Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

LESSON 2

Utilizing Threat Data and Intelligence

©2021 SiemHunters

Topic

Lesson Objectives

In this lesson you will:

Classify threats and threat actor types.

Utilize attack frameworks and indicator management.

Utilize threat modeling and hunting methodologies.

©2021 SiemHunters

Topic 2C

Utilize Threat Modeling and Hunting

Methodologies

©2021 SiemHunters

Proactive Threat-Hunting Benefits

Improving detection capabilities

Integrated intelligence

Reducing the attack surface area and blocking attack vectors

©2021 SiemHunters

Threat Modeling Adversary Capability and Attack Surface

Adversary Capability

Total Attack Surface

Attack Vector

©2021 SiemHunters

Topic

Threat Modeling Impact and Likelihood

  • Discovering the threat's motivation. What does an attacker stand to gain from conducting an attack?
  • Conducting a trend analysis to identify emerging adversary capabilities and attack vectors. How effective are these attacks, and how have they been exploited before?
  • Determining the threat's annual rate of occurrence (ARO). How often does the threat successfully affect other enterprises?

©2021 SiemHunters

Proactive Threat Hunting

  • Establishing a Hypothesis

  • Profiling Threat Actors and Activities

  • Threat Hunting Tactics

©2021 SiemHunters

Topic

Learn more about creating dynamic, engaging presentations with Prezi