SlideShare a Scribd company logo
1 of 33
Defending the Enterprise with
Evernote
@grecs
NovaInfosec.com
Disclaimer
• Opinions expressed do not express the views
or opinions of my
– my employers
– my customers,
– my wife,
– my kids,
– my parents
– my in-laws
– my high school girlfriend from Canada
Defending the Enterprise with Evernote NovaInfosec.com@grecs,
Defending the Enterprise with Evernote NovaInfosec.com@grecs,
20 Yrs Industry
16 Yrs Infosec
5 Yrs SOC
Defending the Enterprise with Evernote NovaInfosec.com@grecs,
NovaInfosec Consulting
• 20 Years Industry/Infosec
Experience
• Security Engineering/
Architecture
• SOC 2.0/Transformation
• Security Training
datamation.com/cnews/article.php/3851071/Tech-Comics-Cloud-Computing-Consultants.htm
Defending the Enterprise with Evernote NovaInfosec.com@grecs,
PREMISE
Over Engineering
Build (at least try to) Before Buy
Premise
Over Engineering
• Tendency to Over
Complicate
• Keep It Simple Stupid
• What Can We Do Quick &
Dirty that Will Get Us 60-
70% of the Way There?
• Onboarding Workflow
System Example
Solution Fine As Is
Est. Requs. to Develop Eventual Solution
Premise
Build (at least try to) Before Buy
• Before Buying New Commercial Solution
– Try Quick & Dirty Solution In-House First
• Use Tools Already Have & All Familiar With
• Setup Good Set of Processes Since Lacks Safety Checks
• Have Smart People Actually Use Solution for 6-12 Mos.
• Continually Evolve Processes with Lessons Learned
– Maybe that Will Solve Your Needs
– Else Understand What Really Need  Commercial
• Invest in People & Process 1st, then Products
• Case In Point: Threat Intel Services
Defending the Enterprise with Evernote NovaInfosec.com@grecs,
BEGINNINGS
Dashboard 1.0
Dashboard 2.0
Dashboard 3.0
Take-Aways
Beginnings
Dashboard 1.0
• SOC Security Engineer Position Many Years Ago
Working to Create Dashboards
• Wanted to Measure What Risk Was
• Made Sense to Use Traditional Risk Equation
– Risk = Threat X Vulnerability (impact too)
– Had Vulnerability Data Based on Patch & Other Tools
– Threat? Decided to Use Vendor Threat Levels (e.g.,
SANS INFOCON, Symantec – normalize and average)
Beginnings
Dashboard 2.0
• Moved On as Analyst & Wanted to Keep Up
• Had Email Folder for Internal SOC Distros where
Analysts Post New & Updated Incidents
– Nothing from Outside (e.g., RSS feeds, external SOC
distros, …)
• Prior Dashboard Research Looked Like Good
Place to Start
• Build Own “Risk” tab on iGoogle via Various RSS
Feeds
• Included Internet Provided Vulnerability & Risk
Resources as Well
Beginnings
Dashboard 2.0 – Google Reader, iGoogle, Feedly
Beginnings
Dashboard 3.0
• Had Since Moved
from Feedly to
Netvibes for Since
Designed Ground
Up as Dashboard
• Added “Cyber
Intel” Tab with
Sources Still
Active from Feedly
Beginnings
Dashboarding Take-Aways
• Nice for “Blog” Post Feeds
• Tough to Follow for Data-Driven Feeds
– Changing Too Fast
– Feedly Pro
– NetVibes VIP
• Keep All Feed Data & Searchable
• Expensive for One-Off Analyst Resource
• Introduce Concept of One “Bucket” to Dump All Into
• Doesn’t Work for Periodically Updated Data Files
Defending the Enterprise with Evernote NovaInfosec.com@grecs,
PIVOT
Meanwhile…
Rebaseline
The Secret Weapon
Ah Ha
Pivot
Meanwhile…
• Threat Intel Market Growing
– Investigating Threat Intel
– Consulted Experts & Users of Threat Intel Services
• Basic Take-Aways
– Fascinating Area with Lots of Cool Things Mathematically
Correlated Together in Some Fancy Big Data Model
– Not Much Value Beyond Open Source Resources
– A Lot of Data Not Relevant to Organization
• Dashboard
– Was onto Something
– Pulling all Open Source Info Together
Pivot
Rebaseline
• NetVibes VIP but Cheaper & More Flexible
• Bucket to Dump All Data Into
– Blog/Other Feeds
– Data-Driven Feeds
– Data Files
– Other (anything else find – e.g., APT reports)
• Easily Find Data
– Searchable
– Categories
– Tagging for Viewing in Different Ways
• Cloud-Based So Wouldn’t Have to Maintain & Accessible
Everywhere
– Email Folder (like in old days but too kludgy)
– Log/Data Aggregation Tools
Pivot
The Secret Weapon
• Method for Using Evernote as GTD-Based Task
Mgmt System
– Treat Evernote Like a Database
– Notebook == Table
– Note == Free Form Record
• Organization
– Nested Notebooks
– Hierarchical Tagging (provide metadata structure)
• When (importance – e.g., 0-6)
• What (projects – e.g., SourceBoston, OSINT DB)
• Where (e.g., home, work, etc.)
• Who (e.g., people that action has to do with)
• Combination Above
• Search
– ~ Notebook, Tag, Keyword, or Combination Thereof
– Saved Searches
Pivot
Ah Ha
• Dump All Feeds/Data into Evernote Bucket
• Defined Notebooks & Hierarchical Tags for
Metadata (owner, feed, indicator type, etc.)
• Easy to Use Over Heavy Database or Workflow
