SlideShare a Scribd company logo
Click Here
CYB205-1
Evolving Threat Landscapes
Lec. 01
COURSE LEARNING OUTCOMES
 Describe the evolving cybersecurity threat landscape.
 Explain cybersecurity mitigation and defense
strategies.
 Discuss modern-day cybersecurity trends.
 Define cyber security policy, enforcement and
compliance.
 Define Artificial Intelligence (AI).
COURSE EVALUATION
 Discussion Forums & Debate: 30%
 Individual Assignment: 15%
 Group Project (Case Study): 25%
 Final quiz/exam: 30%
Threat, Vulnerability, and Risk
Threat Actor
Threat intelligence types
Threat Intelligence Feeds
Threat intelligence sources
Traffic Light Protocol (TLP)
Agenda
Threat, Vulnerability, and Risk
Threat
Any circumstance or event with the potential to adversely impact
organizational operations, assets, or individuals.
Vulnerability
Weakness in an information system, system security procedures,
internal controls, or implementation that could be exploited or
triggered.
Risk
A measure of the extent to which an entity is threatened by a potential
circumstance or event.
CYB205-1 Evolving Threat Landscapes_01.pdf
CYB205-1 Evolving Threat Landscapes_01.pdf
Threat intelligence types
Strategic
High level info
on changing
risks
Tactical
Attacker Tools
Tactics,
Procedures
Operational
Incoming
attacks against
company or
industry
Technical
Indicators of
Compromise
High level Low level
Low Time-to-Live
High Time-to-Live
• What?
• Threat intelligence is information about threats
and threat actors that helps mitigate harmful
events in cyberspace.
• Why?
• Help organizations to understand the threats that
have, will, or are currently targeting the
organization.
• How?
• Open-source intelligence
• Commercial intelligence
Threat Intelligence Feeds
OSINT
Open Source Intelligence
• Derived from open sources (e.g. mainstream media, Internet forums, paste sites, etc.
• Pros: good for ‘context’ and ‘big picture’
• Cons: multiple languages, interpretation, noise
TECHINT
Technical Intelligence
• Technical indicators (e.g. IP addresses, hashes, domains, tools & techniques)
• Pros: easy to consume and drive automation
• Cons: difficult to ‘contextualize’
SIGINT
Signals Intelligence
• Derived from analysis of communications, often in one’s own environment
• Pros: low noise; if you’re seeing it, you’re experiencing it
• Cons: requires extensive apparatus
Threat intelligence sources
• Canadian Center for cyber Security CCCS
• Department of Homeland Security: Automated Indicator Sharing
• FBI: InfraGard Portal
• @abuse.ch: Ransomware Tracker
• SANS: Internet Storm Center
• VirusTotal: VirusTotal
• Cisco: Talos Intelligence
• VirusShare: VirusShare Malware Repository
• Google: Safe Browsing
• National Council of ISACs: Member ISACs
• The Spamhaus Project: Spamhaus
Open-source Intelligence Feeds
Commercial Intelligence Feeds
 Recorded Future
NIST 800-150 “Guide to Threat Information Sharing”
• Threat information that has been aggregated, transformed, analysed,
interpreted, or enriched to provide the necessary context for
decision-making processes.
CYB205-1 Evolving Threat Landscapes_01.pdf
Thank You

More Related Content

PDF
Threat Intelligence 101 - Steve Lodin - Submitted
Steve Lodin
 
PDF
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Andreas Sfakianakis
 
PDF
SecurityOperations
Antonio (Tony) Robinson
 
PPTX
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
OWASP Delhi
 
PPTX
Proactive Approach to OT incident response - HOUSECCON 2023
Chris Sistrunk
 
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Andris Soroka
 
PPTX
Cyber Threat Hunting Workshop
Digit Oktavianto
 
PDF
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
Threat Intelligence 101 - Steve Lodin - Submitted
Steve Lodin
 
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Andreas Sfakianakis
 
SecurityOperations
Antonio (Tony) Robinson
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
OWASP Delhi
 
Proactive Approach to OT incident response - HOUSECCON 2023
Chris Sistrunk
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Andris Soroka
 
Cyber Threat Hunting Workshop
Digit Oktavianto
 
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 

Similar to CYB205-1 Evolving Threat Landscapes_01.pdf (20)

PDF
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
PPTX
Security Operations Center Analyst Presentation
kundansaraf1
 
PDF
The Threat Landscape & Network Security Measures
Carl B. Forkner, Ph.D.
 
