2022-12-06 22:44:11 +01:00
% DO NOT COMPILE THIS FILE DIRECTLY!
% This is included by the other .tex files.
\begin { frame}
\titlepage
\end { frame}
\begin { frame}
\frametitle { What is MISP?}
\begin { itemize}
\item MISP is a { \bf threat information sharing} platform that is free \& open source software
\item A tool that { \bf collects} information from partners, your analysts, your tools, feeds
\item Normalises, { \bf correlates} , { \bf enriches} and { \bf connects} the data
\item Allows teams and communities to { \bf collaborate} and { \bf share}
\item { \bf Feeds} automated protective tools and analyst tools with the output
\item MISP is a { \bf complete threat intelligence platform} with strong sharing capabilities and extendability
\end { itemize}
\end { frame}
\begin { frame} [plain,c]
\begin { center}
{ \Huge Two years from now, threat intelligence will be easy.\\ }
2022-12-07 08:03:11 +01:00
{ \it Bill Gates had he worked in threat intelligence}
2022-12-06 22:44:11 +01:00
\end { center}
\end { frame}
\begin { frame}
\frametitle { The aim of this presentation}
\begin { itemize}
2022-12-07 08:03:11 +01:00
\item { \Large Showing the { \bf evolution of threat intelligence} \footnote { based on our empirical view from users using/integrating with MISP} and
2022-12-06 22:44:11 +01:00
\item { \bf data-driven threat hunting} over the past years}
\item { \Large What can we expect in { \bf the future} ?}
\end { itemize}
\end { frame}
\begin { frame}
\frametitle { From standalone indicator to advanced object data models}
\begin { itemize}
2022-12-07 08:03:11 +01:00
\item In early 2012, MISP supported basic indicators sharing with a limited set of types
2022-12-06 22:44:11 +01:00
\item In 2022, MISP integrates a dynamic object model with advanced custom relationships
2022-12-07 08:03:11 +01:00
\item Why did it evolve this way?
2022-12-06 22:44:11 +01:00
\begin { itemize}
2022-12-07 08:03:11 +01:00
\item { \bf Increase in the use of intelligence across different sectors} . From threat-hunting\footnote { With different types of threat hunts, including TTP-driven, intelligence-driven, asset-driven...} to risk assessment and strategic decision making
2022-12-07 07:18:57 +01:00
\item { \bf Increased diversity\footnote { MISP object public store include 296 templates in 2022.} among analysts}
2022-12-06 22:44:11 +01:00
\end { itemize}
\end { itemize}
\end { frame}
\begin { frame}
\frametitle { Multitude of intelligence models}
\begin { itemize}
\item Chains, triangles, circles, diamonds, arrows, a mix or even a multi-layer matrix
2022-12-07 08:03:11 +01:00
\item There are { \bf no perfect intelligence models}
\item Organisations invent their models, reuse existing ones or are even more creative
2022-12-07 07:18:57 +01:00
\item Showing { \bf how diverse\footnote { Embrace the diversity of models, taxonomies. 146 taxonomies are available in MISP taxonomies.} our societies are}
2022-12-06 22:44:11 +01:00
\end { itemize}
\end { frame}
\begin { frame}
2022-12-07 08:03:11 +01:00
\frametitle { But some models can be game changers}
2022-12-06 22:44:11 +01:00
\begin { itemize}
2022-12-07 07:18:57 +01:00
\item With the introduction of { \bf MITRE ATT\& CK(tm)} in 2013, this was a game changer. What makes it a successful model?
