Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson...

91
Emerson Confidential 1 Emerson Confidential 1 Operationalizing Threat Intelligence David Foose Emerson August 27, 2018

Transcript of Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson...

Page 1: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 1Emerson Confidential 1

Operationalizing Threat

Intelligence

David Foose

Emerson

August 27, 2018

Page 2: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

22

Who Am I

• Ovation Security Solutions Program Manager

• Old Novell/Notes Admin

[email protected]

• @DaveFoose

• www.linkedin.com/in/davidfoose

DHS Alert (TA18-074A)https://www.us-cert.gov/ncas/alerts/TA18-074A

Page 3: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

33

What is Threat Intelligence?

• Threat Intelligence is data collected, organized, analyzed and refined about potential or current attacks:

– Indicators of Compromise

– Tradecraft

– (possible)Attribution

• Helps users understand the risks of the most common and severe threats

Page 4: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

44

Common Terms

• Information Sharing and Analysis Centers (ISAC)

• Indicators of Compromise (IOC)

• Tradecraft or Tactics Techniques and Procedures (TTPs)

• Remote Access Tool (RAT)

• Open Source Intelligence (OSint)

• Command and Control (C2 or C&C)

• Advanced Persistent Threat (APT)

• Attribution/False Flags

Page 5: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

55

Attribution Explains Motivation

• Attribution is hard

• Skiddies

• Nation State

• Crimeware

• Hacktivists

Page 6: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

66

Traffic Light Protocol

• Limited Disclosure

• Restricted to peers, community, and sector

• Not for disclosure

• Direct participants only

• Exchanged verbally or in person

• Limited disclosure

• Restricted to “Need to Know” Organizational members or direct partners

• No disclosure limitations

• Subject to standard copyright rules

Page 7: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

77

A Rose By Any Other Name…

Page 8: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

88

Sources of Threat Intelligence

Industry GroupsCERT

Government

Vendor Informal or

Self-Gather

Page 9: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

99

Ovation Cyber Emergency Response Team (Ovation-CERT)

Contact Us with Your Concerns

[email protected]

1-800-445-9723, Option 3

Ovation-CERT Alerts

Ovation Users’ Group Website

https://www.ovationusers.com

Advisories & Security Patches

Ovation Cybersecurity Alerts

• Monitors news media, industry resources and your inquiries for cyber threats and publicized vulnerabilities

• Evaluates impact to the Ovation product line

• Responds with information and mitigation actions to keep your systems secure

• Notifies end-users via Ovation-CERT alerts to keep you informed

Page 10: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

1010

Common Elements to Threat Intel

File Attributes Network Special

• Names

• Locations

• Known hashes

• URL/Web Addresses

• IPs

• YARA Sigs

• Known Exploits

• Unique TTPs

Page 11: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

1111

Example of Threat Intel – Vendor Document

Noted Features

Reporting Party

Explanation of Problem

Custom Mitigations

https://www.welivesecurity.com/wp-content/uploads/2017/06/Win32_Industroyer.pdf

Page 12: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

1212

Example of Threat Intel – Research Document

Noted Features

Deep Examination of the threat

Code Review

Stepping analysis of payload & capability

https://dragos.com/blog/crashoverride/CrashOverride-01.pdf

Page 13: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

1313

Example of Threat Intel – CERT Alert

Noted Features

Reporting Party

Explanation of Problem

High Level Mitigations

Reference Links

IOCs/YARA (sometimes)

https://ics-cert.us-cert.gov/alerts

Page 14: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

1414

Good Morning, Defender

What Are My Actions?

Find/Verify the report

Is This New?

Immediate Response to C-level

Leverage Relationships

Find Technical Source

Defend/Hunt

Follow up

Page 15: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

1515

Walk Through of Alert (TA18-074A)

DHS Alert (TA18-074A)https://www.us-cert.gov/ncas/alerts/TA18-074A

Page 16: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

1616

Walk Through of Alert (TA18-074A) – TLDR Evaluation

Page 17: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

1717

Walk Through of Alert (TA18-074A) – Defense Information

Page 18: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

1818

Walk Through of Alert (TA18-074A) – Defense Information

Page 19: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

1919

Grizzly Steppe/Burlington Electric

Page 20: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

2020

Grizzly Steppe/Burlington Electric

Page 21: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

2121

What can I do?