Management System
• Perfect Open & Flexible Framework to Build
Off Of
• Start Dumping Everything Into
– Email to Evernote, IFTTT, Zapier, Bash Scripts, etc.
Defending the Enterprise with Evernote NovaInfosec.com@grecs,
THREE SOURCES OF THREAT INTEL
Open Source Intelligence
Information Sharing
Case Management
Existing Solutions
Three Sources of Threat Intel
Open Source Intelligence
• Boils Down to
– Indictors (e.g., IPs, Domains , URLs, Hashes, Email Addresses, … )
– Reports (e.g., vendor dossiers on threat TTPs)
• Historically Lots of Open Source Resources
– MalwareDomainList
– Zeus Tracker
– SSL Blacklist
– …
• Don’t Forget Social Networks (e.g., certain people/resources on
Twitter)
• Mix in Organizational Data as Well to Enrich (e.g., honeypots)
• Big Need
– Centralized Database to Record All this Information
– Mmm? Perhaps a Shared Evernote Notebook Using Tags to Track?
Three Sources of Threat Intel
Intel Sharing
• Groups
– ISACs (FS-ISAC, MS-ISAC, DIB-ISAC, …)
– DIB
– Infragard
• Historically
– Email List
– Bulletin Boards
• Big Need
– Centralized Database to Record All this Information
– Mmm? Perhaps a Shared Evernote Notebook Using
Tags to Track?
Three Sources of Threat Intel
Case Management
• Pretty Simple with Many Workflow Systems Out There
– Open New Case
– Work It Periodically Adding Comments of What Done
– Eventually Gets Closed
• Many Existing Solutions
– Remedy
– RT
– SharePoint
• Big Need
– Centralized Database to Record All this Information
– Mmm? Perhaps an Evernote Notebook using Tags to Track?
Three Sources of Threat Intel
Existing Solutions
• Open Source Intelligence
– Open Source: CRITS, CIF
– Vendors Incorporating into Products
• Intel Sharing
– Email Lists, Bulletin Boards
– Starting to Distribute in Standardized Format (TAXII, STIX)
• Case Management
– Open Source: RT, eTicket, Help Desk Lite, …
– Commercial: Remedy, SharePoint
• All-In-One
– ThreatConnect (free to join; in cloud and on-premisis)
• Overall
– Lots of Point Solutions But Not Flexible
– Ease of Use (CEO down to analyst)
– Centralized Database to Record All this Information
Evernote OSINT, Intel Sharing, Case
Mgmt Database
• Very Easy-to-Use
• Very Elegant
• Very Flexible
• OSINT DB for Searching and Pivoting Around On
• OSINT: Find Something Interesting; Just Clip It into Evernote
• Intel Sharing: Find Something Interesting Going on in Your Network
& Want to Share, Just Create New Note in Shared Notebook
• Case Management: Establish Note Template with Standard Tags for
if Open, Working, Closed
• Create New Meta-Notes that Pull Together Existing Notes (e.g.,
several OSINT notes, intel from partner network, and cases
assigned)
• Tagging: Adversaries, Campaigns, Waves, Individual
Attacks, Indicators, OSINT Source, …
EN Search
• This is How You Will Find All the Awesomeness
You Threw into Evernote
• Tags
• Basic Search
• Advanced Search (specific notebooks, tags,
terms, dates, boolean support)
• Example: Search for IP & Find Note; Run
Secondary Search Around that Timeline to
Discovery Similar Happenings
Automation
• IFTTT/Zapier to Get Basic RSS Feeds into EN
– Easily to Implement
– Limit of Only Getting Partial Data (useful data not in title/intro)
• IFTTT/Zapier with Email Integration to Get Data into EN
– Helps Some if Offer Mailing List with Full Data
• Write Own RSS Site Scraper
FiveFilter to Extract Full RSS Post Content
• Also Open Source Implementations of IFTTT Too
• Spin up AWS Server & Cron Scripts that Periodically Pulls
Down Intel Files & Inserts into Evernote
• CIF Feeds
OSINT Sources
• Threat Data/Intel
– MalwareDomainList (RSS feed)
– Zeus Tracker (RSS feed)
– SSL Blacklist (RSS feed)
– Malware-Analysis Traffic (RSS feed)
• Vulnerability
– Offensive Security Exploit Database
(RSS feed)
– NIST NVD CVE (RSS feed)
– US CERT All Products (RSS feed)
• Situational Awareness
– SANS ISC Blog (RSS feed)
Risk ~ Threat X Vulnerability
Can’t “Do” Cloud Things
• Log Management Solutions
• SIEMs
• Others
Future
• More OSINT Resources
– Deconflict Sites with Multiple Feeds & Add if Needed
– File Base Pulls (script / replace existing RSS)
– Vendor APT Reports
(https://github.com/kbandla/APTnotes)
– General News Blogs to Track What’s Going On Around
Specific Time Period
• Start with a finding from search then back out to see what
was going on the week before or after
– Integration with CIF to Centralize/Tag Data
• Formalize Tag Structures
Conclusion
• Lots of Point Solutions but None Bring
Together Like Good ‘ol Evernote
• Start with Evernote to “Figure Stuff Out"
• In End Figure Out What Your Requirements
Are & Buy/Implement More Custom Solution
Questions?
• Twitter @grecs
• Website NovaInfosec.com, @novainfosec
• Contact http://bit.ly/nispcontact
o Questions/Consulting

