Threat Intelligence
Gartner definition for threat intelligence
Information Gathering
Types of Cyber ​​Threat Intelligence
Summary of Four Categories of Threat Intelligence
Strategic Threat Intelligence
Data Expectations for Strategic Threat Intelligence
Tactical Threat Intelligence
Data Expectations for Tactical Threat Intelligence
Operational Threat Intelligence
Data Expectations for Operational Threat Intelligence
Technical Threat Intelligence
Data Expectations for Technical Threat Intelligence
Threat Intelligence Context
Threat Context
Collecting and Processing Intelligence
Processing Nontechnical Data
The process will work as follow:
Operational Data and Web Processing
Technical Processing
STIX
Technical Threat Intelligence Resources
Technical Threat Intelligence Resources
Actionable Intelligence
Security Tools and Threat Intelligence
Security Information and Event Management
Security Orchestration, Automation, and Response
Email Security
Cisco Email Security Appliance (ESA) use case
3.41M
Категория: ИнформатикаИнформатика

Threat Intelligence

1. Threat Intelligence

Threat
Intellige
nce

2. Gartner definition for threat intelligence

• Threat intelligence is evidence-based
knowledge, including context, mechanisms,
indicators, implications and actionable
advice, about an existing or emerging
menace or hazard to assets that can be
used to inform decisions regarding the
subject’s response to that menace or
hazard.

3.

4. Information Gathering

Informat
ion
Gatherin
g

5.

6. Types of Cyber ​​Threat Intelligence

Types of Cyber ​Threat Intelligence

7.

8. Summary of Four Categories of Threat Intelligence

Strategic
threat
intelligence
Tactical
threat
intelligence
Operational
threat
intelligence
Technical
threat
Nontechnical threat intelligence
that is heavily risk-based, used
by high-level decision makers
Provides details of threat actor
tactics, techniques, and
procedures (TTPs)
Reveals actionable information
about specific incoming attacks
Technical details about threat
indicators such as malicious IP

9. Strategic Threat Intelligence

Strategi
c Threat
Intellig
ence

10. Data Expectations for Strategic Threat Intelligence

Data
Expectat
ions for
Strategi
c Threat
Intellig
ence

11. Tactical Threat Intelligence

Tactical
Threat
Intellig
ence

12. Data Expectations for Tactical Threat Intelligence

Data
Expectat
ions for
Tactical
Threat
Intellig
ence

13. Operational Threat Intelligence

Operatio
nal
Threat
Intellig
ence

14. Data Expectations for Operational Threat Intelligence

Data
Expectat
ions for
Operatio
nal
Threat
Intellig
ence

15. Technical Threat Intelligence

Technica
l Threat
Intellig
ence

16. Data Expectations for Technical Threat Intelligence

Data
Expectat
ions for
Technica
l Threat
Intellig
ence

17. Threat Intelligence Context

Threat
Intellig
ence
Context

18. Threat Context

Threat
Contex
t

19. Collecting and Processing Intelligence

Collecting
and
Processing
Intelligenc
e

20. Processing Nontechnical Data

21. The process will work as follow:


The kickoff meeting for this project would lay out the
scope of the type of data that is needed for the CEO,
including where the datacenter could be created, what
type of systems could be used, and the type of data
that could be seen within the datacenter.
The analyst would first validate each of these items to
ensure that the analyst’s understanding of the request
is clear before research is performed.
While researching the requested items, the analyst will
collect a lot of data; however, only certain topics
would be useful to the C-level exec, while other
content would not help the C-level exec with upcoming
decisions about the datacenter.
The analyst would present a general review of the type
of data available and confirm which data resources are
valuable before proceeding with a draft.
Once the draft is complete, another checkpoint would
occur to ensure that all topics needed by the C-level
exec are being addressed.
A few more checkpoints might occur as the draft is
converted into a final report, allowing for adjustments
as the research and data are prepared for the C-level
exec. These checkpoints allow for continuous tuning to
the research and writing process, reducing the risk of
the analyst including too much noise or not capturing
what is required for the final report to be useful.

22. Operational Data and Web Processing

• Google Alerts is an
example of a free
tool that you can use
to receive alerts
when certain terms or
conversations are
taking place on
public forums. Other
examples include
BuzzBundle, Mention,
Talkwalker Alerts,
and Hootsuite.

23. Technical Processing

Technica
l
Processi
ng

24. STIX

25. Technical Threat Intelligence Resources

Technica
l Threat
Intellig
ence
Resource
s

26. Technical Threat Intelligence Resources

Technica
l Threat
Intellig
ence
Resource
s

27. Actionable Intelligence

Actionab
le
Intellig
ence

28. Security Tools and Threat Intelligence

Security
Tools
and
Threat
Intellig
ence

29. Security Information and Event Management

Security
Informati
on and
Event
Managemen
t

30. Security Orchestration, Automation, and Response

Security
Orchestrat
ion,
Automation
, and
Response

31. Email Security

32. Cisco Email Security Appliance (ESA) use case

Cisco
Email
Security
Applianc
e (ESA)
use case
English     Русский Правила