View
6
Download
0
Category
Preview:
Citation preview
The Evolution of Cyber Threats and
Cyber Threat Intelligence
Greg Rattray CEO, Delta Risk LLC
22 March 2013
3
Before the Dawn
Intercept
Orange Book
Espionage as a Constant
Cold War Know Adversaries Signals Intelligence
Cyber Threat Intelligence
Phreaking
Technology
Public Switched Telephone Network
Little in Private Sector
4
Light on the Horizon
Info War
Hunting Hackers
Speculation on National Security Impact
First Gulf War
Morris Worm
Computers at Risk
President’s Commission on Critical Infrastructure Protection Networked
Reliance Growing
Web
Technology
Cyber Threat Intelligence
5
Early Wake Up Calls
2000 E-Commerce Attacks
Solar Sunrise
EP-3 and Patriotic Hacking
JTF-CND and others
Moonlight Maze
Rise of E-commerce
Cyber Threat Intelligence
Technology
Slammer Nimda
Code Red
Attribution Difficult Rise of CERTs
6
The Dark Times 9/11
Afghanistan
Internet Underground
GWOT
Botnets
Byzantine Hades
Global Crossing
Exposures of Espionage
Supply Chain Risks
Little on Adversary Capabilities
\
Iraq
Internet Bubble Bursts Reliance Still Grows
Cyber Threat Intelligence
7
A Rude Awakening Advanced Persistent Threats
Ghost Net
Estonia Georgia
Night Dragon Control Systems on Internet
Rise of Private Teams – CERTs; Providers and Collaboratives
Korea
Technology
Cyber Threat Intelligence Start Real Focus
RBN Attribution Progress
8
Rising Fear
STUXNET
Shamoon
Flame
DDoS vs. Banks Mobility
Cloud Social Media
APT 1
Dire Estimates; Need Method
Technology
Cyber Threat Intelligence
Info Sharing
Improving Enterprise Defense
9
Castle Walls Eroded Enemy Inside Gates
Must Manage Risk > Know Your Attacker
Channel the Attacks
“If you know the enemy and know yourself you need not fear the results of a hundred battles”
10
What’s Going Well
• Tactical Knowledge and Attribution
• Information Sharing
• Private Sector Intelligence
• Push to Automation & Professionalization
11
What’s Missing
• Analysis of Operational Risk • Understanding Strategic Impact
• Estimative Analysis
12
What are the Challenges? •
Avoiding Militarization of Cyberspace
Cyber Risk Management
Growing Full Spectrum Geeks
Recommended