More Related Content

What's hot

Pragmatic REST APIs
Pragmatic REST APIsPragmatic REST APIs
Pragmatic REST APIsamesar0
 
Cloud Security Monitoring and Spark Analytics
Cloud Security Monitoring and Spark AnalyticsCloud Security Monitoring and Spark Analytics
Cloud Security Monitoring and Spark Analyticsamesar0
 
Our path to apache spark
Our path to apache sparkOur path to apache spark
Our path to apache sparkppetr82
 
Spectator to Participant. Contributing to Cassandra (Patrick McFadin, DataSta...
Spectator to Participant. Contributing to Cassandra (Patrick McFadin, DataSta...Spectator to Participant. Contributing to Cassandra (Patrick McFadin, DataSta...
Spectator to Participant. Contributing to Cassandra (Patrick McFadin, DataSta...DataStax
 
Practice of building apache sharding sphere iincubator community
Practice of building apache sharding sphere iincubator communityPractice of building apache sharding sphere iincubator community
Practice of building apache sharding sphere iincubator communityjixuan1989
 
Apache Flink community Update for March 2016 - Slim Baltagi
Apache Flink community Update for March 2016 - Slim BaltagiApache Flink community Update for March 2016 - Slim Baltagi
Apache Flink community Update for March 2016 - Slim BaltagiSlim Baltagi
 
Shereen Oraby - 2017 - Are you serious? Rhetorical Questions and Sarcasm in ...
Shereen Oraby - 2017 - Are you serious?  Rhetorical Questions and Sarcasm in ...Shereen Oraby - 2017 - Are you serious?  Rhetorical Questions and Sarcasm in ...
Shereen Oraby - 2017 - Are you serious? Rhetorical Questions and Sarcasm in ...Association for Computational Linguistics
 
What's new with Apache Tika?
What's new with Apache Tika?What's new with Apache Tika?
What's new with Apache Tika?gagravarr
 
Everything You Always Wanted To Know About SFX ...
Everything You Always Wanted To Know About SFX ...Everything You Always Wanted To Know About SFX ...
Everything You Always Wanted To Know About SFX ...Louise Penn
 
Security From The Big Data and Analytics Perspective
Security From The Big Data and Analytics PerspectiveSecurity From The Big Data and Analytics Perspective
Security From The Big Data and Analytics PerspectiveAll Things Open
 
Practical Machine Learning for Smarter Search with Solr and Spark
Practical Machine Learning for Smarter Search with Solr and SparkPractical Machine Learning for Smarter Search with Solr and Spark
Practical Machine Learning for Smarter Search with Solr and SparkJake Mannix
 
ElasticSearch: Distributed Multitenant NoSQL Datastore and Search Engine
ElasticSearch: Distributed Multitenant NoSQL Datastore and Search EngineElasticSearch: Distributed Multitenant NoSQL Datastore and Search Engine
ElasticSearch: Distributed Multitenant NoSQL Datastore and Search EngineDaniel N
 
Big Data Day LA 2015 - Applications of the Apriori Algorithm on Open Data by ...
Big Data Day LA 2015 - Applications of the Apriori Algorithm on Open Data by ...Big Data Day LA 2015 - Applications of the Apriori Algorithm on Open Data by ...
Big Data Day LA 2015 - Applications of the Apriori Algorithm on Open Data by ...Data Con LA
 
Converging Big Data and Application Infrastructure by Steven Poutsy
Converging Big Data and Application Infrastructure by Steven PoutsyConverging Big Data and Application Infrastructure by Steven Poutsy
Converging Big Data and Application Infrastructure by Steven PoutsyBig Data Spain
 
OpenSearchLab and the Lucene Ecosystem
OpenSearchLab and the Lucene EcosystemOpenSearchLab and the Lucene Ecosystem
OpenSearchLab and the Lucene EcosystemGrant Ingersoll
 

What's hot (16)

Pragmatic REST APIs
Pragmatic REST APIsPragmatic REST APIs
Pragmatic REST APIs
 
Taming Text
Taming TextTaming Text
Taming Text
 
Cloud Security Monitoring and Spark Analytics
Cloud Security Monitoring and Spark AnalyticsCloud Security Monitoring and Spark Analytics
Cloud Security Monitoring and Spark Analytics
 
Our path to apache spark
Our path to apache sparkOur path to apache spark
Our path to apache spark
 
Spectator to Participant. Contributing to Cassandra (Patrick McFadin, DataSta...
Spectator to Participant. Contributing to Cassandra (Patrick McFadin, DataSta...Spectator to Participant. Contributing to Cassandra (Patrick McFadin, DataSta...
Spectator to Participant. Contributing to Cassandra (Patrick McFadin, DataSta...
 
