Understanding & Managing Collection to Support Threat Intelligence Analysis - SANS CTI Summit

  Рет қаралды 5,949

SANS Digital Forensics and Incident Response

SANS Digital Forensics and Incident Response

Күн бұрын

Fear of missing out when collecting information is very real. Traditional intelligence practitioners often assume that their goal is to gather as much information as possible to formulate a more comprehensive picture of threats, and this is a common problem in cyber threat intelligence as well. However, this approach can hamper the accuracy, timeliness, and relevancy of analysis. In truth, excessive collection will likely lead to information overload on both the individual and institutional levels that can result in skewed analysis and assessments. Unfettered and undermanaged intelligence collection of raw, exploited, and production data can affect both data-driven analysis and conceptually-driven analysis. It has been shown that an analyst only needs minimum information to make an informed judgment. Common issues deriving from collection overload include overconfidence (a result of circular reporting or having too many information sets to evaluate); reinforcement of collection bias; and unchecked collection, which may cause analytic paralysis that leads to a high noise-to-signal ratio that in turn results in indecision and an inability to conduct effective structured analysis.
This presentation proposes best practices to mitigate such issues by producing a realistic collection management framework and sustainable intelligence requirements; starting with a minimal viable collection strategy; collecting what you need and growing it only as needed; conducting source review and evaluation; evaluating exploited and production data via a framework such as an admiralty system; and counting the times a source is used to enforce an assessment in order to uncover collection bias. Finally, we’ll look at upgrading analysis models as the best way to improve analysis and mitigate issues deriving from over-collection.
Sherman Chu, Cyber Intelligence Analyst, New York City Cyber Command

Пікірлер: 6
@Ichinin
@Ichinin 4 жыл бұрын
15:10 Good, but the problem is that most organizations have little experience jotting down Intelligence Requirements, especially related to cyber security.
@azariahjosiah2123
@azariahjosiah2123 2 жыл бұрын
You all prolly dont give a shit but does any of you know of a method to log back into an instagram account? I was dumb lost my password. I would appreciate any help you can offer me!
@Ichinin
@Ichinin 2 жыл бұрын
@@azariahjosiah2123 No i don't give a shit. And i also block.
@alnash1208
@alnash1208 3 жыл бұрын
20:50 - Be very wary of on-the-fly collection. Wow. I wish i have heard this sooner
@youmemeyou
@youmemeyou Жыл бұрын
Can you elaborate? I didn't get it!
@usain.y
@usain.y Жыл бұрын
@@youmemeyou same
Threat Intelligence and the Limits of Malware Analysis with Joe Slowik - SANS CTI Summit 2020
26:52
SANS Digital Forensics and Incident Response
Рет қаралды 5 М.
Conventional Intelligence Analysis in Cyber Threat Intelligence - CTI Summit 2017
26:41
SANS Digital Forensics and Incident Response
Рет қаралды 6 М.
I’m just a kid 🥹🥰 LeoNata family #shorts
00:12
LeoNata Family
Рет қаралды 18 МЛН
Василиса наняла личного массажиста 😂 #shorts
00:22
Денис Кукояка
Рет қаралды 9 МЛН
Osman Kalyoncu Sonu Üzücü Saddest Videos Dream Engine 170 #shorts
00:27
Alat Seru Penolong untuk Mimpi Indah Bayi!
00:31
Let's GLOW! Indonesian
Рет қаралды 9 МЛН
Hack the Reader: Writing Effective Threat Reports with Lenny Zeltser - SANS CTI Summit
37:00
SANS Digital Forensics and Incident Response
Рет қаралды 8 М.
Espionage and Intelligence
1:03:39
Dartmouth
Рет қаралды 197 М.
Stop Tilting at Windmills: 3 Key Lessons that CTI Teams Should Learn from the Past - SANS CTI Summit
34:19
SANS Digital Forensics and Incident Response
Рет қаралды 16 М.
Intelligence Preparation of the Cyber Environment - SANS Cyber Threat Intelligence Summit 2018
27:43
SANS Digital Forensics and Incident Response
Рет қаралды 12 М.
Threat Intelligence Naming Conventions: Threat Actors, & Other Ways of Tracking Threats
1:02:20
SANS Digital Forensics and Incident Response
Рет қаралды 12 М.
Intelligence Analysis Skills: Analytic Standards (Part 1)
14:04
Brian Urlacher
Рет қаралды 6 М.
Four Structured Analytical Techniques Every Analyst Must Know
1:00:36
Survival Heuristics: My Favorite Techniques for Avoiding Intelligence Traps - SANS CTI Summit 2018
40:53
SANS Digital Forensics and Incident Response
Рет қаралды 799 М.
Threat Intel for Everyone: Writing Like A Journalist To Produce Clear, Concise Reports
33:46
SANS Digital Forensics and Incident Response
Рет қаралды 8 М.
В России ускорили интернет в 1000 раз
0:18
Короче, новости
Рет қаралды 236 М.
ИГРОВОВЫЙ НОУТ ASUS ЗА 57 тысяч
25:33
Ремонтяш
Рет қаралды 240 М.
Simple maintenance. #leddisplay #ledscreen #ledwall #ledmodule #ledinstallation
0:19
LED Screen Factory-EagerLED
Рет қаралды 3,3 МЛН
Main filter..
0:15
CikoYt
Рет қаралды 12 МЛН