SlideShare ist ein Scribd-Unternehmen logo
OODA Loop for Life and CTI
(originally slated as “Not Your Grandma's CTI OODA Loop”
Dave Eilken - CactusCon 2017
Intro / Agenda
- About Me
- OODA in Detail
- Cyber Intelligence Processes
- A Different Perspective
Presentation Scope
➔ 30,000 ft. View
(Across Disciplines)
➔ Top of Mind
(Day-to-Day)
➔ Academic
(Deep Dive)
Mental Models
Multi-Disciplinary / Multi-Cultural - jack of
all trades master of none or renaissance man?
➔ Designer & Builder
Architect, Project Manager
➔ Old-China Hand
10 years over the span of 20 in Shanghai
➔ Technologist
Childhood hobby turned profession
➔ Arm-Chair Economist
Go-to-Market Business Strategist
The Original Revised OODA Loop
OODA
Observe
Through Sensory Inputs
Orient
Understand via Mental Models
Decide
Guess at Best Approach
Act
Test the Hypothesis
John Richard Boyd - distinguished fighter
pilot, developed military theories in the ‘60s
Observe Orient Decide Act
Unfolding
Circumstances
Outside
Information
Unfolding
Interaction With
Environment
Implicit
Guidance &
Control
Implicit Guidance
& Control
Feedback Loops
Unfolding
Interaction With
Environment
Simple OODA (maybe)
Your Sensory Inputs
We have five senses but we should be
open to other options that provide
additional context
CTI Note
Intelligence sources can
be both internal and
external.
Know what you’re
processing and limit
black box sources.
OBSERVE
ISACs & ISAOs
ISACs - Information Sharing and Analysis Centers.
Nonprofit organizations that act as a central
resource for gathering information on cyber threats
to critical infrastructure and providing two-way
sharing of information between the private and
public sector
ISAOs - Broader designation encompassing all
industries
➔ Build Trust
➔ Gather & Analyze
➔ Communicate
Understanding Us
How we understand the world based
on mental models
● Cultural Traditions
● Genetic Heritage
● Previous Experience
● Analysis & Synthesis
● New Information
CTI Note
Personal and procedural
biases can distort
orientation
ORIENT
Schwerpunkt Focus
Gödel - information is always incomplete
Heisenberg - the physical world is always uncertain
2nd Law of Thermodynamics - closed system entropy
You’ve got to have models in your
head and you’ve got to array your
experience - both vicarious and
direct - onto this latticework of
mental models.
- Charlie Munger
Mental Models
“All the wisdom of the world is not to be
found in one little academic department.”
“When we try to pick out anything by itself,
we find it hitched to everything else in the
universe.”
Build a Toolkit Across Disciplines
● Math & Logic
● Physics
● Thermodynamics
● Biology
● Psychology
● Anthropology
● Conflict (Game Theory)
● Engineering
● Economics
● Statistics
● History
Destroy & Create
Rebuild, Retire, Reposition
Skis, Bicycle, Motorboat, Tank
=
ABO
Always Be Orienting
Validate Mental Models
Practice, Practice, Practice until you have
Fingertip Feel
doubt, mistrust, confusion, disorder, fear, panic, and chaos
Tempo (be unpredictable)
● Fast alone is not good enough - changes in rhythm
put the opponent off balance. Sends them back to
square one.
● Great for 1 on 1 competition, not so good when
multiple parties / external partners are involved
Get inside your opponent's OODA Loop
What are your mental models for…?
Are you continually (re)orienting?
Hackivists
Political issue
agenda
Nation
States
IP, technology,
political, military
Cyber
Criminals
$$$ for PII, direct
attacks to financial
Insiders
Revenge, $$$ in
coordination with
criminals
Decide - Act ➤ Observe - Orient
Too Slow = More Risk
Choose the best mental model and go
with your best guess.
CTI Note
Analyzing intelligence
data can cause decision
paralysis.
DECIDE
Fingerspitzengefuhl
Fingertip Feel
