SlideShare une entreprise Scribd logo
1  sur  27
Télécharger pour lire hors ligne
OODA Loop for Life and CTI
(originally slated as “Not Your Grandma's CTI OODA Loop”
Dave Eilken - CactusCon 2017
Intro / Agenda
- About Me
- OODA in Detail
- Cyber Intelligence Processes
- A Different Perspective
Presentation Scope
➔ 30,000 ft. View
(Across Disciplines)
➔ Top of Mind
(Day-to-Day)
➔ Academic
(Deep Dive)
Mental Models
Multi-Disciplinary / Multi-Cultural - jack of
all trades master of none or renaissance man?
➔ Designer & Builder
Architect, Project Manager
➔ Old-China Hand
10 years over the span of 20 in Shanghai
➔ Technologist
Childhood hobby turned profession
➔ Arm-Chair Economist
Go-to-Market Business Strategist
The Original Revised OODA Loop
OODA
Observe
Through Sensory Inputs
Orient
Understand via Mental Models
Decide
Guess at Best Approach
Act
Test the Hypothesis
John Richard Boyd - distinguished fighter
pilot, developed military theories in the ‘60s
Observe Orient Decide Act
Unfolding
Circumstances
Outside
Information
Unfolding
Interaction With
Environment
Implicit
Guidance &
Control
Implicit Guidance
& Control
Feedback Loops
Unfolding
Interaction With
Environment
Simple OODA (maybe)
Your Sensory Inputs
We have five senses but we should be
open to other options that provide
additional context
CTI Note
Intelligence sources can
be both internal and
external.
Know what you’re
processing and limit
black box sources.
OBSERVE
ISACs & ISAOs
ISACs - Information Sharing and Analysis Centers.
Nonprofit organizations that act as a central
resource for gathering information on cyber threats
to critical infrastructure and providing two-way
sharing of information between the private and
public sector
ISAOs - Broader designation encompassing all
industries
➔ Build Trust
➔ Gather & Analyze
➔ Communicate
Understanding Us
How we understand the world based
on mental models
● Cultural Traditions
● Genetic Heritage
● Previous Experience
● Analysis & Synthesis
● New Information
CTI Note
Personal and procedural
biases can distort
orientation
ORIENT
Schwerpunkt Focus
Gödel - information is always incomplete
Heisenberg - the physical world is always uncertain
2nd Law of Thermodynamics - closed system entropy
You’ve got to have models in your
head and you’ve got to array your
experience - both vicarious and
direct - onto this latticework of
mental models.
- Charlie Munger
Mental Models
“All the wisdom of the world is not to be
found in one little academic department.”
“When we try to pick out anything by itself,
we find it hitched to everything else in the
universe.”
Build a Toolkit Across Disciplines
● Math & Logic
● Physics
● Thermodynamics
● Biology
● Psychology
● Anthropology
● Conflict (Game Theory)
● Engineering
● Economics
● Statistics
● History
Destroy & Create
Rebuild, Retire, Reposition
Skis, Bicycle, Motorboat, Tank
=
ABO
Always Be Orienting
Validate Mental Models
Practice, Practice, Practice until you have
Fingertip Feel
doubt, mistrust, confusion, disorder, fear, panic, and chaos
Tempo (be unpredictable)
● Fast alone is not good enough - changes in rhythm
put the opponent off balance. Sends them back to
square one.
● Great for 1 on 1 competition, not so good when
multiple parties / external partners are involved
Get inside your opponent's OODA Loop
What are your mental models for…?
Are you continually (re)orienting?
Hackivists
Political issue
agenda
Nation
States
IP, technology,
political, military
Cyber
Criminals
$$$ for PII, direct
attacks to financial
Insiders
Revenge, $$$ in
coordination with
criminals
Decide - Act ➤ Observe - Orient
Too Slow = More Risk
Choose the best mental model and go
with your best guess.
CTI Note
Analyzing intelligence
data can cause decision
paralysis.
DECIDE
Fingerspitzengefuhl
