diff --git a/b.1-best-practices-in-threat-intelligence/content.tex b/b.1-best-practices-in-threat-intelligence/content.tex index 66a219c..de08b58 100755 --- a/b.1-best-practices-in-threat-intelligence/content.tex +++ b/b.1-best-practices-in-threat-intelligence/content.tex @@ -19,10 +19,18 @@ \begin{frame} \frametitle{(Threat) Intelligence} \begin{itemize} - \item {\bf Cyber threat intelligence (CTI) is a vast concept} which includes different fields such as intelligence as defined in the military community or in the financial sector or the intelligence community. - \item {\bf MISP project doesn't want to lock an organisation or an user into a specific model}. Each model is useful depending of the objectives from an organisation. - \item A set of pre-defined knowledge base or data-models are available and organisation can select (or create) what they need. - \item During this session, an overview of the most used taxonomies, galaxies and objects will be described. + \item {\bf Cyber threat intelligence (CTI) is a vast concept} which includes different fields such as intelligence as defined in the military community or in the financial sector or the intelligence community + \item {\bf MISP project doesn't want to lock an organisation or an user into a specific model}. Each model is useful depending of the objectives from an organisation + \item A set of pre-defined knowledge base or data-models are available and organisation can select (or create) what they need + \item During this session, an overview of the most used taxonomies, galaxies and objects will be described +\end{itemize} +\end{frame} + +\begin{frame} +\frametitle{Meta information and Contextualisation} +\begin{itemize} +\item Quality of indicators/attributes are important but {\bf tagging and classification are also critical to ensure actionable information} + \item Tagging intelligence is done by using tags in MISP which are often originating from MISP taxonomy libraries \end{itemize} \end{frame} @@ -40,3 +48,19 @@ and keep an history.\\ \end{columns} \end{frame} + +\begin{frame} +\frametitle{file object} +\begin{columns}[totalwidth=\textwidth] + \column{0.49\textwidth}\underline{Use case}\\ + \begin{itemize} + \item A file sample was received by email or extracted from VirusTotal. + \item A list of file hashes were included in a report. + \item A hash value was mentioned in a blog post. + \end{itemize} + \column{0.49\textwidth}\underline{Object to use}\\ + The file object can be used to describe file. It's usual to have partial meta information such as a single hash and a filename.\\ + \includegraphics[scale=0.25]{fileobject.png} +\end{columns} +\end{frame} +