Practice of building apache sharding sphere iincubator community
Practice of building apache sharding sphere iincubator communityPractice of building apache sharding sphere iincubator community
Practice of building apache sharding sphere iincubator community
 
Apache Flink community Update for March 2016 - Slim Baltagi
Apache Flink community Update for March 2016 - Slim BaltagiApache Flink community Update for March 2016 - Slim Baltagi
Apache Flink community Update for March 2016 - Slim Baltagi
 
Shereen Oraby - 2017 - Are you serious? Rhetorical Questions and Sarcasm in ...
Shereen Oraby - 2017 - Are you serious?  Rhetorical Questions and Sarcasm in ...Shereen Oraby - 2017 - Are you serious?  Rhetorical Questions and Sarcasm in ...
Shereen Oraby - 2017 - Are you serious? Rhetorical Questions and Sarcasm in ...
 
What's new with Apache Tika?
What's new with Apache Tika?What's new with Apache Tika?
What's new with Apache Tika?
 
Everything You Always Wanted To Know About SFX ...
Everything You Always Wanted To Know About SFX ...Everything You Always Wanted To Know About SFX ...
Everything You Always Wanted To Know About SFX ...
 
Security From The Big Data and Analytics Perspective
Security From The Big Data and Analytics PerspectiveSecurity From The Big Data and Analytics Perspective
Security From The Big Data and Analytics Perspective
 
Practical Machine Learning for Smarter Search with Solr and Spark
Practical Machine Learning for Smarter Search with Solr and SparkPractical Machine Learning for Smarter Search with Solr and Spark
Practical Machine Learning for Smarter Search with Solr and Spark
 
ElasticSearch: Distributed Multitenant NoSQL Datastore and Search Engine
ElasticSearch: Distributed Multitenant NoSQL Datastore and Search EngineElasticSearch: Distributed Multitenant NoSQL Datastore and Search Engine
ElasticSearch: Distributed Multitenant NoSQL Datastore and Search Engine
 
Big Data Day LA 2015 - Applications of the Apriori Algorithm on Open Data by ...
Big Data Day LA 2015 - Applications of the Apriori Algorithm on Open Data by ...Big Data Day LA 2015 - Applications of the Apriori Algorithm on Open Data by ...
Big Data Day LA 2015 - Applications of the Apriori Algorithm on Open Data by ...
 
Converging Big Data and Application Infrastructure by Steven Poutsy
Converging Big Data and Application Infrastructure by Steven PoutsyConverging Big Data and Application Infrastructure by Steven Poutsy
Converging Big Data and Application Infrastructure by Steven Poutsy
 
OpenSearchLab and the Lucene Ecosystem
OpenSearchLab and the Lucene EcosystemOpenSearchLab and the Lucene Ecosystem
OpenSearchLab and the Lucene Ecosystem
 

Viewers also liked

Undersink water purifier [호환 모드]
Undersink water purifier [호환 모드]Undersink water purifier [호환 모드]
Undersink water purifier [호환 모드]J2smartceo
 
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016grecsl
 
Filter part list
Filter part listFilter part list
Filter part listJ2smartceo
 
Project KidHack – Teaching the Next Next Generation Security through Gaming a...
Project KidHack – Teaching the Next Next Generation Security through Gaming a...Project KidHack – Teaching the Next Next Generation Security through Gaming a...
Project KidHack – Teaching the Next Next Generation Security through Gaming a...grecsl
 
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...grecsl
 
Project KidHack - Teaching Kids Security through Gaming at BSidesCharm on Apr...
Project KidHack - Teaching Kids Security through Gaming at BSidesCharm on Apr...Project KidHack - Teaching Kids Security through Gaming at BSidesCharm on Apr...
Project KidHack - Teaching Kids Security through Gaming at BSidesCharm on Apr...grecsl
 
Green rich shower
Green rich showerGreen rich shower
Green rich showerJ2smartceo
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...grecsl
 

Viewers also liked (14)

Undersink water purifier [호환 모드]
Undersink water purifier [호환 모드]Undersink water purifier [호환 모드]
Undersink water purifier [호환 모드]
 
презентация оборудования Via
презентация оборудования Viaпрезентация оборудования Via
презентация оборудования Via
 
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
 
Rain water harvesting
Rain water harvestingRain water harvesting
Rain water harvesting
 
Filter part list
Filter part listFilter part list
Filter part list
 
UVa Protocol
UVa ProtocolUVa Protocol
UVa Protocol
 
презентация компании Via
презентация компании Viaпрезентация компании Via
презентация компании Via
 
Dog 10 commandments
Dog 10 commandmentsDog 10 commandments
Dog 10 commandments
 
Project KidHack – Teaching the Next Next Generation Security through Gaming a...
Project KidHack – Teaching the Next Next Generation Security through Gaming a...Project KidHack – Teaching the Next Next Generation Security through Gaming a...
Project KidHack – Teaching the Next Next Generation Security through Gaming a...
 