• Get an Asset List

• Find/Acquire Access

• Gap Analysis

• Hire the Right People

Page 22: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

2222

Emerson Confidential

Page 23: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 23Emerson Confidential 23

Emerson Corporate Template

Version 7.16

Page 24: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 24Emerson Confidential 24

Please Do Not Modify/Change the Layouts

• For the sake of consistency and to maintain our company’s profession image, please DO NOT modify the existing layouts.

• The template has been carefully and thoughtfully designed according to the latest brand and image standards, and tested thoroughly.

• The comprehensive layouts and color palette contain numerous options to make your presentations look professional.

• Any layout changes must be approved my Emerson Corporate

• Version 7.16 fixes a bug with footers an page numbers

Page 25: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 25Emerson Confidential 25

Three Ways to Apply A Slide Layout

This template is a large variety of slide layouts and there are three ways you can apply them.

1. Select Layout - arrow, under the home tab, to select and insert any layout.

2. Select New Slide - arrow, under the Home tab, to select and insert any layout.

3. Right-click anywhere on the slide, select Layout, to view and select any layout.

Page 26: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 26Emerson Confidential 26

Condensing Your Slide Master

If you prefer using just a few of the most popular of the slides/layouts

1. Download a “Condensed Version” with 10 commonly used basic layouts on Global Marketing Portal

2. Create your own slide master by removing the layouts that you don't regularly use

a. Select the View tab, in the Master Views group, click Slide Master.

– Open Slide Master view, a blank slide master with the default associated layouts appears.

– NOTE: In the slide thumbnail pane, the slide master is the larger slide image at the top, and the associated layouts are positioned beneath the slide master and indented to the right.

b. To remove any of the built-in slide layouts from the default deck

– In the slide thumbnail pane, right-click each slide layout that you want to delete.

– click Delete Layout on the shortcut menu.

– NOTE: You can only delete layouts from the master if the slide is NOT being used in the deck. You must delete the slide from the deck first before you can delete in the master view.

d. On the Slide Master tab, in the Close group, click Close Master View.

Page 27: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Text Slide Options

Page 28: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 28Emerson Confidential 28

Agenda Sample

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Page 29: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 29Emerson Confidential 29

One Column with No Tombstone

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

– Body text is RGB: 63/64/64, the second color in the color theme order

– Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Best practice: No more than 6-9 bullets

Page 30: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 30Emerson Confidential 30

One Column with No Tombstone and No Logo

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

– Body text is RGB: 63/64/64, the second color in the color theme order

– Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Best practice: No more than 6-9 bullets

Page 31: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 31Emerson Confidential 31Emerson Confidential 31Emerson Confidential 31

One Column with One Line External Tombstone

• The blue tombstone layout options should be used for all external, customer-facing presentations and can be used for internal presentations, other than for planning conferences where yellow is the preferred option

– Body text is RGB: 63/64/64, the second color in the color theme order

– Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

One Line, EXTERNAL Blue Tombstone

Page 32: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 32Emerson Confidential 32Emerson Confidential 32Emerson Confidential 32

One Column with Two Line External Tombstone

• The blue tombstone layout options should be used for all external, customer-facing presentations and can be used for internal presentations, other than for planning conferences where yellow is the preferred option

– Body text is RGB: 63/64/64, the second color in the color theme order

– Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

Two Line, EXTERNAL Blue Tombstone

Text is 24pt, Bold and Title Case

Page 33: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 33Emerson Confidential 33Emerson Confidential 33Emerson Confidential 33

One Column with Three Line External Tombstone

• The blue tombstone layout options should be used for all external, customer-facing presentations and can be used for internal presentations, other than for planning conferences where yellow is the preferred option

– Body text is RGB: 63/64/64, the second color in the color theme order

– Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

Three Line, EXTERNAL Blue Tombstone

Text is 24pt, Bold and Title Case

Three Line Key Takeaway

Page 34: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 34Emerson Confidential 34Emerson Confidential 34Emerson Confidential 34

One Column with One Line Internal Tombstone

One Line, INTERNAL ONLY Yellow Tombstone

• The yellow tombstone layout options are for internal presentations and specifically for planning conferences, as this is the standard that Emerson corporate uses

– Body text is RGB: 63/64/64, the second color in the color theme order

– Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

Page 35: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 35Emerson Confidential 35Emerson Confidential 35Emerson Confidential 35

One Column with Two Line Internal Tombstone

Two Line, INTERNAL ONLY Yellow Tombstone

Text is 24pt, Bold and Title Case

• The yellow tombstone layout options are for internal presentations and specifically for planning conferences, as this is the standard that Emerson corporate uses

