《Rebecca Taylor - 拥抱威胁情报的力量——网络安全的游戏规则改变者.pdf》由会员分享,可在线阅读,更多相关《Rebecca Taylor - 拥抱威胁情报的力量——网络安全的游戏规则改变者.pdf(20页珍藏版)》请在三个皮匠报告上搜索。
1、/Secureworks/Confidential-Limited External DistributionEmbracing the Power of Threat Intelligence:A Game-Changer in CybersecurityRebecca Taylor,Threat Intelligence Knowledge Manager&Human Intelligence Researcher,Secureworks/Secureworks/Confidential-Limited External Distribution“Threat intelligence i
2、s about understanding the landscape of threats,their sources,methods employed and potential targets.”Source:Forbes/Secureworks/Confidential-Limited External DistributionTI Knowledge Manager Role:To ensure threat intelligence is captured,fit for use and trustworthy.To ensure threat intelligence is ap
3、plied to Taegis to protect customers.To follow knowledge management best practices for collecting,sharing,managing,and deploying critical human and TI knowledge.AccessibilityVerificationStandardisation/Secureworks/Confidential-Limited External DistributionAccessibilityVerificationStandardisationTo s
4、et the standard.Replicated,managed and monitored lines in the sand.ConsistencyTo validate.Can we trust it?Does it make sense?Does it fit with what we know?The ease at which someone can find,retrieve,understand and use your intelligence./Secureworks/Confidential-Limited External Distribution/Securewo
5、rks/Confidential-Limited External DistributionDATADiffering sources feed into the mix of data/indicators available to Secureworks CTU.I N FO R M AT I O NTIMS-ISRepositoriesMaster Data ManagementK N O W L E D G ETIMS2 Investigations&Threat GraphsW I S D O MReputation ListsTaegisIncident ResponseMater
6、ials/ProductsFocus on ensuring trust,verifying data and its quality,and applying context:Automated WorkflowsTriage EngineAutomated tagging and context added consistently and to supplement fidelity.These aid research,understanding of the indicator,and can trigger off other processes./Secureworks/Conf