Chapter 2 - Using Threat Intelligence
Chapter 2 - Using Threat Intelligence
StrategicIntelligence
Strategic intelligence - provides broad information about threats and threat
actors allowing organizations to understand and respond to trends
Operational
Operational threat
Threat Intelligence - highly detailed information allowing response to
intelligence
a specific threat
Tactical threat intelligence
• Open-source intelligence
• Acquired from publicly available resources
• Need to find reliable and up-to-date ones
https://talosintelligence.com/
https://us-cert.gov/ncas/alerts
Canada also has their hands in it
Relevant
Assessing Threat Intelligence
Relevant
Assessing Threat Intelligence
Relevant
Threat Agent Indicator and Management
Threat Data
Analysis
The Intelligence Cycle
Threat
Threat Data
Intelligence
Collection
Dissemination
Threat Data
Analysis
The Intelligence Cycle
• Intelligence Dissemination
• In the dissemination phase of the intelligence cycle,
data is distributed to leadership and operational
Gathering Requirements personnel who will use the data as part of their
Feedback Gathering
security operations role.
Threat
Threat Data
Intelligence
Collection
Dissemination
Threat Data
Analysis
The Intelligence Cycle
• Gathering Feedback
• Gather feedback about the reports and data you
have collected
Gathering
Feedback
Requirements
Gathering
• Continuous improvement is critical in the process,
and it should be used to create better requirements
and overall output of your threat intelligence
Threat
program
Threat Data
Intelligence
Collection
Dissemination
Threat Data
Analysis
Threat Classification
Threat Actors
4 Common
Threat Actors
Repudiation
Information disclosure
Denial of Service
Elevation of Privilege
Threat Research and Modeling
Improve Integrated
Detection Intelligence
PROACTIVE THREAT HUNTING
Improve Integrated
Detection Intelligence
PROACTIVE THREAT HUNTING
Improve Integrated
Detection Intelligence
PROACTIVE THREAT HUNTING
Improve Integrated
Detection Intelligence
PROACTIVE THREAT HUNTING
Improve Integrated
Detection Intelligence
PROACTIVE THREAT HUNTING
Improve Integrated
Detection Intelligence
PROACTIVE THREAT HUNTING
Improve Integrated
Detection Intelligence
PROACTIVE THREAT HUNTING
Improve Integrated
Detection Intelligence
VIDEO: HACKING WITH THE CYBER KILL CHAIN