Fingertip Feel
Robert Greene - expands in book, Mastery
Decisions can be made instantaneously, moving from
Orientation to Action immediately
TRY AND SKIP DECIDE
Just Do It
Trust your mental models and put fear
of failure aside
CTI Note
Action is required to
reduce risk and
feedback from the
ongoing environmental
response is critical
ACT
Take Jabs
Make a lot of small quick
moves that test out ideas and
see what happens in response
- Position for the big blow
- Take baby-steps in the form of minimal viable
products / projects (MVPs) to optimize test -
response feedback
CTI Note
Balance small (less risky
initiatives with larger
(riskier ones)...but
remember there are
large projects that have
less risk
Traditional CTI Lifecycle
PHASE 1
Plan & Direction
PHASE 5
Dissemination & Integration
PHASE 2
Collect / Aggregate Sources
PHASE 4
Analysis & Production
PHASE 3
Process & Exploitation
Challenges
Mostly linear process, one-way external interface
➔ Relatively Slow
Intelligence must be vetted prior to action.
No velocity to repeat OODA loop.
➔ High Entropy
Limited external communication causes
stale information
➔ Disjointed Decision-Makers
CTI products delivered to SecOPS may
have additional rounds of review and
reorientation.
A New Approach
Information
Sharing (ISACs)
Continuous
Monitoring
PHASE 1
Collect / Aggregate Sources
(Automated)
PHASE 5
Remediate / Mitigate
PHASE 2
Correlate External Against Internal Data
(Automated Action)
PHASE 4
Triage Events
PHASE 3
Review Events
Advantages
Skip data analysis - Act to gain ability to Observe
➔ Much Faster Observations
Intelligence is utilized instantly to “see”
potential risks. Automation is highly leveraged
➔ Open & Integrated
Internal SecOPS & External Communities are
holistically intertwined
➔ Better Context
Internal & external monitoring and feedback
➔ Scaling Potential
Involves entire communities crowdsourcing
Orientation
Requirements
Although better for many, some will resist
➔ Openness & Trust
Sharing intelligence with a community.
Works best if everyone sees events on
everyone’s network in real-time
➔ Integrated Intelligence Team
CTI can’t operate outside of SOC.
(Isolated CTI has shown little value)
➔ Capabilities
Build automation and managed SOC or
buy a platform and outsource to MSSP
Sensors
Understand
Models Decide Act
Internal Data
Network, Logs,
Hosts, etc.
External
Intelligence
ISACs, ISAOs,
Professional &
OSINT Feeds
Unfolding
Interaction With
Environment
Implicit
Guidance &
Control
Implicit Guidance
& Control
Feedback Loops
Unfolding
Interaction With
Environment
CTI OODA
External / Internal Correlation ➤ Events Triage Remediate / Mitigate
Tools to See & Organize Algorithms, Human Mental Models Tools to Block, Rebuild, Etc.
Structured Threat Information Expression (STIX™) is a language
and serialization format used to exchange cyber threat
intelligence (CTI) - Graph based
● XML can still be used but JSON is mandatory
● SROs - Relationship & Sightings
Trusted Automated Exchange of Intelligence Information
(TAXII™) is an application layer protocol for the communication
of cyber threat information in a simple and scalable manner
● Works over HTTPS
● Collections & Channels
Note about STIX and TAXII 2.0
STIX Domain Objects (SDOs)
Attack Pattern
Campaign
Course of
Action
Identity
Indicator
Intrusion Set
Malware
Observed Data
Report
Threat Actor
Tool
Vulnerability
www.oasis-open.org/committees/cti/
www.us-cert.gov/ais
Lessons
● Traditional CTI Lifecycle is too slow and creates more risk
● Practice, test & revise mental models often
● Don’t allow fear to get in the way of action
David Eilken
eilken@gmail.com
“Don't be too timid and squeamish about your actions. All life is an
experiment. The more experiments you make the better.”
― Ralph Waldo Emerson