Robert Greene - expands in book, Mastery
Decisions can be made instantaneously, moving from
Orientation to Action immediately
TRY AND SKIP DECIDE
Just Do It
Trust your mental models and put fear
of failure aside
CTI Note
Action is required to
reduce risk and
feedback from the
ongoing environmental
response is critical
ACT
Take Jabs
Make a lot of small quick
moves that test out ideas and
see what happens in response
- Position for the big blow
- Take baby-steps in the form of minimal viable
products / projects (MVPs) to optimize test -
response feedback
CTI Note
Balance small (less risky
initiatives with larger
(riskier ones)...but
remember there are
large projects that have
less risk
Traditional CTI Lifecycle
PHASE 1
Plan & Direction
PHASE 5
Dissemination & Integration
PHASE 2
Collect / Aggregate Sources
PHASE 4
Analysis & Production
PHASE 3
Process & Exploitation
Challenges
Mostly linear process, one-way external interface
➔ Relatively Slow
Intelligence must be vetted prior to action.
No velocity to repeat OODA loop.
➔ High Entropy
Limited external communication causes
stale information
➔ Disjointed Decision-Makers
CTI products delivered to SecOPS may
have additional rounds of review and
reorientation.
A New Approach
Information
Sharing (ISACs)
Continuous
Monitoring
PHASE 1
Collect / Aggregate Sources
(Automated)
PHASE 5
Remediate / Mitigate
PHASE 2
Correlate External Against Internal Data
(Automated Action)
PHASE 4
Triage Events
PHASE 3
Review Events
Advantages
Skip data analysis - Act to gain ability to Observe
➔ Much Faster Observations
Intelligence is utilized instantly to “see”
potential risks. Automation is highly leveraged
➔ Open & Integrated
Internal SecOPS & External Communities are
holistically intertwined
➔ Better Context
Internal & external monitoring and feedback
➔ Scaling Potential
Involves entire communities crowdsourcing
Orientation
Requirements
Although better for many, some will resist
➔ Openness & Trust
Sharing intelligence with a community.
Works best if everyone sees events on
everyone’s network in real-time
➔ Integrated Intelligence Team
CTI can’t operate outside of SOC.
(Isolated CTI has shown little value)
➔ Capabilities
Build automation and managed SOC or
buy a platform and outsource to MSSP
Sensors
Understand
Models Decide Act
Internal Data
Network, Logs,
Hosts, etc.
External
Intelligence
ISACs, ISAOs,
Professional &
OSINT Feeds
Unfolding
Interaction With
Environment
Implicit
Guidance &
Control
Implicit Guidance
& Control
Feedback Loops
Unfolding
Interaction With
Environment
CTI OODA
External / Internal Correlation ➤ Events Triage Remediate / Mitigate
Tools to See & Organize Algorithms, Human Mental Models Tools to Block, Rebuild, Etc.
Structured Threat Information Expression (STIX™) is a language
and serialization format used to exchange cyber threat
intelligence (CTI) - Graph based
● XML can still be used but JSON is mandatory
● SROs - Relationship & Sightings
Trusted Automated Exchange of Intelligence Information
(TAXII™) is an application layer protocol for the communication
of cyber threat information in a simple and scalable manner
● Works over HTTPS
● Collections & Channels
Note about STIX and TAXII 2.0
STIX Domain Objects (SDOs)
Attack Pattern
Campaign
Course of
Action
Identity
Indicator
Intrusion Set
Malware
Observed Data
Report
Threat Actor
Tool
Vulnerability
www.oasis-open.org/committees/cti/
www.us-cert.gov/ais
Lessons
● Traditional CTI Lifecycle is too slow and creates more risk
● Practice, test & revise mental models often
● Don’t allow fear to get in the way of action
David Eilken
eilken@gmail.com
“Don't be too timid and squeamish about your actions. All life is an
experiment. The more experiments you make the better.”
― Ralph Waldo Emerson