\begin { itemize}
2022-12-07 08:03:11 +01:00
\item Based on real and actual data\footnote { FMX - Fort Meade Experiment} , not just theory
2022-12-07 07:18:57 +01:00
\item { \bf Continuous updates} were performed on ATT\& CK
\item Embraced and recommended by many communities (e.g. EU ATT\& CK community)
2022-12-07 08:03:11 +01:00
\item Change in usage and practices takes time\footnote { On a MISP community, 1\% of ATT\& CK techniques attached in 2013. In 2022, it's 72\% .}
\item { \bf Percolation} to other models (e.g. reusing the same matrix-like format)
2022-12-07 07:18:57 +01:00
\end { itemize}
2022-12-06 22:44:11 +01:00
\end { itemize}
\end { frame}
\begin { frame}
2022-12-07 07:18:57 +01:00
\frametitle { Unstructured versus structured intelligence}
2022-12-06 22:44:11 +01:00
\begin { itemize}
2022-12-07 07:18:57 +01:00
\item { \bf Building narratives is critical in threat intelligence}
\begin { itemize}
2022-12-07 08:03:11 +01:00
\item Intelligence narratives can be described in structured format (e.g. course-of-action)
\item Or written in natural language, used to describe higher-level structures (e.g. assesment, executive summary or strategic information)
2022-12-07 07:18:57 +01:00
\end { itemize}
2022-12-07 08:03:11 +01:00
\item For years, many thought that the narrative and structured intelligence were separated.
\item Accepting that { \bf structured and unstructed belong together\footnote { Mixed free-text Markdown reports with graph-oriented intelligence sharing in MISP increased during the past year.} } became critical.
2022-12-06 22:44:11 +01:00
\end { itemize}
\end { frame}
\begin { frame}
2022-12-07 07:18:57 +01:00
\frametitle { Automation processes - "playbooks"}
2022-12-06 22:44:11 +01:00
\begin { itemize}
2022-12-07 07:18:57 +01:00
\item { \bf Sharing detection engineering} information became more prevalent
\begin { itemize}
2022-12-07 08:03:11 +01:00
\item Sharing only the resulting analysis (indicators) is the bare minimum requirement in various sharing communities
2022-12-07 07:18:57 +01:00
\item Sharing the complete detection process\footnote { Detection rules, scripts and playbooks} increases\footnote { New object template to support advanced detection engineering or intelligene pipelines.}
2022-12-07 08:03:11 +01:00
\item Reproducible { \bf workflows and playbooks} play an important role in { \bf actionable intelligence} \footnote { MISP worflow blueprints}
2022-12-07 07:18:57 +01:00
\end { itemize}
2022-12-06 22:44:11 +01:00
\end { itemize}
\end { frame}
2022-12-07 07:32:54 +01:00
\begin { frame}
\frametitle { What's the future?}
\begin { itemize}
2022-12-07 08:03:11 +01:00
\item { \bf Sharing more} without disclosing the actual information\footnote { Growth of research about PSI (private set intersection) and an increased usage of MISP feed caching}
2022-12-07 07:32:54 +01:00
\item { \bf Automatic data modeling} on unstructured intelligence
\item Advanced sighting and { \bf feedback on engineering detection rules} \footnote { Sharing back training-sets or dataset with the actual false-positive detection}
\item Automation and sharing of the threat intelligence pipelines framework.
\end { itemize}
\end { frame}
2022-12-06 22:44:11 +01:00
\begin { frame}
2022-12-07 07:18:57 +01:00
\frametitle { Contact}
2022-12-06 22:44:11 +01:00
\begin { itemize}
2022-12-07 07:18:57 +01:00
\item Contact CIRCL / MISP Project
2022-12-06 22:44:11 +01:00
\begin { itemize}
2022-12-07 07:18:57 +01:00
\item \url { mailto:info@circl.lu} - \url { mailto:info@misp-project.org}
\item \url { https://www.misp-project.org/}
2022-12-06 22:44:11 +01:00
\item \url { https://www.circl.lu/}
2022-12-07 07:18:57 +01:00
\item Mastodon { \it @circl@social.circl.lu - @misp@misp-community.org}
2022-12-06 22:44:11 +01:00
\end { itemize}
\end { itemize}
\end { frame}