The Evolution of Cyber Threats and Cyber Threat Intelligence

14
The Evolution of Cyber Threats and Cyber Threat Intelligence Greg Rattray CEO, Delta Risk LLC 22 March 2013

Transcript of The Evolution of Cyber Threats and Cyber Threat Intelligence

The Evolution of Cyber Threats and

Cyber Threat Intelligence

Greg Rattray CEO, Delta Risk LLC

22 March 2013

2

Today’s Talk

Walk though History

What Does it Mean?

3

Before the Dawn

Intercept

Orange Book

Espionage as a Constant

Cold War Know Adversaries Signals Intelligence

Cyber Threat Intelligence

Phreaking

Technology

Public Switched Telephone Network

Little in Private Sector

4

Light on the Horizon

Info War

Hunting Hackers

Speculation on National Security Impact

First Gulf War

Morris Worm

Computers at Risk

President’s Commission on Critical Infrastructure Protection Networked

Reliance Growing

Web

Technology

Cyber Threat Intelligence

5

Early Wake Up Calls

2000 E-Commerce Attacks

Solar Sunrise

EP-3 and Patriotic Hacking

JTF-CND and others

Moonlight Maze

Rise of E-commerce

Cyber Threat Intelligence

Technology

Slammer Nimda

Code Red

Attribution Difficult Rise of CERTs

6

The Dark Times 9/11

Afghanistan

Internet Underground

GWOT

Botnets

Byzantine Hades

Global Crossing

Exposures of Espionage

Supply Chain Risks

Little on Adversary Capabilities

\

Iraq

Internet Bubble Bursts Reliance Still Grows

Cyber Threat Intelligence

7

A Rude Awakening Advanced Persistent Threats

Ghost Net

Estonia Georgia

Night Dragon Control Systems on Internet

Rise of Private Teams – CERTs; Providers and Collaboratives

Korea

Technology

Cyber Threat Intelligence Start Real Focus

RBN Attribution Progress

8

Rising Fear

STUXNET

Shamoon

Flame

DDoS vs. Banks Mobility

Cloud Social Media

APT 1

Dire Estimates; Need Method

Technology

Cyber Threat Intelligence

Info Sharing

Improving Enterprise Defense

9

Castle Walls Eroded Enemy Inside Gates

Must Manage Risk > Know Your Attacker

Channel the Attacks

“If you know the enemy and know yourself you need not fear the results of a hundred battles”

10

What’s Going Well

• Tactical Knowledge and Attribution

• Information Sharing

• Private Sector Intelligence

• Push to Automation & Professionalization

11

What’s Missing

• Analysis of Operational Risk • Understanding Strategic Impact

• Estimative Analysis

12

What are the Challenges? •

Avoiding Militarization of Cyberspace

Cyber Risk Management

Growing Full Spectrum Geeks

13

What Might Happen

Guerilla Conflict

Eradication of Disease

Waveform Attack

14

Parting Shots

Technology Drives Risks Take a Global Perspective

Collaboration

Learning