– Body text is RGB: 63/64/64, the second color in the color theme order

– Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

Page 36: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 36Emerson Confidential 36Emerson Confidential 36Emerson Confidential 36

One Column with Three Line Internal Tombstone

• The yellow tombstone layout options are for internal presentations and specifically for planning conferences, as this is the standard that Emerson corporate uses

– Body text is RGB: 63/64/64, the second color in the color theme order

– Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

Three Line, INTERNAL ONLY Yellow Tombstone

Text is 24pt, Bold and Title Case

Three Line Key Takeaway

Page 37: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 37Emerson Confidential 37

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

Two Column Slide with No Tombstone

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

Page 38: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 38Emerson Confidential 38

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

Two Column Slide with No Tombstone and No Logo

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

Page 39: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 39Emerson Confidential 39

Two Column Slide with Heading and No Tombstone

Insert Heading Insert Heading

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

Page 40: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 40Emerson Confidential 40

Two Column Slide with Heading and No Tombstone and No Logo

Insert Heading Insert Heading

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

Page 41: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 41Emerson Confidential 41Emerson Confidential 41Emerson Confidential 41

Two Column Slide with Heading and One Line External Tombstone

One Line, EXTERNAL Blue Tombstone for Key Message

Insert Heading Insert Heading

The blue tombstone layout options should be used for all external, customer-facing presentations and can be used for internal presentations, other than for planning conferences where yellow is the preferred option.

The blue tombstone layout options should be used for all external, customer-facing presentations and can be used for internal presentations, other than for planning conferences where yellow is the preferred option.

Page 42: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 42Emerson Confidential 42Emerson Confidential 42Emerson Confidential 42

Two Column Slide with Heading and Two Line External Tombstone

Two Line, EXTERNAL Blue Tombstone

Text is 24pt, Bold and Title Case

Insert Heading Insert Heading

The blue tombstone layout options should be used for all external, customer-facing presentations and can be used for internal presentations, other than for planning conferences where yellow is the preferred option.

The blue tombstone layout options should be used for all external, customer-facing presentations and can be used for internal presentations, other than for planning conferences where yellow is the preferred option.

Page 43: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 43Emerson Confidential 43Emerson Confidential 43Emerson Confidential 43

Two Column Slide with Heading and Three Line External Tombstone

Three Line, EXTERNAL Blue Tombstone

Text is 24pt, Bold and Title Case

Three Line Key Takeaway

Insert Heading Insert Heading

The blue tombstone layout options should be used for all external, customer-facing presentations and can be used for internal presentations, other than for planning conferences where yellow is the preferred option.

The blue tombstone layout options should be used for all external, customer-facing presentations and can be used for internal presentations, other than for planning conferences where yellow is the preferred option.

Page 44: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 44Emerson Confidential 44Emerson Confidential 44Emerson Confidential 44

Two Column Slide with Heading and One Line Internal Tombstone

One Line, INTERNAL ONLY Yellow Tombstone

Insert Heading Insert Heading

The yellow tombstone layout options are for internal presentations and specifically for planning conferences, as this is the standard that Emerson corporate uses.

The yellow tombstone layout options are for internal presentations and specifically for planning conferences, as this is the standard that Emerson corporate uses.

Page 45: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 45Emerson Confidential 45Emerson Confidential 45Emerson Confidential 45

Two Column Slide with Heading and Two Line Internal Tombstone

Two Line, INTERNAL Yellow Tombstone

Text is 24pt, Bold and Title Case

Insert Heading Insert Heading

The yellow tombstone layout options are for internal presentations and specifically for planning conferences, as this is the standard that Emerson corporate uses.

The yellow tombstone layout options are for internal presentations and specifically for planning conferences, as this is the standard that Emerson corporate uses.

Page 46: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 46Emerson Confidential 46Emerson Confidential 46Emerson Confidential 46

Two Column Slide with Heading and Three Line Internal Tombstone

Three Line, INTERNAL Yellow Tombstone

Text is 24pt, Bold and Title Case

Three Line Key Takeaway

Insert Heading Insert Heading

The yellow tombstone layout options are for internal presentations and specifically for planning conferences, as this is the standard that Emerson corporate uses.

The yellow tombstone layout options are for internal presentations and specifically for planning conferences, as this is the standard that Emerson corporate uses.

