From Attacks To Action – Building a Usable Threat Model To Drive Defensive Choices by Tony Sager
Critical Security Controls Close the Threat Gap
By any historical standard, it would be fair to call today the "Golden Age Of Threat". As defenders, never before in our history have we known so much about Bad Guys, vulnerabilities, attacks, incidents, tradecraft, exploitation, etc. But the sharing of threat intelligence is not a miracle cure – it's just the means to an end. We need to translate this information into specific and scalable defensive actions that will prevent and manage these attacks in the first place.
In this webcast, we'll describe how the non-profit Council on CyberSecurity takes community approach to this problem, working with numerous companies and individuals who analyze attacks and adversaries for a living, and then translating that knowledge into defensive actions that are captured in the Critical Security Controls. We'll describe how this has evolved from an informal consensus among trusted friends to a more managed community workflow that directly maps from numerous authoritative threat and incident sources (starting with the Verizon Data Breach Investigation Report of 2013). We also discuss how such an approach naturally synchronizes with various Risk Management Frameworks, including the Executive Order Cybersecurity Framework from NIST.
This approach gives you value from information you don't have time to read, experts you'll never meet, insight you can't develop alone, and most importantly a translation to action that you must have in order to survive. As long as the Bad Guys are beating up on us, we might as well learn something from it.