4 hours 42 minutes
hello and welcome to our less module dissemination and feedback.
This is the first lesson, and it will be an introduction to the model. In this module, we will discover together the meaning off dissemination,
the different forms off intelligence products,
the meaning off sharing and the importance of sharing
in the cyber threat and collisions.
And finally, we would see
what is the feedback part off the dissemination feet.
Over the last years, the numbers off I t security incidents has been constantly increasing among companies as single entities are no longer able to handle the vast amount of possible attack scenarios. Acting collaboratively against such attacks is an emerging trend.
It is widely believed that operated approaches in particular those based on exchange off threat intelligence information
can contribute significantly to improve defensive capabilities.
The finish it protect off this process must get to the right hands to be effective
so the intelligence cycle must look back up in itself.
These reports and assessments are delivered to clients or the leadership who come see on of the cycle in the first place.
Briefly dissemination involves getting the Finnish intelligence output to the places it needs to go in order to derive results and address the risks. City I teams must distribute their Finnish intelligence reports to the appropriate stakeholders.
Most off cyber security organizations have at least six teams that can benefit from threat intelligence.
These individuals typically range from sock analysts to senior leadership responsible for allocated resources and set in strategic priorities.
Security professionals Endler from the way the U. S Department of Defense approaches intelligence.
the agency was absolutely overwhelmed with information on adversary activity
and had to establish frameworks for dealing with the data.
As a result, the military now considers and versions at three levels
strategic, operational and tactical
Strategic intelligence informs the most senior decision makers.
Operational intelligence is aiming at those making day to day decisions, and technical intelligence is focused on units in needs off instantaneous information.
For each of these audience, you need to ask,
what threat intelligence do they need?
How should the intelligence be presented to make it easily understandable and actionable for that audience?
How often should we provide updates and other information?
And through what media should the intelligence be disseminated? We will see each one off these three forms in more details within their core spending videos.
This speed at which cyber criminals operate and be worrying for those tasked with defending networks from attacks.
So at actors can weaponize vulnerabilities within days off them being discovered
and successful exploits or techniques will rapidly spread amongst library criminal communities.
Companies need to be sharing more security indulgence with industry peers, toe better, defend against these threats and more rapidly adapt to ever changing threats.
A key factor for realizing cooperated approaches are the underlying threat. Intelligence data formats.
The offer. A semi structured representation off identified threats and ensure a common understanding off security related observations. As the document incidents use in general mark up language is a common characteristic. Off these formats is a good MACHIN readability
structure of threat intelligence
ease off a great value for experts
as it enables them to understand threats and attacks. However,
this is only possible when experts are able to read and analyze thes information.
I believe that it is critically important to understand your overall intelligence priorities and the requirements all the security teams that will be consuming threat intelligence. The feedback loop is off the utmost importance, eh, boss
Classical intelligence and Cyber Threat Intelligence.
Its main goal is to adjust let requirements made by the decision makers, but it is also used in tactical weighs in cyber threat intelligence. For example, feedback on usage off indicators can be usedto understand trends off attacks.
The effectiveness off
One cycle off threat intelligence will determine the essential elements off information
that is needed for the next cycle, including what space is to focus on when collecting data
and how first action needs to be taken
up in receiving the cyber threat intelligence finish, it reports.
Stakeholders should provide feedback to help fine tune future. It orations
all the intelligence distribution
and inform future intelligence operations.
is the timely conveyance off completed intelligence products in an appropriate format to the intended consumers.
The frequency off dissemination
should match the time period on which the continent is based.
For example, operational material needs to be delivered frequently, whereas strategy content
will be more intermittent.
In this lesson, we had a no overview off dissemination. We've seen the different forms, often delusions which are tactical, operational and strategic intelligence.
We've also seen an important part all the dissemination which is sharing,
and another important part of the dissemination phase, which is feedback.
This is all for the introduction to the module dissemination and feedback. The next video will cover the technical aspect off disseminating intelligence.
Penetration Testing and Ethical Hacking
The Penetration Testing and Ethical Hacking course prepares students for certifications, like CEH. This course ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training
This course prepares you for the ATT&CK® Cyber Threat Intelligence Certification, and provides hands-on instruction ...
3 CEU/CPE Hours Available
Certificate of Completion Offered