Page 47: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 47Emerson Confidential 47

Three Column with Heading

Insert Heading Insert Heading Insert Heading

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

Page 48: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 48Emerson Confidential 48

Three Column Image and Text Slide

Click picture icon above to insert picture

from file

OR

Copy image (from other slide or web)

then select box above and paste image

into box

Click picture icon above to insert picture

from file

OR

Copy image (from other slide or web)

then select box above and paste image

into box

Click picture icon above to insert picture

from file

OR

Copy image (from other slide or web)

then select box above and paste image

into box

Page 49: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 49Emerson Confidential 49

Four Column with Heading

Insert Heading Insert Heading Insert Heading Insert Heading

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

Page 50: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 50Emerson Confidential 50

Four Column Image and Text Slide

Click picture icon above

to insert picture from file

OR

Copy image (from other slide

or web) then select box

above and paste image into

box

Click picture icon above

to insert picture from file

OR

Copy image (from other slide

or web) then select box

above and paste image into

box

Click picture icon above

to insert picture from file

OR

Copy image (from other slide

or web) then select box

above and paste image into

box

Click picture icon above

to insert picture from file

OR

Copy image (from other slide

or web) then select box

above and paste image into

box

Page 51: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 51Emerson Confidential 51

2x2 Column with Heading

Insert Heading Insert Heading

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended

• Date formats: Please avoid “FY” before fiscal years. Any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

Insert Heading Insert Heading

• Date formats: Please avoid “FY” before fiscal years. Any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended

Page 52: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 52Emerson Confidential 52

Left Side Callout

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

Insert Text Here

Use bold font when placed over grey call out box

Use bold font when placed over grey call out box

Page 53: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 53Emerson Confidential 53

Right Side Callout

• Body text is RGB: 63/64/64, the second color in the color theme order

• Title text is RGB: 0/75/141, the fifth color in the color theme order

• ARIAL font size 16 or larger is strongly recommended, first level body text is Arial 24 pt

• Date formats: Please avoid “FY” before fiscal years, any Emerson financial data is assumed to be FY when just the year is shown

• Highlight important points by bolding text

Insert Text Here

Use bold font when placed over grey call out box

Use bold font when placed over grey call out box

Page 54: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Title Slide and Section

Breaker Options

Page 55: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 55Emerson Confidential 55

Small Angle Title Slide

Presenter Name and/or Subtitle

Page 56: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 56Emerson Confidential 56

Large Angle Title Slide

Presenter Name and/or Subtitle

Page 57: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 57Emerson Confidential 57

Additional Image Slides – Separate File

For external presentation needs that require additional image options, please be sure to ask your marketing manager about the separate Emerson Image Slide PPT file if you did not receive it with this template.

The following two slides use the full slide custom image “Layout” that is built into the template master. You can insert or copy a full slide image, then “Send to Back” behind the angle graphic, text and logo. Be sure to use the appropriate full color or reversed Emerson logo depending on the lightness or darkness on the image your are using behind the logo.

Page 58: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 58Emerson Confidential 58

Full Slide Image Title Slide (Insert full slide image, then “Send to

Back”, use this STANDARD Emerson

logo when light image behind logo)

Presenter Name and/or Subtitle

Page 59: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 59Emerson Confidential 59

Full Slide Image Title Slide (Insert full slide image, then “Send to

Back”, use this REVERSED Emerson

logo when dark image behind logo)

Presenter Name and/or Subtitle

Page 60: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Blue

Breaker Slide

Page 61: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Light Blue

Breaker Slide

Page 62: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Green

Breaker Slide

Page 63: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Orange

Breaker Slide

Page 64: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Blue/Green

Breaker Slide

Page 65: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 65Emerson Confidential 65

Blue Angle Breaker Slide

Insert divider subtitle

Page 66: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 66Emerson Confidential 66

Green Angle Breaker Slide

Insert divider subtitle

Page 67: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 67Emerson Confidential 67

Orange Angle Breaker Slide

Insert divider subtitle

Page 68: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Chart and

Table Samples

Page 69: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 69Emerson Confidential 69

Charts and Tables

• It is recommended that PowerPoint charts and tables be used for presenting data if at all possible

• Allows for faster edits: highlighting, row or column addition/deletion, format changes, etc.

