: Aaron Roberts
: Cyber Threat Intelligence The No-Nonsense Guide for CISOs and Security Managers
: Apress
: 9781484272206
: 1
: CHF 53.70
:
: Informatik
: English
: 221
: Wasserzeichen/DRM
: PC/MAC/eReader/Tablet
: PDF

Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization's resources. Adopting an intelligence-led approach enables your organization to nimbly react to situations as they develop. Security controls and responses can then be applied as soon as they become available, enabling prevention rather than response.

There are a lot of competing approaches and ways of working, but this book cuts through the confusion. Author Aaron Roberts introduces the best practices and methods for using CTI successfully. This book will help not only senior security professionals, but also those looking to break into the industry. You will learn the theories and mindset needed to be successful in CTI.

This book covers the cybersecurity wild west, the merits and limitations of structured intelligence data, and how using structured intelligence data can, and should, be the standard practice for any intelligence team. You will understand your organizations' risks, based on the industry and the adversaries you are most likely to face, the importance of open-source intelligence (OSINT) to any CTI practice, and discover the gaps that exist with your existing commercial solutions and where to plug those gaps, and much more.


What You Will Learn

  • K ow the wide range of cybersecurity products and the risks and pitfalls aligned with blindly working with a vendor
  • Understand critical intelligence concepts such as the intelligence cycle, setting intelligence requirements, the diamond model, and how to apply intelligence to existing security information
  • Understan structured intelligence (STIX) and why it's important, and aligning STIX to ATT&CK and how structured intelligence helps improve final intelligence reporting
  • Know how to approach CTI, depending on your budget
  • Prioritize areas when it comes to funding and the best approaches to incident response, requests for information, orad hoc reporting
  • Critically evaluate services received from your existing vendors, including what they do well, what they don't do well (or at all), how you can improve on this, the things you should consider moving in-house rather than outsourcing, and the benefits of finding and maintaining relationships with excellent vendors

Who This Book Is For    &n sp;    &n sp;    &n sp;    &n sp;    &n sp;    &n sp;    &n sp;    &n sp;    &n sp;    

Senior security leaders in charge of cybersecurity teams who are considering starting a threat intelligence team, those considering a career change into cyber threat intelligence (CTI) who want a better understanding of the main philosophies and ways of working in the industry, and  security professionals with no prior intelligence experience but have technical proficiency in other areas (e.g., programming, security architecture, or engineering)



Aaron Robertsis an intelligence professional specializing in Cyber Threat Intelligence (CTI) and Open-Source Intelligence (OSINT). He is focused on building intelligence-led cyber capabilities in large enterprises and conducting online investigations and research. He has worked within several the public and private sectors as well as the British Military. As such he understands how intelligence can and should be utilized within a range of environments and the fundamental approach that businesses must take to get the maximum value out of their cyber threat intelligence program.

Table of Contents5
About the Author11
Acknowledgments12
Introduction13
Chapter 1: The Cybersecurity Wild West21
Identifying the Wheat from the Chaff21
What Kinds of Vendors Are There?24
Where Do You Even Begin? Always Start with Intelligence Requirements26
What Sectors Is Your Business Operating In?27
What Systems and Services Do You Use and Want to Monitor for Threats?28
What Are the Threats You’re Worried About As a Business?29
What Other Security Vendors Do You Use?30
What Is Your Business Planning to Do in the Next X Years?31
Further Considerations for IRs32
What Do You Get for Your Money?33
Key Takeaways35
Chapter 2: Cyber Threat Intelligence – What Does It Even Mean?37
The Intelligence Cycle39
1. Planning and Direction39
2. Collection40
3. Processing and Exploitation41
4. Analysis41
5. Dissemination42
6. Feedback43
The Diamond Model44
Diamond Model – Adversary45
Diamond Model – Victim46
Diamond Model – Infrastructure47
Diamond Model – Capabilities/TTPs49
How Do We Apply Intelligence to Existing Security? The Cyber Kill-Chain and MITRE ATT49
5049
Human Behavior Doesn’t Change51
The IOC Is Dead. Long Live the IOC52
Security Products Are Evolving – So Should You53
The Cyber Kill-Chain54
Key Takeaways56
Chapter 3: Structured Intelligence – What Does It Even Mean?57
OpenIOC58
MITRE ATT58
5958
Using MITRE ATT58
6058
STIX – Why It’s Important64
Aligning STIX with ATT64
6764
Threat Actor70
Campaign71
Attack Pattern71
Malware73
Vulnerability74
Course of Action75
Victim75
Report76
Indicators77
The Remaining STIX 2.1 Objects78
Grouping79
Identity79
Infrastructure79
Location79
Malware Analysis79
Note80
Observed Data80
Opinion80
Tool80
Relationship81
Sighting81
What About the Kill-Chain?81
Key Takeaways83
Chapter 4: Determining What Your Business Needs85
Who Are Your Customers?87
Intelligence Reporting90
Tactical Intelligence90
Operational Intelligence91
Strategic Intelligence92
Other Types of Intelligence Reporting93
Awareness Reporting93
Executive/VIP Profile Reporting94
Spot/Flash Reporting94
Summary Reporting95
Intelligence Report Structure96
Key Points96
Summary97
Details97
Recommendations97
Appendices97
I Have Requirements! I Have Report Templates! Now What?98
Business Needs98
Automation – Can This Help?99
What If the Business Doesn’t Know What It Wants?101
Key Takeaways102
Chapter 5: How Do I Implement This? (Regardless of Budget)104
Threat Feeds105
News Reports/Blogs106
Social Media107
Data Breach Notifications109
Patch and Vulnerability Notifications110
Geopolitical Affairs111
Industry Events113
Personal Contacts114
Sharing Groups115
Requirements, Check. Basic Collection Sources, Check. Now, What?116
Prioritizing Areas for Funding118
Intelligence Analysts – How to Use Them119
Different Analysts for Different Things?120
Key Takeaways122
Chapter 6: Things to Consider When Implementing CTI123
Your Organization’s Footprint124
Big Game or Small Fry?124
Territories126
Digital Footprint127
The Risks Associated to Your Organization129
Risks Outside Your Control131
The Gaps Left Behind by Funding/Vendor/IT Black Holes133
Funding Gaps