Security should always come with purpose and intent
5
How do we understand threats?
6
Threat modeling is a procedure for optimizing network Security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of threats to the s…
7
Drawing, documenting, prioritizing
8
We're not going to cover methodologies
9
Focus on reality
10
Clearly define the capabilities of the threat actor
11
Understand what the true business impact is
12
Threat Event Frequency
13
In order to determine risk we need to identify how often
14
We can do this with a SIEM
15
Or via custom tooling
16
Whatever you do, use the data!
17
Deliver value, focus, and prioritize
18
You have realized that things change
19
Start building threat scenarios automatically
20
Both predictable and irrational behavior can be modeled
21
Think about a series of requests as a state transition
22
You can produce Markov chains from behavioral patterns
23
Use the request information to produce intended and identifiably malicious transition matrices
24
You can take this incredibly far
25
Intent and capability are vital to risk analysis
26
Using these Markov chains, you can show both
27
Once you identify this you can build your threat models in near real time
28
This gives you apply controls to scenarios
29
Active risk registers tell everyone the story
30
It allows you to be in constant communication with the business
31
You can't do it all
32
Learn to focus on what matters
Description:
Explore adaptive threat modeling techniques in this NDC Security 2018 conference talk. Discover how to analyze web traffic and transform request logs into actionable data for identifying threat actors by intent and categorizing them for quantitative risk analysis. Learn to create a dynamic threat model that adapts to the constantly shifting threat landscape, enabling continuous examination of security controls. Gain insights into developing a quantitative risk-driven approach to security and understand the importance of this data in driving risk analysis and creating an effective security program. Delve into topics such as threat event frequency, automated threat scenario building, and the use of Markov chains for modeling both predictable and irrational behavior. Understand how to leverage intent and capability in risk analysis, build near real-time threat models, and maintain active risk registers for improved communication with business stakeholders. Acquire valuable skills to focus on what truly matters in your security efforts and optimize your organization's network security.
Read more