• Minimizes revealing confidential information

• Please minimize use of embedded Excel charts and tables; sometimes they do not display correctly and they can contain confidential information

• “Metadata” can contain confidential information in embedded spreadsheets. In addition, the entire workbooks is embedded, which can reveal data in hidden tabs

• When time constrained, paste excel files as images, rather than embedding the Excel itself

• White backgrounds only, no gridlines

• Avoid use of 3D charts

Page 70: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 70Emerson Confidential 70

Full Slide Chart and Line Chart Sample

Insert Chart Title Here

2.4

4.4

1.8

2.8

0

1

2

3

4

5

6

Category 1 Category 2 Category 3 Category 4

Series 1 Series 2 Series 3

Source: Slide Source Here. Second Source Here.

Page 71: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 71Emerson Confidential 71

One Chart Slide with Right Side Call Out and Pie Chart Sample

Insert Chart Title Here

4

3.2

1.4

1.2

0.5 1

1st 2nd 3rd 4th 5th 6th

Source: Slide Source Here. Second Source Here.

Insert Text Here

Use bold font when placed over grey call out box

Use bold font when placed over grey call out box

Page 72: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 72Emerson Confidential 72

Two Chart Slide with Bar Chart Samples

Insert Chart Title Here Insert Chart Title Here

4.3

2.5

3.5

4.5

Cat. 1 Cat. 2 Cat. 3 Category 4

4.3

2.5

3.5

4.5

2.4 4.4

1.8

2.8

Cat. 1 Cat. 2 Cat. 3 Cat. 4

Series 1 Series 2

Source: Slide Source Here. Second Source Here. Source: Slide Source Here. Second Source Here.

Page 73: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 73Emerson Confidential 73

Full Slide Chart with Area Chart Sample

Insert Chart Title Here

1956 1962 1968 1974 1980 1986 1992 1998 2004 2010

Source: Slide Source Here. Second Source Here.

$X.XXChart info goes here

$X.XXChart info goes here

Page 74: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 74Emerson Confidential 74

Three Chart Slide with Various Chart Samples

Insert Chart Title Here Insert Chart Title Here Insert Chart Title Here

4.3

2.5

3.5

4.5

Cat. 1 Cat. 2 Cat. 3 Cat. 4

8.23.2

1.41.2

1st Qtr 2nd Qtr 3rd Qtr 4th Qtr

2.4

4.4

1.8

2.8

0

1

2

3

4

5

6

Category1

Category2

Category3

Category4

Series 1 Series 2 Series 3

Source: Slide Source Here. Source: Slide Source Here. Source: Slide Source Here.

Page 75: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 75Emerson Confidential 75

Table Sample

Item 1 Item 2 Item 3 Item 4 Item 5

Group 1 XXX XXX XXX XXX XXX

Group 1 Sub XXX XXX XXX XXX XXX

Group 2 XXX XXX XXX XXX XXX

Group 2 Sub XXX XXX XXX XXX XXX

Group 3 XXX XXX XXX XXX XXX

Group 3 Sub XXX XXX XXX XXX XXX

Group 4 XXX XXX XXX XXX XXX

Group 4 Sub XXX XXX XXX XXX XXX

Group 5 XXX XXX XXX XXX XXX

Group 5 Sub XXX XXX XXX XXX XXX

Group 6 XXX XXX XXX XXX XXX

Group 6 Sub XXX XXX XXX XXX XXX

Page 76: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 76Emerson Confidential 76

Table Sample

Item 1 Item 2

Group 1Enter text here

Group 1 Sub

Group 2Enter text here

Group 2 Sub

Group 3Enter text here

Group 3 Sub

Group 4Enter text here

Group 4 Sub

Group 5Enter text here

Group 5 Sub

Group 6Enter text here

Group 6 Sub

Page 77: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 77Emerson Confidential 77

Gantt Chart Sample

Item 1Month Month Month Month

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

• Point one with critical part

bolded if desired

– Sub point one

– Sub point two

• Point two with critical part

bolded if desired

– Sub point one

– Sub point two

• Point three with critical part

bolded if desired

– Sub point one

– Sub point two

Sample Use of Angle Heading Here

Complete In-process

Date

Date

Page 78: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

The following slides have been built into the template Slide Master so that

graphic assets and frequently needed guidelines can quickly be accessed

for reference or to copy and paste for use on slides

To access the Slide Master:

Select the View tab, then click Slide Master in the Master Views group

To exit Slide Master View:

Select the Slide Master tab, then click Close Master View on the far right

Design Guidelines and Graphic Assets to Copy and Paste

The following slides have been built into the template Slide Master so that

graphic assets and frequently needed guidelines can quickly be accessed

for reference or to copy and paste for use on slides

To access the Slide Master:

Select the View tab, then click Slide Master in the Master Views group

To exit Slide Master View:

Select the Slide Master tab, then click Close Master View on the far right

Design Guidelines and Graphic Assets to Copy and Paste

Page 79: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

1 32 54

0/75/141 0/164/21098/187/70149/151/151 247/148/40255/207/3463/64/64

195/217/65 211/18/690/170/126

Core Theme Colors

6

110/41/141

Limit color use to the core theme colors,

their light/dark variations and the

additional brand colors below

There are duplicates of Emerson Blue in the Theme Colors.

This is intentional and either can be used.

Default Chart Color Order

Grey

Call-out First variation

under white

242/242/242

Body Text Title Text

Do not use

Standard Colors

Tip: To quickly add one of the three colors to

the right that are not in the template Theme

Colors; first select one of the boxes, then

click on Shape Fill, then select More Fill

Colors and click OK.

Footer Text

Hyperlink

Text

Negative

Numbers/Text

1 32 54

0/75/141 0/164/21098/187/70149/151/151 247/148/40255/207/3463/64/64

195/217/65 211/18/690/170/126

Core Theme Colors

6

110/41/141

Limit color use to the core theme colors,

their light/dark variations and the

additional brand colors below

There are duplicates of Emerson Blue in the Theme Colors.

This is intentional and either can be used.

Default Chart Color Order

Grey

Call-out First variation

under white

242/242/242

Body Text Title Text

Do not use

Standard Colors

Tip: To quickly add one of the three colors to

the right that are not in the template Theme

Colors; first select one of the boxes, then

click on Shape Fill, then select More Fill

Colors and click OK.

Footer Text

Hyperlink

Text

Negative

Numbers/Text

Template Theme Colors

1 32 54

0/75/141 0/164/21098/187/70149/151/151 247/148/40255/207/3463/64/64

195/217/65 211/18/690/170/126

Core Theme Colors

6

110/41/141

Limit color use to the core theme colors,

their light/dark variations and the

additional brand colors below

There are duplicates of Emerson Blue in the Theme Colors.

This is intentional and either can be used.

Default Chart Color Order

Grey

Call-out First variation

under white

242/242/242

Body Text Title Text

Do not use

Standard Colors

Tip: To quickly add one of the three colors to

the right that are not in the template Theme

Colors; first select one of the boxes, then

click on Shape Fill, then select More Fill

Colors and click OK.

Footer Text

Hyperlink

Text

Negative

Numbers/Text

Page 80: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 80Emerson Confidential 80

211/18/69

0/75/141

149/151/151

0/170/126

135/229/255

110/41/141

247/148/40 0/164/210

98/187/70

Start

Here

255/207/34

External Tombstone

Background Color

Tombstone

Line Color

138/75/5

Negative numbers

or text

211/18/69

0/75/141

149/151/151

0/170/126

135/229/255

110/41/141

247/148/40 0/164/210

98/187/70

Start

Here

255/207/34

External Tombstone

Background Color

Tombstone

Line Color

138/75/5

Negative numbers

or text

The Color Wheel

211/18/69

0/75/141

149/151/151

0/170/126

135/229/255

110/41/141

247/148/40 0/164/210

98/187/70

Start

Here

255/207/34

External Tombstone

Background Color

Tombstone

Line Color

138/75/5

Negative numbers

or text

Page 81: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 81Emerson Confidential 81

Keep content within this blue space

so that critical information

does not get cut off

Graphics such as color blocks (tombstones and angle headers)

and images can go to the edge of the slide

Keep content within this blue space

so that critical information

does not get cut off

Graphics such as color blocks (tombstones and angle headers)

and images can go to the edge of the slide

Clear Space for Content

Keep content within this blue space

so that critical information

does not get cut off

Graphics such as color blocks (tombstones and angle headers)

and images can go to the edge of the slide

Page 82: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 82Emerson Confidential 82

a an and

at but by

for in nor

of on or

so the to

up yet

a an and

at but by

for in nor

of on or

so the to

up yet

All Titles and Tombstones Use Title Case

All Body Copy Uses Sentence Case, Unless Treated As a Subtitle

Capitalize the Principal Words

The principal words of a title include the first and last words of that title, which you should always capitalize. You shouldalso capitalize all verbs, nouns, pronouns, adjectives, adverbs and some conjunctions. Finally, capitalize every word that is more than three letters long.