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
 
Project KidHack - Teaching Kids Security through Gaming at BSidesCharm on Apr...
Project KidHack - Teaching Kids Security through Gaming at BSidesCharm on Apr...Project KidHack - Teaching Kids Security through Gaming at BSidesCharm on Apr...
Project KidHack - Teaching Kids Security through Gaming at BSidesCharm on Apr...
 
Green rich shower
Green rich showerGreen rich shower
Green rich shower
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
 
Bridges
BridgesBridges
Bridges
 

Similar to Defending the Enterprise with Evernote at SourceBoston on May 27, 2015

Best Practices for Design Hardware APIs
Best Practices for Design Hardware APIsBest Practices for Design Hardware APIs
Best Practices for Design Hardware APIsMatt Haines
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNEDChris Gates
 
aOS Mumbai Aall about documents o365 04/04/2017
aOS Mumbai Aall about documents o365 04/04/2017aOS Mumbai Aall about documents o365 04/04/2017
aOS Mumbai Aall about documents o365 04/04/2017Sébastien Paulet
 
Solving Data Discovery Challenges at Lyft with Amundsen, an Open-source Metad...
Solving Data Discovery Challenges at Lyft with Amundsen, an Open-source Metad...Solving Data Discovery Challenges at Lyft with Amundsen, an Open-source Metad...
Solving Data Discovery Challenges at Lyft with Amundsen, an Open-source Metad...Databricks
 
aOS Bangalore-all about documents o365 06/04/2017
aOS Bangalore-all about documents o365 06/04/2017aOS Bangalore-all about documents o365 06/04/2017
aOS Bangalore-all about documents o365 06/04/2017Sébastien Paulet
 
5 Things that Make Hadoop a Game Changer
5 Things that Make Hadoop a Game Changer5 Things that Make Hadoop a Game Changer
5 Things that Make Hadoop a Game ChangerCaserta
 
DataSploit - Tool Demo at Null Bangalore - March Meet.
DataSploit - Tool Demo at Null Bangalore - March Meet. DataSploit - Tool Demo at Null Bangalore - March Meet.
DataSploit - Tool Demo at Null Bangalore - March Meet. Shubham Mittal
 
Utah Big Mountain Big Data Baby Steps (4-12-2014) Final
Utah Big Mountain   Big Data Baby Steps (4-12-2014) FinalUtah Big Mountain   Big Data Baby Steps (4-12-2014) Final
Utah Big Mountain Big Data Baby Steps (4-12-2014) FinalNick Baguley
 
Levelling up your data infrastructure
Levelling up your data infrastructureLevelling up your data infrastructure
Levelling up your data infrastructureSimon Belak
 
PyData Texas 2015 Keynote
PyData Texas 2015 KeynotePyData Texas 2015 Keynote
PyData Texas 2015 KeynotePeter Wang
 
Hard Coding as a design approach
Hard Coding as a design approachHard Coding as a design approach
Hard Coding as a design approachOren Eini
 
Data Onboarding Breakout Session
Data Onboarding Breakout SessionData Onboarding Breakout Session
Data Onboarding Breakout SessionSplunk
 
Elastic Data Analytics Platform @Datadog
Elastic Data Analytics Platform @DatadogElastic Data Analytics Platform @Datadog
Elastic Data Analytics Platform @DatadogC4Media
 
State of Play. Data Science on Hadoop in 2015 by SEAN OWEN at Big Data Spain ...
State of Play. Data Science on Hadoop in 2015 by SEAN OWEN at Big Data Spain ...State of Play. Data Science on Hadoop in 2015 by SEAN OWEN at Big Data Spain ...
State of Play. Data Science on Hadoop in 2015 by SEAN OWEN at Big Data Spain ...Big Data Spain
 
DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017 DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017 Shubham Mittal
 
Continuum Analytics and Python
Continuum Analytics and PythonContinuum Analytics and Python
Continuum Analytics and PythonTravis Oliphant
 
Tips to kick-start your Software Engineering Career - Ferdous Mahmud Shaon
Tips to kick-start your Software Engineering Career - Ferdous Mahmud ShaonTips to kick-start your Software Engineering Career - Ferdous Mahmud Shaon
Tips to kick-start your Software Engineering Career - Ferdous Mahmud ShaonCefalo
 
Tips to Kick-start your Software Engineering Career
Tips to Kick-start your Software Engineering CareerTips to Kick-start your Software Engineering Career
Tips to Kick-start your Software Engineering CareerFerdous Mahmud Shaon
 