Contenu connexe

Tendances

Tendances (20)

Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
 
Incident response
Incident responseIncident response
Incident response
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 
INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTS
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
 
Incident Response
Incident Response Incident Response
Incident Response
 
Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
 
Zero Trust.pptx
Zero Trust.pptxZero Trust.pptx
Zero Trust.pptx
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
 
Red Team vs. Blue Team
Red Team vs. Blue TeamRed Team vs. Blue Team
Red Team vs. Blue Team
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 
Tatil Öncesi Güvenlik Kontrol Listesi.pdf
Tatil Öncesi Güvenlik Kontrol Listesi.pdfTatil Öncesi Güvenlik Kontrol Listesi.pdf
Tatil Öncesi Güvenlik Kontrol Listesi.pdf
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 

Similaire à CactusCon 2017 - OODA Loop in life & cyber threat intelligence

DL Classe 0 - You can do it
DL Classe 0 - You can do itDL Classe 0 - You can do it
DL Classe 0 - You can do it
Gregory Renard
 
Risks and strategies adopting agile in medium and large organizations
Risks and strategies adopting agile in medium and large organizationsRisks and strategies adopting agile in medium and large organizations
Risks and strategies adopting agile in medium and large organizations
Agile Software Community of India
 

Similaire à CactusCon 2017 - OODA Loop in life & cyber threat intelligence (20)

ALVIS for Innovation and Decision Making
ALVIS for Innovation and Decision MakingALVIS for Innovation and Decision Making
ALVIS for Innovation and Decision Making
 
Knowledge Era Paradigms -agile indiaconf2016
Knowledge Era Paradigms -agile indiaconf2016Knowledge Era Paradigms -agile indiaconf2016
Knowledge Era Paradigms -agile indiaconf2016
 
AI/ML as an empirical science
AI/ML as an empirical scienceAI/ML as an empirical science
AI/ML as an empirical science
 
Managing your tech career
Managing your tech careerManaging your tech career
Managing your tech career
 
Agile leadership practices for PIONEERS
 Agile leadership practices for PIONEERS Agile leadership practices for PIONEERS
Agile leadership practices for PIONEERS
 
Can We Do Agile? Barriers to Agile Adoption
Can We Do Agile? Barriers to Agile AdoptionCan We Do Agile? Barriers to Agile Adoption
Can We Do Agile? Barriers to Agile Adoption
 
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinMeet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
 
Start small, stay small!
Start small, stay small!Start small, stay small!
Start small, stay small!
 
From Human Intelligence to Machine Intelligence
From Human Intelligence to Machine IntelligenceFrom Human Intelligence to Machine Intelligence
From Human Intelligence to Machine Intelligence
 
Driving healthy habits through behavioral product design (short) pdf
Driving healthy habits through behavioral product design (short) pdfDriving healthy habits through behavioral product design (short) pdf
Driving healthy habits through behavioral product design (short) pdf
 
Behavioural Meetup: Stuart Church on Darwin to Design
Behavioural Meetup: Stuart Church on Darwin to DesignBehavioural Meetup: Stuart Church on Darwin to Design
Behavioural Meetup: Stuart Church on Darwin to Design
 
Human centered design and Social media
Human centered design and Social mediaHuman centered design and Social media
Human centered design and Social media
 
Deep Learning Class #0 - You Can Do It
Deep Learning Class #0 - You Can Do ItDeep Learning Class #0 - You Can Do It
Deep Learning Class #0 - You Can Do It
 
DL Classe 0 - You can do it
DL Classe 0 - You can do itDL Classe 0 - You can do it
DL Classe 0 - You can do it
 
Risks and strategies adopting agile in medium and large organizations
Risks and strategies adopting agile in medium and large organizationsRisks and strategies adopting agile in medium and large organizations
Risks and strategies adopting agile in medium and large organizations
 
Vishu's Presentati​on for ALN Knowldge Era Pradigms
Vishu's Presentati​on for ALN Knowldge Era PradigmsVishu's Presentati​on for ALN Knowldge Era Pradigms
Vishu's Presentati​on for ALN Knowldge Era Pradigms
 
An Introduction to Design Thinking - DevDay Conference Colombo
An Introduction to Design Thinking - DevDay Conference ColomboAn Introduction to Design Thinking - DevDay Conference Colombo
An Introduction to Design Thinking - DevDay Conference Colombo
 