What NOT to Capitalize

Don’t capitalize articles, prepositions, or conjunctions that have fewer than four letters. That leaves a pretty short list of words that aren’t capitalized:

Pay Special Attention to Prepositions

When you write titles that contain prepositions, your word processor will likely tell you that you should leave words like “with,” “about,” and “around” lowercase. Defiantly look past the squiggly line indicating a potential error, and remember that in AP title case, prepositions with four or more letters should be capitalized.

The Verb “Is”

Many writers make the error of leaving “to be” verbs in lower case. Even though “is,” “are,” “was,” and “be,” are all short words, they should still be capitalized in a title becausethey are verbs.

a an and

at but by

for in nor

of on or

so the to

up yet

Page 83: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 83Emerson Confidential 83

1pt Template Header Line

4.5pt Callout/Tombstone Line

6pt Table Border

Blue Callout

Single Blue

Call Out and Section Tracker Options

Line Styles Arrow Styles

Blue with arrow Green with arrow Light Blue with arrow Yellow with arrow

6pt Table Border

Blue Callout

Single Blue

6pt Table Border

Blue Callout

Single Blue

6pt Table Border

Blue Callout

Single Blue

1pt Template Header Line

4.5pt Callout/Tombstone Line

6pt Table Border

Blue Callout

Single Blue

Call Out and Section Tracker Options

Line Styles Arrow Styles

Blue with arrow Green with arrow Light Blue with arrow Yellow with arrow

6pt Table Border

Blue Callout

Single Blue

6pt Table Border

Blue Callout

Single Blue

6pt Table Border

Blue Callout

Single Blue

Lines, Arrows and Call Outs to Copy and Paste

1pt Template Header Line

4.5pt Callout/Tombstone Line

6pt Table Border

Blue Callout

Single Blue

Call Out and Section Tracker Options

Line Styles Arrow Styles

Blue with arrow Green with arrow Light Blue with arrow Yellow with arrow

6pt Table Border

Blue Callout

Single Blue

6pt Table Border

Blue Callout

Single Blue

6pt Table Border

Blue Callout

Single Blue

Page 84: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 84Emerson Confidential 84

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Table/Agenda Sample to Copy and Paste

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Presenter Name Section Title

Page 85: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 85Emerson Confidential 85

Timeline Sample to Copy and Paste

Source: Slide Source Here. Second Source Here.Sample Use of Angle Heading Here

Lorem ipsum dolor sit amet,

labitur qualisque mea ad.

Nominavi comprehnsa in

mea, persius amet corpora

concludatuque eos ad.

Lorem ipsum dolor sit amet,

labitur qualisque mea ad.

Nominavi comprehnsa in

mea, persius amet corpora

concludatuque eos ad.

2014 2015 2016 2017

Nominavi comprehnsa in

mea, persius amet corpora

concludatuque eos ad.

Lorem ipsum dolor sit amet,

labitur qualisque mea ad.

Nominavi comprehnsa in

mea, persius amet corpora

concludatuque eos ad.

Lorem ipsum dolor sit amet,

labitur qualisque mea ad.

Page 86: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 86Emerson Confidential 86

4 Column

3 Column

2 Column

4 Column

3 Column

2 Column

2, 3 and 4 Column Sidebar and Header Lines to Copy and Paste

Page 87: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 87Emerson Confidential 87

Click Here to Change Top Border Color

To change color bar above:

1. Click the blue header text in the table cell above

2. Click on the Table Tools Design tab

3. Change your Pen Weight to 6pt

4. Change your Pen Color to what you’d like to use

5. Then apply the Top Border of the Table only

Click Here to Change Top Border Color

The color of the bar above can be changed the same as you would change any Table Border

It is a 6pt Top Border

Color bars in all tables (such as sample agenda) can be changed the same way by applying a 6pt Pen Weight and Theme Color

Click Here to Change Top Border Color

To change color bar above:

1. Click the blue header text in the table cell above

2. Click on the Table Tools Design tab

3. Change your Pen Weight to 6pt

4. Change your Pen Color to what you’d like to use

5. Then apply the Top Border of the Table only

Click Here to Change Top Border Color

The color of the bar above can be changed the same as you would change any Table Border