Patterns for Deploying Analytics in the Real World
Patterns for Deploying Analytics in the Real WorldPatterns for Deploying Analytics in the Real World
Patterns for Deploying Analytics in the Real WorldSriskandarajah Suhothayan
 

Similar to Defending the Enterprise with Evernote at SourceBoston on May 27, 2015 (20)

Best Practices for Design Hardware APIs
Best Practices for Design Hardware APIsBest Practices for Design Hardware APIs
Best Practices for Design Hardware APIs
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNED
 
aOS Mumbai Aall about documents o365 04/04/2017
aOS Mumbai Aall about documents o365 04/04/2017aOS Mumbai Aall about documents o365 04/04/2017
aOS Mumbai Aall about documents o365 04/04/2017
 
Solving Data Discovery Challenges at Lyft with Amundsen, an Open-source Metad...
Solving Data Discovery Challenges at Lyft with Amundsen, an Open-source Metad...Solving Data Discovery Challenges at Lyft with Amundsen, an Open-source Metad...
Solving Data Discovery Challenges at Lyft with Amundsen, an Open-source Metad...
 
aOS Bangalore-all about documents o365 06/04/2017
aOS Bangalore-all about documents o365 06/04/2017aOS Bangalore-all about documents o365 06/04/2017
aOS Bangalore-all about documents o365 06/04/2017
 
5 Things that Make Hadoop a Game Changer
5 Things that Make Hadoop a Game Changer5 Things that Make Hadoop a Game Changer
5 Things that Make Hadoop a Game Changer
 
DataSploit - Tool Demo at Null Bangalore - March Meet.
DataSploit - Tool Demo at Null Bangalore - March Meet. DataSploit - Tool Demo at Null Bangalore - March Meet.
DataSploit - Tool Demo at Null Bangalore - March Meet.
 
Big Data, Baby Steps
Big Data, Baby StepsBig Data, Baby Steps
Big Data, Baby Steps
 
Utah Big Mountain Big Data Baby Steps (4-12-2014) Final
Utah Big Mountain   Big Data Baby Steps (4-12-2014) FinalUtah Big Mountain   Big Data Baby Steps (4-12-2014) Final
Utah Big Mountain Big Data Baby Steps (4-12-2014) Final
 
Levelling up your data infrastructure
Levelling up your data infrastructureLevelling up your data infrastructure
Levelling up your data infrastructure
 
PyData Texas 2015 Keynote
PyData Texas 2015 KeynotePyData Texas 2015 Keynote
PyData Texas 2015 Keynote
 
Hard Coding as a design approach
Hard Coding as a design approachHard Coding as a design approach
Hard Coding as a design approach
 
Data Onboarding Breakout Session
Data Onboarding Breakout SessionData Onboarding Breakout Session
Data Onboarding Breakout Session
 
Elastic Data Analytics Platform @Datadog
Elastic Data Analytics Platform @DatadogElastic Data Analytics Platform @Datadog
Elastic Data Analytics Platform @Datadog
 
State of Play. Data Science on Hadoop in 2015 by SEAN OWEN at Big Data Spain ...
State of Play. Data Science on Hadoop in 2015 by SEAN OWEN at Big Data Spain ...State of Play. Data Science on Hadoop in 2015 by SEAN OWEN at Big Data Spain ...
State of Play. Data Science on Hadoop in 2015 by SEAN OWEN at Big Data Spain ...
 
DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017 DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017
 
Continuum Analytics and Python
Continuum Analytics and PythonContinuum Analytics and Python
Continuum Analytics and Python
 
Tips to kick-start your Software Engineering Career - Ferdous Mahmud Shaon
Tips to kick-start your Software Engineering Career - Ferdous Mahmud ShaonTips to kick-start your Software Engineering Career - Ferdous Mahmud Shaon
Tips to kick-start your Software Engineering Career - Ferdous Mahmud Shaon
 
Tips to Kick-start your Software Engineering Career
Tips to Kick-start your Software Engineering CareerTips to Kick-start your Software Engineering Career
Tips to Kick-start your Software Engineering Career
 
Patterns for Deploying Analytics in the Real World
Patterns for Deploying Analytics in the Real WorldPatterns for Deploying Analytics in the Real World
Patterns for Deploying Analytics in the Real World
 

More from grecsl

Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016
Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016
Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016grecsl
 
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016grecsl
 
Project Kid Hack - Teaching Kids Security through Gaming at BSidesDE on Novem...
Project Kid Hack - Teaching Kids Security through Gaming at BSidesDE on Novem...Project Kid Hack - Teaching Kids Security through Gaming at BSidesDE on Novem...
Project Kid Hack - Teaching Kids Security through Gaming at BSidesDE on Novem...grecsl
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014grecsl
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014grecsl
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...grecsl
 

More from grecsl (6)

Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016
Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016
Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016
 