Weitere ähnliche Inhalte

Was ist angesagt?

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
AAKASH S
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
AlienVault
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
Margarete McGrath
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
Deep Shankar Yadav
 
The Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixThe Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence Matrix
Frode Hommedal
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
Maganathin Veeraragaloo
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
seadeloitte
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
Doreen Loeber
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
John Gilligan
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
Boris Loukanov
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
Priyanka Aash
 
Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018
Christopher Korban
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
Brencil Kaimba
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
university of education,Lahore
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
👀 Joe Gray
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service
Netpluz Asia Pte Ltd
 

Was ist angesagt? (20)

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
 
The Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixThe Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence Matrix
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service
 

Ähnlich wie CactusCon 2017 - OODA Loop in life & cyber threat intelligence

ALVIS for Innovation and Decision Making
ALVIS for Innovation and Decision MakingALVIS for Innovation and Decision Making
ALVIS for Innovation and Decision Making
Navneet Bhushan
 
Knowledge Era Paradigms -agile indiaconf2016
Knowledge Era Paradigms -agile indiaconf2016Knowledge Era Paradigms -agile indiaconf2016
Knowledge Era Paradigms -agile indiaconf2016
Vishweshwar Hegde
 
AI/ML as an empirical science
AI/ML as an empirical scienceAI/ML as an empirical science
AI/ML as an empirical science
Deakin University
 
Managing your tech career
Managing your tech careerManaging your tech career
Managing your tech career
Greg Jensen
 
Agile leadership practices for PIONEERS
 Agile leadership practices for PIONEERS Agile leadership practices for PIONEERS
Agile leadership practices for PIONEERS
Stefan Haas
 
Can We Do Agile? Barriers to Agile Adoption
Can We Do Agile? Barriers to Agile AdoptionCan We Do Agile? Barriers to Agile Adoption
Can We Do Agile? Barriers to Agile Adoption
TechWell
 
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinMeet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
Anton Chuvakin
 
Start small, stay small!
Start small, stay small!Start small, stay small!
Start small, stay small!
Marcin Czenko
 
From Human Intelligence to Machine Intelligence
From Human Intelligence to Machine IntelligenceFrom Human Intelligence to Machine Intelligence
From Human Intelligence to Machine Intelligence
NUS-ISS
 
Driving healthy habits through behavioral product design (short) pdf
Driving healthy habits through behavioral product design (short) pdfDriving healthy habits through behavioral product design (short) pdf
Driving healthy habits through behavioral product design (short) pdf
Sunil Maulik
 
Behavioural Meetup: Stuart Church on Darwin to Design
Behavioural Meetup: Stuart Church on Darwin to DesignBehavioural Meetup: Stuart Church on Darwin to Design
Behavioural Meetup: Stuart Church on Darwin to Design
Prime Decision
 
Human centered design and Social media
Human centered design and Social mediaHuman centered design and Social media
Human centered design and Social media
Chalmers University of Technology
 
Deep Learning Class #0 - You Can Do It
Deep Learning Class #0 - You Can Do ItDeep Learning Class #0 - You Can Do It
Deep Learning Class #0 - You Can Do It
Holberton School
 
DL Classe 0 - You can do it
DL Classe 0 - You can do itDL Classe 0 - You can do it
DL Classe 0 - You can do it
Gregory Renard
 
Risks and strategies adopting agile in medium and large organizations
Risks and strategies adopting agile in medium and large organizationsRisks and strategies adopting agile in medium and large organizations
Risks and strategies adopting agile in medium and large organizations
Agile Software Community of India
 
Vishu's Presentati​on for ALN Knowldge Era Pradigms
Vishu's Presentati​on for ALN Knowldge Era PradigmsVishu's Presentati​on for ALN Knowldge Era Pradigms
Vishu's Presentati​on for ALN Knowldge Era Pradigms
Prasad Prabhakaran
 
