Cyber Threat Intelligence is the practice of gathering intelligence information related to the threat landscape and threat operators. Governments will use CTI to gain insights and information on nation state actors, specific threats to national and economic security and to actively monitor and react to counter intelligence operatives. Corporate entities will utilize CTI to better understand the competitive landscape and to build strategies to prevent ex-filtration of critical IP and to defend against advanced persistent threats that may be coming from known industry competitors, active back market hacking groups, independent hackers seeking financial gain and organized crime operatives seeking to profit and exploit data and intelligence assets. Often times the ethical components of CTI will be debated by cyber and privacy professionals. Obviously, every country has different laws governing what is and is not acceptable and while laws serve to provide a roadmap for the white hats to follow and abide by, it is important to remember that the black hats do not abide by or have the moral compass of the white hat actors. Hence, CTI practices have a tendency to come under a higher level of ethical scrutiny because a number of the tactics employed in the space skirt a virtual tightrope of ethical opinion.
Developed by Lockheed Martin, the Cyber Kill Chain is one method commonly used in the execution of the CTI Agenda. It specifically outlines the 7 steps involved in a breach and gives insight to both attack methodologies and defense methodologies for Cyber Operatives to employ in their day-to-day work in the reduction of risk and prevention of breach. Below you will find a sample Cyber Threat Intelligence Plan that I developed as part of my CSOL Cyber Intelligence coursework. All references within the plan, including the client company are completely fictional.
Developed by Lockheed Martin, the Cyber Kill Chain is one method commonly used in the execution of the CTI Agenda. It specifically outlines the 7 steps involved in a breach and gives insight to both attack methodologies and defense methodologies for Cyber Operatives to employ in their day-to-day work in the reduction of risk and prevention of breach. Below you will find a sample Cyber Threat Intelligence Plan that I developed as part of my CSOL Cyber Intelligence coursework. All references within the plan, including the client company are completely fictional.
cyber_threat_intelligence_plan.pdf | |
File Size: | 737 kb |
File Type: |