Jon Friedman and Mark Bouchard, CISSP
Foreword by John P. Watters
Additional contributions by Jonathan Couch and Matt Hartley
Published by: CyberEdge Group, LLC, Annapolis, MD
Copyright: © 2015, CyberEdge Group, LLC
ISBN: 978-0-9961827-0-6 (paperback); 978-0-9961827-1-3 (eBook)
Leading Provider: Global cyber threat intelligence.
Key Offerings:
Deep analyses of adversaries and their tactics.
Rich threat context for security teams to counter advanced attacks.
Narrative reports and detailed threat data delivered through customer portal and API.
Research Team:
Distributed across 16 countries with local expertise.
Supported by 20+ technical data collection systems: sensors, honeypots, etc.
Customer Base: Includes top U.S. and global brands, government entities, and various industries.
Definition: Knowledge about adversaries and their motivations, intentions, and methods, aimed at protecting critical assets.
Importance: Nowadays, headlines focus on major cyber threats; therefore, understanding cyber threat intelligence is crucial for IT professionals.
Goal of the Guide: Address critical questions regarding cyber threat intelligence and offer structured guidelines for implementing programs.
Chapter 1: Defining Cyber Threat Intelligence
Reasons for necessity, key characteristics, and benefits.
Chapter 2: Developing Cyber Threat Intelligence Requirements
Importance of asset and adversary prioritization.
Chapter 3: Collecting Cyber Threat Information
Types of threat indicators and data collection methods.
Chapter 4: Analyzing and Disseminating Intelligence
Validation, prioritization, and dissemination methods.
Chapter 5: Utilizing Cyber Threat Intelligence
Applications at tactical, operational, and strategic levels.
Chapter 6: Implementing an Intelligence Program
Strategic roadmap and best practices for enhancement.
Chapter 7: Selecting Cyber Threat Intelligence Partners
Criteria and types of partners available.
TIP: Practical advice for application.
DON’T FORGET: Key information highlights.
CAUTION: Warnings for potential pitfalls.
TECH TALK: Technical content for IT practitioners.
ON THE WEB: URLs for additional resources.
The shift from mass attacks to targeted attacks necessitates advanced threat intelligence.
Adversary-based: Focuses on specific actors (criminals, state actors).
Risk-focused: Prioritizes risks to critical assets.
Process-oriented: Structured collection and analysis methods.
Diverse Consumer Tailoring: Information tailored for various consumers like SOC analysts and executives.
Improves situational awareness and prioritization of security efforts across levels.
Assets: Includes personal information, intellectual property, and credentials.
Risk Assessment: Assessing the impact of potential information loss and determining adversaries targeting these assets.
Cybercriminals, cyber espionage agents, and hacktivists each with distinct targets and methodologies.
Threat Indicators: Initial signs of compromise (e.g., file hashes, domain reputation).
Threat Data Feeds: Detailed correlation of indicators for patterns and trends.
Strategic Intelligence: Insights on motivations, intents, and methods from underground sources.
Combining internal data with external feeds and reports for a robust intelligence picture.
Key Steps: Validating and prioritizing data, ensuring relevance.
Customizing intelligence output to meet the needs of different stakeholders.
Enhances operational techniques across IT operations, incident response, and management communications.
Functionality: Helps prioritize actions, improve screening protocols, and assess threats.
Develop Strategic Roadmaps: Aligning intelligence activities with business risks.
Perform Gap Analysis: Identifying and mitigating vulnerabilities in defenses.
Create a Knowledge Base: Store and manage intelligence for correlation and historical data.
Providers of threat indicators, threat data feeds, and comprehensive intelligence.
Critical factors include global reach, the extent of service, and historical data management.
APT: Advanced Persistent Threat - an ongoing malicious threat targeting a specific entity.
IOC: Indicator of Compromise - artifacts indicating possible breaches.
PII: Personally Identifiable Information - information that identifies individuals.
TTPs: Tactics, Techniques, and Procedures used by adversaries for attacks.