An Introduction to Design Thinking - DevDay Conference Colombo
An Introduction to Design Thinking - DevDay Conference ColomboAn Introduction to Design Thinking - DevDay Conference Colombo
An Introduction to Design Thinking - DevDay Conference Colombo
Raomal Perera
 
Interaction design & quantified self
Interaction design & quantified selfInteraction design & quantified self
Interaction design & quantified self
Paul Sas
 
The Importance of Logic in Business
The Importance of Logic in BusinessThe Importance of Logic in Business
The Importance of Logic in Business
Goutama Bachtiar
 
Intro to Agile and Lean UX
Intro to Agile and Lean UXIntro to Agile and Lean UX
Intro to Agile and Lean UX
Jacklyn Burgan
 

Ähnlich wie CactusCon 2017 - OODA Loop in life & cyber threat intelligence (20)

ALVIS for Innovation and Decision Making
ALVIS for Innovation and Decision MakingALVIS for Innovation and Decision Making
ALVIS for Innovation and Decision Making
 
Knowledge Era Paradigms -agile indiaconf2016
Knowledge Era Paradigms -agile indiaconf2016Knowledge Era Paradigms -agile indiaconf2016
Knowledge Era Paradigms -agile indiaconf2016
 
AI/ML as an empirical science
AI/ML as an empirical scienceAI/ML as an empirical science
AI/ML as an empirical science
 
Managing your tech career
Managing your tech careerManaging your tech career
Managing your tech career
 
Agile leadership practices for PIONEERS
 Agile leadership practices for PIONEERS Agile leadership practices for PIONEERS
Agile leadership practices for PIONEERS
 
Can We Do Agile? Barriers to Agile Adoption
Can We Do Agile? Barriers to Agile AdoptionCan We Do Agile? Barriers to Agile Adoption
Can We Do Agile? Barriers to Agile Adoption
 
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinMeet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
 
Start small, stay small!
Start small, stay small!Start small, stay small!
Start small, stay small!
 
From Human Intelligence to Machine Intelligence
From Human Intelligence to Machine IntelligenceFrom Human Intelligence to Machine Intelligence
From Human Intelligence to Machine Intelligence
 
Driving healthy habits through behavioral product design (short) pdf
Driving healthy habits through behavioral product design (short) pdfDriving healthy habits through behavioral product design (short) pdf
Driving healthy habits through behavioral product design (short) pdf
 
Behavioural Meetup: Stuart Church on Darwin to Design
Behavioural Meetup: Stuart Church on Darwin to DesignBehavioural Meetup: Stuart Church on Darwin to Design
Behavioural Meetup: Stuart Church on Darwin to Design
 
Human centered design and Social media
Human centered design and Social mediaHuman centered design and Social media
Human centered design and Social media
 
Deep Learning Class #0 - You Can Do It
Deep Learning Class #0 - You Can Do ItDeep Learning Class #0 - You Can Do It
Deep Learning Class #0 - You Can Do It
 
DL Classe 0 - You can do it
DL Classe 0 - You can do itDL Classe 0 - You can do it
DL Classe 0 - You can do it
 
Risks and strategies adopting agile in medium and large organizations
Risks and strategies adopting agile in medium and large organizationsRisks and strategies adopting agile in medium and large organizations
Risks and strategies adopting agile in medium and large organizations
 
Vishu's Presentati​on for ALN Knowldge Era Pradigms
Vishu's Presentati​on for ALN Knowldge Era PradigmsVishu's Presentati​on for ALN Knowldge Era Pradigms
Vishu's Presentati​on for ALN Knowldge Era Pradigms
 
An Introduction to Design Thinking - DevDay Conference Colombo
An Introduction to Design Thinking - DevDay Conference ColomboAn Introduction to Design Thinking - DevDay Conference Colombo
An Introduction to Design Thinking - DevDay Conference Colombo
 
Interaction design & quantified self
Interaction design & quantified selfInteraction design & quantified self
Interaction design & quantified self
 
The Importance of Logic in Business
The Importance of Logic in BusinessThe Importance of Logic in Business
The Importance of Logic in Business
 
