were your investments? Avoid Expense in Depth with after action reviews. Measure and track: Time to detection, containment, remediation. If you cannot measure these items, invest in the situational awareness technology required to do so. 52

Mature firms produce strategic intelligence Produce your own customized version of the Verizon DBIR. Produce daily digest of top cybersecurity stories and their impacts. Use strategic intelligence products to improve the external perspective of security. 53

Summary There is no magic threat intelligence pixie dust. People, process and technology are all required for success. Threat intelligence is a long journey that ebbs and flows. 54

Apply what you have learned today Next week you should: Begin a gap analysis of your existing collection capabilities. Reach out to any commercial intelligence providers and have them explain why their intelligence products are aligned with your firm. Start building dossiers on all future incidents and intrusions. 55

Apply what you have learned today In the first three months following this presentation you should: Develop standing intelligence requirements. Reevaluate all your intelligence sources, are they accurate, integrated, relevant and timely? 56

Apply what you have learned today Within six months you should: Implement a strategy to recruit, train, and retain threat intelligence resources. Deliver one strategic intelligence product: Analyze your intrusions and the strategic implications for your organization. 57

The wrong choices can be costly VS 58

The wrong choices can be costly VS $250 / annually It adds up 59

Thank you! Rick Holland +1 469.221.5359 rholland@forrester.com @rickhholland #3daythreatintel 60