PDF
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Raffael Marty
 
PDF
[Bucharest] Attack is easy, let's talk defence
OWASP EEE
 
PDF
Custom defense - Blake final
Minh Le
 
PPTX
Best Practices for Scoping Infections and Disrupting Breaches
Splunk
 
PPTX
Security in the age of open source - Myths and misperceptions
Tim Mackey
 
PDF
Caccia alle Minacce: Intelligence e Hunting nel cyberspace
Speck&Tech
 
PPTX
Managing security threats in today’s enterprise
Quick Heal Technologies Ltd.
 
PPTX
Cyber Threat Hunting with Phirelight
Hostway|HOSTING
 
PPTX
Using Threat Intelligence to Address Your Growing Digital Risk
SurfWatch Labs
 
PDF
2015 Cyber Security
Allen Zhang
 
PPTX
Cyber security for business
Daniel Thomas
 
PDF
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
James Perry, Jr.
 
PPT
Cs461 06.risk analysis (1)
neeraj.sihag
 
PDF
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
Paul F. Roberts
 
PDF
Webinar - Reducing the Risk of a Cyber Attack on Utilities
WPICPE
 
PDF
Splunk for Security
Gabrielle Knowles
 
PDF
SplunkLive Auckland 2015 - Splunk for Security
Splunk
 
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
Security Operations Center Analyst Presentation
kundansaraf1
 
The Threat Landscape & Network Security Measures
Carl B. Forkner, Ph.D.
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Raffael Marty
 
[Bucharest] Attack is easy, let's talk defence
OWASP EEE
 
Custom defense - Blake final
Minh Le
 
Best Practices for Scoping Infections and Disrupting Breaches
Splunk
 
Security in the age of open source - Myths and misperceptions
Tim Mackey
 
Caccia alle Minacce: Intelligence e Hunting nel cyberspace
Speck&Tech
 
Managing security threats in today’s enterprise
Quick Heal Technologies Ltd.
 
Cyber Threat Hunting with Phirelight
Hostway|HOSTING
 
Using Threat Intelligence to Address Your Growing Digital Risk
SurfWatch Labs
 
2015 Cyber Security
Allen Zhang
 
Cyber security for business
Daniel Thomas
 
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
James Perry, Jr.
 
Cs461 06.risk analysis (1)
neeraj.sihag
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
Paul F. Roberts
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
WPICPE
 
Splunk for Security
Gabrielle Knowles
 
SplunkLive Auckland 2015 - Splunk for Security
Splunk
 
Ad

Recently uploaded (20)

PPTX
vedic maths in python:unleasing ancient wisdom with modern code
mistrymuskan14
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PDF
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Miraj Khan
 
PPTX
Skill Development Program For Physiotherapy Students by SRY.pptx
Prof.Dr.Y.SHANTHOSHRAJA MPT Orthopedic., MSc Microbiology
 
PPTX
Strengthening open access through collaboration: building connections with OP...
Jisc
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PDF
5.EXPLORING-FORCES-Detailed-Notes.pdf/8TH CLASS SCIENCE CURIOSITY
Sandeep Swamy
 
PPT
Python Programming Unit II Control Statements.ppt
CUO VEERANAN VEERANAN
 
PPTX
ACUTE NASOPHARYNGITIS. pptx
AneetaSharma15
 
PPTX
Understanding operators in c language.pptx
auteharshil95
 
PDF
Wings of Fire Book by Dr. A.P.J Abdul Kalam Full PDF
hetalvaishnav93
 
PPTX
Congenital Hypothyroidism pptx
AneetaSharma15
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PDF
Landforms and landscapes data surprise preview
jpinnuck
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
IMMUNIZATION PROGRAMME pptx
AneetaSharma15
 