Intro to Agile and Lean UX
Intro to Agile and Lean UXIntro to Agile and Lean UX
Intro to Agile and Lean UX
 

Kürzlich hochgeladen

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 

Kürzlich hochgeladen (20)

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 

CactusCon 2017 - OODA Loop in life & cyber threat intelligence

  • 1. OODA Loop for Life and CTI (originally slated as “Not Your Grandma's CTI OODA Loop” Dave Eilken - CactusCon 2017
  • 2. Intro / Agenda - About Me - OODA in Detail - Cyber Intelligence Processes - A Different Perspective Presentation Scope ➔ 30,000 ft. View (Across Disciplines) ➔ Top of Mind (Day-to-Day) ➔ Academic (Deep Dive)
  • 3. Mental Models Multi-Disciplinary / Multi-Cultural - jack of all trades master of none or renaissance man? ➔ Designer & Builder Architect, Project Manager ➔ Old-China Hand 10 years over the span of 20 in Shanghai ➔ Technologist Childhood hobby turned profession ➔ Arm-Chair Economist Go-to-Market Business Strategist
  • 5. OODA Observe Through Sensory Inputs Orient Understand via Mental Models Decide Guess at Best Approach Act Test the Hypothesis John Richard Boyd - distinguished fighter pilot, developed military theories in the ‘60s
  • 6. Observe Orient Decide Act Unfolding Circumstances Outside Information Unfolding Interaction With Environment Implicit Guidance & Control Implicit Guidance & Control Feedback Loops Unfolding Interaction With Environment Simple OODA (maybe)
  • 7. Your Sensory Inputs We have five senses but we should be open to other options that provide additional context CTI Note Intelligence sources can be both internal and external. Know what you’re processing and limit black box sources. OBSERVE
  • 8. ISACs & ISAOs ISACs - Information Sharing and Analysis Centers. Nonprofit organizations that act as a central resource for gathering information on cyber threats to critical infrastructure and providing two-way sharing of information between the private and public sector ISAOs - Broader designation encompassing all industries ➔ Build Trust ➔ Gather & Analyze ➔ Communicate
  • 9. Understanding Us How we understand the world based on mental models ● Cultural Traditions ● Genetic Heritage ● Previous Experience ● Analysis & Synthesis ● New Information CTI Note Personal and procedural biases can distort orientation ORIENT
  • 10. Schwerpunkt Focus Gödel - information is always incomplete Heisenberg - the physical world is always uncertain 2nd Law of Thermodynamics - closed system entropy
  • 11. You’ve got to have models in your head and you’ve got to array your experience - both vicarious and direct - onto this latticework of mental models. - Charlie Munger
  • 12. Mental Models “All the wisdom of the world is not to be found in one little academic department.” “When we try to pick out anything by itself, we find it hitched to everything else in the universe.” Build a Toolkit Across Disciplines ● Math & Logic ● Physics ● Thermodynamics ● Biology ● Psychology ● Anthropology ● Conflict (Game Theory) ● Engineering ● Economics ● Statistics ● History
  • 13. Destroy & Create Rebuild, Retire, Reposition Skis, Bicycle, Motorboat, Tank = ABO Always Be Orienting Validate Mental Models Practice, Practice, Practice until you have Fingertip Feel
  • 14. doubt, mistrust, confusion, disorder, fear, panic, and chaos Tempo (be unpredictable) ● Fast alone is not good enough - changes in rhythm put the opponent off balance. Sends them back to square one. ● Great for 1 on 1 competition, not so good when multiple parties / external partners are involved Get inside your opponent's OODA Loop
  • 15. What are your mental models for…? Are you continually (re)orienting? Hackivists Political issue agenda Nation States IP, technology, political, military Cyber Criminals $$$ for PII, direct attacks to financial Insiders Revenge, $$$ in coordination with criminals Decide - Act ➤ Observe - Orient
