Overview
Syllabus
Adaptive Threat Modeling
If there isn't a reason, stop doing it
It's the reason you're doing this!
Security should always come with purpose and intent
How do we understand threats?
Threat modeling is a procedure for optimizing network Security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of threats to the system.
Drawing, documenting, prioritizing
We're not going to cover methodologies
Focus on reality
Clearly define the capabilities of the threat actor
Understand what the true business impact is
Threat Event Frequency
In order to determine risk we need to identify how often
We can do this with a SIEM
Or via custom tooling
Whatever you do, use the data!
Deliver value, focus, and prioritize
You have realized that things change
Start building threat scenarios automatically
Both predictable and irrational behavior can be modeled
Think about a series of requests as a state transition
You can produce Markov chains from behavioral patterns
Use the request information to produce intended and identifiably malicious transition matrices
You can take this incredibly far
Intent and capability are vital to risk analysis
Using these Markov chains, you can show both
Once you identify this you can build your threat models in near real time
This gives you apply controls to scenarios
Active risk registers tell everyone the story
It allows you to be in constant communication with the business
You can't do it all
Learn to focus on what matters
Taught by
NDC Conferences