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
 
Project Kid Hack - Teaching Kids Security through Gaming at BSidesDE on Novem...
Project Kid Hack - Teaching Kids Security through Gaming at BSidesDE on Novem...Project Kid Hack - Teaching Kids Security through Gaming at BSidesDE on Novem...
Project Kid Hack - Teaching Kids Security through Gaming at BSidesDE on Novem...
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Defending the Enterprise with Evernote at SourceBoston on May 27, 2015

  • 1. Defending the Enterprise with Evernote @grecs NovaInfosec.com
  • 2. Disclaimer • Opinions expressed do not express the views or opinions of my – my employers – my customers, – my wife, – my kids, – my parents – my in-laws – my high school girlfriend from Canada Defending the Enterprise with Evernote NovaInfosec.com@grecs,
  • 3. Defending the Enterprise with Evernote NovaInfosec.com@grecs,
  • 4. 20 Yrs Industry 16 Yrs Infosec 5 Yrs SOC
  • 5. Defending the Enterprise with Evernote NovaInfosec.com@grecs,
  • 6. NovaInfosec Consulting • 20 Years Industry/Infosec Experience • Security Engineering/ Architecture • SOC 2.0/Transformation • Security Training datamation.com/cnews/article.php/3851071/Tech-Comics-Cloud-Computing-Consultants.htm
  • 7. Defending the Enterprise with Evernote NovaInfosec.com@grecs, PREMISE Over Engineering Build (at least try to) Before Buy
  • 8. Premise Over Engineering • Tendency to Over Complicate • Keep It Simple Stupid • What Can We Do Quick & Dirty that Will Get Us 60- 70% of the Way There? • Onboarding Workflow System Example Solution Fine As Is Est. Requs. to Develop Eventual Solution
  • 9. Premise Build (at least try to) Before Buy • Before Buying New Commercial Solution – Try Quick & Dirty Solution In-House First • Use Tools Already Have & All Familiar With • Setup Good Set of Processes Since Lacks Safety Checks • Have Smart People Actually Use Solution for 6-12 Mos. • Continually Evolve Processes with Lessons Learned – Maybe that Will Solve Your Needs – Else Understand What Really Need  Commercial • Invest in People & Process 1st, then Products • Case In Point: Threat Intel Services
  • 10. Defending the Enterprise with Evernote NovaInfosec.com@grecs, BEGINNINGS Dashboard 1.0 Dashboard 2.0 Dashboard 3.0 Take-Aways
  • 11. Beginnings Dashboard 1.0 • SOC Security Engineer Position Many Years Ago Working to Create Dashboards • Wanted to Measure What Risk Was • Made Sense to Use Traditional Risk Equation – Risk = Threat X Vulnerability (impact too) – Had Vulnerability Data Based on Patch & Other Tools – Threat? Decided to Use Vendor Threat Levels (e.g., SANS INFOCON, Symantec – normalize and average)
  • 12. Beginnings Dashboard 2.0 • Moved On as Analyst & Wanted to Keep Up • Had Email Folder for Internal SOC Distros where Analysts Post New & Updated Incidents – Nothing from Outside (e.g., RSS feeds, external SOC distros, …) • Prior Dashboard Research Looked Like Good Place to Start • Build Own “Risk” tab on iGoogle via Various RSS Feeds • Included Internet Provided Vulnerability & Risk Resources as Well
  • 13. Beginnings Dashboard 2.0 – Google Reader, iGoogle, Feedly
  • 14. Beginnings Dashboard 3.0 • Had Since Moved from Feedly to Netvibes for Since Designed Ground Up as Dashboard • Added “Cyber Intel” Tab with Sources Still Active from Feedly
  • 15. Beginnings Dashboarding Take-Aways • Nice for “Blog” Post Feeds • Tough to Follow for Data-Driven Feeds – Changing Too Fast – Feedly Pro – NetVibes VIP • Keep All Feed Data & Searchable • Expensive for One-Off Analyst Resource • Introduce Concept of One “Bucket” to Dump All Into • Doesn’t Work for Periodically Updated Data Files
  • 16. Defending the Enterprise with Evernote NovaInfosec.com@grecs, PIVOT Meanwhile… Rebaseline The Secret Weapon Ah Ha
  • 17. Pivot Meanwhile… • Threat Intel Market Growing – Investigating Threat Intel – Consulted Experts & Users of Threat Intel Services • Basic Take-Aways – Fascinating Area with Lots of Cool Things Mathematically Correlated Together in Some Fancy Big Data Model – Not Much Value Beyond Open Source Resources – A Lot of Data Not Relevant to Organization • Dashboard – Was onto Something – Pulling all Open Source Info Together
  • 18. Pivot Rebaseline • NetVibes VIP but Cheaper & More Flexible • Bucket to Dump All Data Into – Blog/Other Feeds – Data-Driven Feeds – Data Files – Other (anything else find – e.g., APT reports) • Easily Find Data – Searchable – Categories – Tagging for Viewing in Different Ways • Cloud-Based So Wouldn’t Have to Maintain & Accessible Everywhere – Email Folder (like in old days but too kludgy) – Log/Data Aggregation Tools