  • 16. Too Slow = More Risk Choose the best mental model and go with your best guess. CTI Note Analyzing intelligence data can cause decision paralysis. DECIDE
  • 17. Fingerspitzengefuhl Fingertip Feel Robert Greene - expands in book, Mastery Decisions can be made instantaneously, moving from Orientation to Action immediately TRY AND SKIP DECIDE
  • 18. Just Do It Trust your mental models and put fear of failure aside CTI Note Action is required to reduce risk and feedback from the ongoing environmental response is critical ACT
  • 19. Take Jabs Make a lot of small quick moves that test out ideas and see what happens in response - Position for the big blow - Take baby-steps in the form of minimal viable products / projects (MVPs) to optimize test - response feedback CTI Note Balance small (less risky initiatives with larger (riskier ones)...but remember there are large projects that have less risk
  • 20. Traditional CTI Lifecycle PHASE 1 Plan & Direction PHASE 5 Dissemination & Integration PHASE 2 Collect / Aggregate Sources PHASE 4 Analysis & Production PHASE 3 Process & Exploitation
  • 21. Challenges Mostly linear process, one-way external interface ➔ Relatively Slow Intelligence must be vetted prior to action. No velocity to repeat OODA loop. ➔ High Entropy Limited external communication causes stale information ➔ Disjointed Decision-Makers CTI products delivered to SecOPS may have additional rounds of review and reorientation.
  • 22. A New Approach Information Sharing (ISACs) Continuous Monitoring PHASE 1 Collect / Aggregate Sources (Automated) PHASE 5 Remediate / Mitigate PHASE 2 Correlate External Against Internal Data (Automated Action) PHASE 4 Triage Events PHASE 3 Review Events
  • 23. Advantages Skip data analysis - Act to gain ability to Observe ➔ Much Faster Observations Intelligence is utilized instantly to “see” potential risks. Automation is highly leveraged ➔ Open & Integrated Internal SecOPS & External Communities are holistically intertwined ➔ Better Context Internal & external monitoring and feedback ➔ Scaling Potential Involves entire communities crowdsourcing Orientation
  • 24. Requirements Although better for many, some will resist ➔ Openness & Trust Sharing intelligence with a community. Works best if everyone sees events on everyone’s network in real-time ➔ Integrated Intelligence Team CTI can’t operate outside of SOC. (Isolated CTI has shown little value) ➔ Capabilities Build automation and managed SOC or buy a platform and outsource to MSSP
  • 25. Sensors Understand Models Decide Act Internal Data Network, Logs, Hosts, etc. External Intelligence ISACs, ISAOs, Professional & OSINT Feeds Unfolding Interaction With Environment Implicit Guidance & Control Implicit Guidance & Control Feedback Loops Unfolding Interaction With Environment CTI OODA External / Internal Correlation ➤ Events Triage Remediate / Mitigate Tools to See & Organize Algorithms, Human Mental Models Tools to Block, Rebuild, Etc.
  • 26. Structured Threat Information Expression (STIX™) is a language and serialization format used to exchange cyber threat intelligence (CTI) - Graph based ● XML can still be used but JSON is mandatory ● SROs - Relationship & Sightings Trusted Automated Exchange of Intelligence Information (TAXII™) is an application layer protocol for the communication of cyber threat information in a simple and scalable manner ● Works over HTTPS ● Collections & Channels Note about STIX and TAXII 2.0 STIX Domain Objects (SDOs) Attack Pattern Campaign Course of Action Identity Indicator Intrusion Set Malware Observed Data Report Threat Actor Tool Vulnerability www.oasis-open.org/committees/cti/ www.us-cert.gov/ais
  • 27. Lessons ● Traditional CTI Lifecycle is too slow and creates more risk ● Practice, test & revise mental models often ● Don’t allow fear to get in the way of action David Eilken eilken@gmail.com “Don't be too timid and squeamish about your actions. All life is an experiment. The more experiments you make the better.” ― Ralph Waldo Emerson