Interaction design & quantified self
Interaction design & quantified selfInteraction design & quantified self
Interaction design & quantified self
 
The Importance of Logic in Business
The Importance of Logic in BusinessThe Importance of Logic in Business
The Importance of Logic in Business
 
Intro to Agile and Lean UX
Intro to Agile and Lean UXIntro to Agile and Lean UX
Intro to Agile and Lean UX
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

CactusCon 2017 - OODA Loop in life & cyber threat intelligence

  • 1. OODA Loop for Life and CTI (originally slated as “Not Your Grandma's CTI OODA Loop” Dave Eilken - CactusCon 2017
  • 2. Intro / Agenda - About Me - OODA in Detail - Cyber Intelligence Processes - A Different Perspective Presentation Scope ➔ 30,000 ft. View (Across Disciplines) ➔ Top of Mind (Day-to-Day) ➔ Academic (Deep Dive)
  • 3. Mental Models Multi-Disciplinary / Multi-Cultural - jack of all trades master of none or renaissance man? ➔ Designer & Builder Architect, Project Manager ➔ Old-China Hand 10 years over the span of 20 in Shanghai ➔ Technologist Childhood hobby turned profession ➔ Arm-Chair Economist Go-to-Market Business Strategist
  • 5. OODA Observe Through Sensory Inputs Orient Understand via Mental Models Decide Guess at Best Approach Act Test the Hypothesis John Richard Boyd - distinguished fighter pilot, developed military theories in the ‘60s
  • 6. Observe Orient Decide Act Unfolding Circumstances Outside Information Unfolding Interaction With Environment Implicit Guidance & Control Implicit Guidance & Control Feedback Loops Unfolding Interaction With Environment Simple OODA (maybe)
  • 7. Your Sensory Inputs We have five senses but we should be open to other options that provide additional context CTI Note Intelligence sources can be both internal and external. Know what you’re processing and limit black box sources. OBSERVE
  • 8. ISACs & ISAOs ISACs - Information Sharing and Analysis Centers. Nonprofit organizations that act as a central resource for gathering information on cyber threats to critical infrastructure and providing two-way sharing of information between the private and public sector ISAOs - Broader designation encompassing all industries ➔ Build Trust ➔ Gather & Analyze ➔ Communicate
  • 9. Understanding Us How we understand the world based on mental models ● Cultural Traditions ● Genetic Heritage ● Previous Experience ● Analysis & Synthesis ● New Information CTI Note Personal and procedural biases can distort orientation ORIENT
  • 10. Schwerpunkt Focus Gödel - information is always incomplete Heisenberg - the physical world is always uncertain 2nd Law of Thermodynamics - closed system entropy
  • 11. You’ve got to have models in your head and you’ve got to array your experience - both vicarious and direct - onto this latticework of mental models. - Charlie Munger
  • 12. Mental Models “All the wisdom of the world is not to be found in one little academic department.” “When we try to pick out anything by itself, we find it hitched to everything else in the universe.” Build a Toolkit Across Disciplines ● Math & Logic ● Physics ● Thermodynamics ● Biology ● Psychology ● Anthropology ● Conflict (Game Theory) ● Engineering ● Economics ● Statistics ● History
  • 13. Destroy & Create Rebuild, Retire, Reposition Skis, Bicycle, Motorboat, Tank = ABO Always Be Orienting Validate Mental Models Practice, Practice, Practice until you have Fingertip Feel
  • 14. doubt, mistrust, confusion, disorder, fear, panic, and chaos Tempo (be unpredictable) ● Fast alone is not good enough - changes in rhythm put the opponent off balance. Sends them back to square one. ● Great for 1 on 1 competition, not so good when multiple parties / external partners are involved Get inside your opponent's OODA Loop
  • 15. What are your mental models for…? Are you continually (re)orienting? Hackivists Political issue agenda Nation States IP, technology, political, military Cyber Criminals $$$ for PII, direct attacks to financial Insiders Revenge, $$$ in coordination with criminals Decide - Act ➤ Observe - Orient