PDF
PG-BPSDMP 2 TAHUN 2025PG-BPSDMP 2 TAHUN 2025.pdf
AshifaRamadhani
 
vedic maths in python:unleasing ancient wisdom with modern code
mistrymuskan14
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Miraj Khan
 
Skill Development Program For Physiotherapy Students by SRY.pptx
Prof.Dr.Y.SHANTHOSHRAJA MPT Orthopedic., MSc Microbiology
 
Strengthening open access through collaboration: building connections with OP...
Jisc
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
5.EXPLORING-FORCES-Detailed-Notes.pdf/8TH CLASS SCIENCE CURIOSITY
Sandeep Swamy
 
Python Programming Unit II Control Statements.ppt
CUO VEERANAN VEERANAN
 
ACUTE NASOPHARYNGITIS. pptx
AneetaSharma15
 
Understanding operators in c language.pptx
auteharshil95
 
Wings of Fire Book by Dr. A.P.J Abdul Kalam Full PDF
hetalvaishnav93
 
Congenital Hypothyroidism pptx
AneetaSharma15
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
Landforms and landscapes data surprise preview
jpinnuck
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
IMMUNIZATION PROGRAMME pptx
AneetaSharma15
 
PG-BPSDMP 2 TAHUN 2025PG-BPSDMP 2 TAHUN 2025.pdf
AshifaRamadhani
 
Ad

CYB205-1 Evolving Threat Landscapes_01.pdf

  • 2. COURSE LEARNING OUTCOMES  Describe the evolving cybersecurity threat landscape.  Explain cybersecurity mitigation and defense strategies.  Discuss modern-day cybersecurity trends.  Define cyber security policy, enforcement and compliance.  Define Artificial Intelligence (AI).
  • 3. COURSE EVALUATION  Discussion Forums & Debate: 30%  Individual Assignment: 15%  Group Project (Case Study): 25%  Final quiz/exam: 30%
  • 4. Threat, Vulnerability, and Risk Threat Actor Threat intelligence types Threat Intelligence Feeds Threat intelligence sources Traffic Light Protocol (TLP) Agenda
  • 5. Threat, Vulnerability, and Risk Threat Any circumstance or event with the potential to adversely impact organizational operations, assets, or individuals. Vulnerability Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered. Risk A measure of the extent to which an entity is threatened by a potential circumstance or event.
  • 8. Threat intelligence types Strategic High level info on changing risks Tactical Attacker Tools Tactics, Procedures Operational Incoming attacks against company or industry Technical Indicators of Compromise High level Low level Low Time-to-Live High Time-to-Live
  • 9. • What? • Threat intelligence is information about threats and threat actors that helps mitigate harmful events in cyberspace. • Why? • Help organizations to understand the threats that have, will, or are currently targeting the organization. • How? • Open-source intelligence • Commercial intelligence Threat Intelligence Feeds
  • 10. OSINT Open Source Intelligence • Derived from open sources (e.g. mainstream media, Internet forums, paste sites, etc. • Pros: good for ‘context’ and ‘big picture’ • Cons: multiple languages, interpretation, noise TECHINT Technical Intelligence • Technical indicators (e.g. IP addresses, hashes, domains, tools & techniques) • Pros: easy to consume and drive automation • Cons: difficult to ‘contextualize’ SIGINT Signals Intelligence • Derived from analysis of communications, often in one’s own environment • Pros: low noise; if you’re seeing it, you’re experiencing it • Cons: requires extensive apparatus Threat intelligence sources
  • 11. • Canadian Center for cyber Security CCCS • Department of Homeland Security: Automated Indicator Sharing • FBI: InfraGard Portal • @abuse.ch: Ransomware Tracker • SANS: Internet Storm Center • VirusTotal: VirusTotal • Cisco: Talos Intelligence • VirusShare: VirusShare Malware Repository • Google: Safe Browsing • National Council of ISACs: Member ISACs • The Spamhaus Project: Spamhaus Open-source Intelligence Feeds Commercial Intelligence Feeds  Recorded Future
  • 12. NIST 800-150 “Guide to Threat Information Sharing” • Threat information that has been aggregated, transformed, analysed, interpreted, or enriched to provide the necessary context for decision-making processes.