It is a 6pt Top Border

Color bars in all tables (such as sample agenda) can be changed the same way by applying a 6pt Pen Weight and Theme Color

Click Here to Change Top Border Color

To change color bar above:

1. Click the blue header text in the table cell above

2. Click on the Table Tools Design tab

3. Change your Pen Weight to 6pt

4. Change your Pen Color to what you’d like to use

5. Then apply the Top Border of the Table only

Click Here to Change Top Border Color

The color of the bar above can be changed the same as you would change any Table Border

It is a 6pt Top Border

Color bars in all tables (such as sample agenda) can be changed the same way by applying a 6pt Pen Weight and Theme Color

Click Here to Change Top Border Color

To change color bar above:

1. Click the blue header text in the table cell above

2. Click on the Table Tools Design tab

3. Change your Pen Weight to 6pt

4. Change your Pen Color to what you’d like to use

5. Then apply the Top Border of the Table only

Click Here to Change Top Border Color

The color of the bar above can be changed the same as you would change any Table Border

It is a 6pt Top Border

Color bars in all tables (such as sample agenda) can be changed the same way by applying a 6pt Pen Weight and Theme Color

Sidebar Tables to Copy/Paste

Click Here to Change Top Border Color

To change color bar above:

1. Click the blue header text in the table cell above

2. Click on the Table Tools Design tab

3. Change your Pen Weight to 6pt

4. Change your Pen Color to what you’d like to use

5. Then apply the Top Border of the Table only

Click Here to Change Top Border Color

The color of the bar above can be changed the same as you would change any Table Border

It is a 6pt Top Border

Color bars in all tables (such as sample agenda) can be changed the same way by applying a 6pt Pen Weight and Theme Color

Click Here to Change Top Border Color

To change color bar above:

1. Click the blue header text in the table cell above

2. Click on the Table Tools Design tab

3. Change your Pen Weight to 6pt

4. Change your Pen Color to what you’d like to use

5. Then apply the Top Border of the Table only

Click Here to Change Top Border Color

The color of the bar above can be changed the same as you would change any Table Border

It is a 6pt Top Border

Color bars in all tables (such as sample agenda) can be changed the same way by applying a 6pt Pen Weight and Theme Color

Page 88: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Office/Technology Security

PeopleMeasurement Miscellaneous

Office/Technology Security

PeopleMeasurement Miscellaneous

Icon Library to Copy/Paste, Fill Color Can be Changed As Needed

Page 89: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Environmental/Energy Food Buildings

Transportation/Construction/Industrial/Manufacturing Medical

Environmental/Energy Food Buildings

Transportation/Construction/Industrial/Manufacturing Medical

Icon Library to Copy/Paste, Fill Color Can be Changed As Needed

Page 90: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 90Emerson Confidential 90

North America

Sites: 15

Latin America

Sites: 2

Asia-Pacific

Sites: 21

Africa

Sites: 2

Europe

Sites: 68

North America

Sites: 15

Latin America

Sites: 2

Asia-Pacific

Sites: 21

Africa

Sites: 2

Europe

Sites: 68

Sample Map with Call Outs to Copy/Paste

North America

Sites: 15

Latin America

Sites: 2

Asia-Pacific

Sites: 21

Africa

Sites: 2

Europe

Sites: 68

Page 91: Operationalizing Threat Intelligence · Operationalizing Threat Intelligence David Foose Emerson August 27, 2018. 2 Who Am I •Ovation Security Solutions Program Manager •Old Novell/Notes

Emerson Confidential 91Emerson Confidential 91

The angle graphic element can be used above or below a column, as a heading or as a call out to add color and draw attention to a key point. It should be used for short statements only.

Two Column Blue Angle

One Column Left Side Green Angle

One Column Right Side Green Angle

One Column Right Side Blue Angle

Two Column Green Angle

One Column Left Side Blue Angle

The angle graphic element can be used above or below a column, as a heading or as a call out to add color and draw attention to a key point. It should be used for short statements only.

Two Column Blue Angle

One Column Left Side Green Angle

One Column Right Side Green Angle

One Column Right Side Blue Angle

Two Column Green Angle

One Column Left Side Blue Angle

Angle Heading or Call Out Graphic to Copy/Paste

Two Column Blue Angle

One Column Left Side Green Angle

One Column Right Side Green Angle

One Column Right Side Blue Angle

Two Column Green Angle

One Column Left Side Blue Angle