  • 16. Too Slow = More Risk Choose the best mental model and go with your best guess. CTI Note Analyzing intelligence data can cause decision paralysis. DECIDE
  • 17. Fingerspitzengefuhl Fingertip Feel Robert Greene - expands in book, Mastery Decisions can be made instantaneously, moving from Orientation to Action immediately TRY AND SKIP DECIDE
  • 18. Just Do It Trust your mental models and put fear of failure aside CTI Note Action is required to reduce risk and feedback from the ongoing environmental response is critical ACT
  • 19. Take Jabs Make a lot of small quick moves that test out ideas and see what happens in response - Position for the big blow - Take baby-steps in the form of minimal viable products / projects (MVPs) to optimize test - response feedback CTI Note Balance small (less risky initiatives with larger (riskier ones)...but remember there are large projects that have less risk
  • 20. Traditional CTI Lifecycle PHASE 1 Plan & Direction PHASE 5 Dissemination & Integration PHASE 2 Collect / Aggregate Sources PHASE 4 Analysis & Production PHASE 3 Process & Exploitation
  • 21. Challenges Mostly linear process, one-way external interface ➔ Relatively Slow Intelligence must be vetted prior to action. No velocity to repeat OODA loop. ➔ High Entropy Limited external communication causes stale information ➔ Disjointed Decision-Makers CTI products delivered to SecOPS may have additional rounds of review and reorientation.
  • 22. A New Approach Information Sharing (ISACs) Continuous Monitoring PHASE 1 Collect / Aggregate Sources (Automated) PHASE 5 Remediate / Mitigate PHASE 2 Correlate External Against Internal Data (Automated Action) PHASE 4 Triage Events PHASE 3 Review Events
  • 23. Advantages Skip data analysis - Act to gain ability to Observe ➔ Much Faster Observations Intelligence is utilized instantly to “see” potential risks. Automation is highly leveraged ➔ Open & Integrated Internal SecOPS & External Communities are holistically intertwined ➔ Better Context Internal & external monitoring and feedback ➔ Scaling Potential Involves entire communities crowdsourcing Orientation
  • 24. Requirements Although better for many, some will resist ➔ Openness & Trust Sharing intelligence with a community. Works best if everyone sees events on everyone’s network in real-time ➔ Integrated Intelligence Team CTI can’t operate outside of SOC. (Isolated CTI has shown little value) ➔ Capabilities Build automation and managed SOC or buy a platform and outsource to MSSP
  • 25. Sensors Understand Models Decide Act Internal Data Network, Logs, Hosts, etc. External Intelligence ISACs, ISAOs, Professional & OSINT Feeds Unfolding Interaction With Environment Implicit Guidance & Control Implicit Guidance & Control Feedback Loops Unfolding Interaction With Environment CTI OODA External / Internal Correlation ➤ Events Triage Remediate / Mitigate Tools to See & Organize Algorithms, Human Mental Models Tools to Block, Rebuild, Etc.
  • 26. Structured Threat Information Expression (STIX™) is a language and serialization format used to exchange cyber threat intelligence (CTI) - Graph based ● XML can still be used but JSON is mandatory ● SROs - Relationship & Sightings Trusted Automated Exchange of Intelligence Information (TAXII™) is an application layer protocol for the communication of cyber threat information in a simple and scalable manner ● Works over HTTPS ● Collections & Channels Note about STIX and TAXII 2.0 STIX Domain Objects (SDOs) Attack Pattern Campaign Course of Action Identity Indicator Intrusion Set Malware Observed Data Report Threat Actor Tool Vulnerability www.oasis-open.org/committees/cti/ www.us-cert.gov/ais
  • 27. Lessons ● Traditional CTI Lifecycle is too slow and creates more risk ● Practice, test & revise mental models often ● Don’t allow fear to get in the way of action David Eilken eilken@gmail.com “Don't be too timid and squeamish about your actions. All life is an experiment. The more experiments you make the better.” ― Ralph Waldo Emerson