  • 19. Pivot The Secret Weapon • Method for Using Evernote as GTD-Based Task Mgmt System – Treat Evernote Like a Database – Notebook == Table – Note == Free Form Record • Organization – Nested Notebooks – Hierarchical Tagging (provide metadata structure) • When (importance – e.g., 0-6) • What (projects – e.g., SourceBoston, OSINT DB) • Where (e.g., home, work, etc.) • Who (e.g., people that action has to do with) • Combination Above • Search – ~ Notebook, Tag, Keyword, or Combination Thereof – Saved Searches
  • 20. Pivot Ah Ha • Dump All Feeds/Data into Evernote Bucket • Defined Notebooks & Hierarchical Tags for Metadata (owner, feed, indicator type, etc.) • Easy to Use Over Heavy Database or Workflow Management System • Perfect Open & Flexible Framework to Build Off Of • Start Dumping Everything Into – Email to Evernote, IFTTT, Zapier, Bash Scripts, etc.
  • 21. Defending the Enterprise with Evernote NovaInfosec.com@grecs, THREE SOURCES OF THREAT INTEL Open Source Intelligence Information Sharing Case Management Existing Solutions
  • 22. Three Sources of Threat Intel Open Source Intelligence • Boils Down to – Indictors (e.g., IPs, Domains , URLs, Hashes, Email Addresses, … ) – Reports (e.g., vendor dossiers on threat TTPs) • Historically Lots of Open Source Resources – MalwareDomainList – Zeus Tracker – SSL Blacklist – … • Don’t Forget Social Networks (e.g., certain people/resources on Twitter) • Mix in Organizational Data as Well to Enrich (e.g., honeypots) • Big Need – Centralized Database to Record All this Information – Mmm? Perhaps a Shared Evernote Notebook Using Tags to Track?
  • 23. Three Sources of Threat Intel Intel Sharing • Groups – ISACs (FS-ISAC, MS-ISAC, DIB-ISAC, …) – DIB – Infragard • Historically – Email List – Bulletin Boards • Big Need – Centralized Database to Record All this Information – Mmm? Perhaps a Shared Evernote Notebook Using Tags to Track?
  • 24. Three Sources of Threat Intel Case Management • Pretty Simple with Many Workflow Systems Out There – Open New Case – Work It Periodically Adding Comments of What Done – Eventually Gets Closed • Many Existing Solutions – Remedy – RT – SharePoint • Big Need – Centralized Database to Record All this Information – Mmm? Perhaps an Evernote Notebook using Tags to Track?
  • 25. Three Sources of Threat Intel Existing Solutions • Open Source Intelligence – Open Source: CRITS, CIF – Vendors Incorporating into Products • Intel Sharing – Email Lists, Bulletin Boards – Starting to Distribute in Standardized Format (TAXII, STIX) • Case Management – Open Source: RT, eTicket, Help Desk Lite, … – Commercial: Remedy, SharePoint • All-In-One – ThreatConnect (free to join; in cloud and on-premisis) • Overall – Lots of Point Solutions But Not Flexible – Ease of Use (CEO down to analyst) – Centralized Database to Record All this Information
  • 26. Evernote OSINT, Intel Sharing, Case Mgmt Database • Very Easy-to-Use • Very Elegant • Very Flexible • OSINT DB for Searching and Pivoting Around On • OSINT: Find Something Interesting; Just Clip It into Evernote • Intel Sharing: Find Something Interesting Going on in Your Network & Want to Share, Just Create New Note in Shared Notebook • Case Management: Establish Note Template with Standard Tags for if Open, Working, Closed • Create New Meta-Notes that Pull Together Existing Notes (e.g., several OSINT notes, intel from partner network, and cases assigned) • Tagging: Adversaries, Campaigns, Waves, Individual Attacks, Indicators, OSINT Source, …
  • 27. EN Search • This is How You Will Find All the Awesomeness You Threw into Evernote • Tags • Basic Search • Advanced Search (specific notebooks, tags, terms, dates, boolean support) • Example: Search for IP & Find Note; Run Secondary Search Around that Timeline to Discovery Similar Happenings
  • 28. Automation • IFTTT/Zapier to Get Basic RSS Feeds into EN – Easily to Implement – Limit of Only Getting Partial Data (useful data not in title/intro) • IFTTT/Zapier with Email Integration to Get Data into EN – Helps Some if Offer Mailing List with Full Data • Write Own RSS Site Scraper FiveFilter to Extract Full RSS Post Content • Also Open Source Implementations of IFTTT Too • Spin up AWS Server & Cron Scripts that Periodically Pulls Down Intel Files & Inserts into Evernote • CIF Feeds
  • 29. OSINT Sources • Threat Data/Intel – MalwareDomainList (RSS feed) – Zeus Tracker (RSS feed) – SSL Blacklist (RSS feed) – Malware-Analysis Traffic (RSS feed) • Vulnerability – Offensive Security Exploit Database (RSS feed) – NIST NVD CVE (RSS feed) – US CERT All Products (RSS feed) • Situational Awareness – SANS ISC Blog (RSS feed) Risk ~ Threat X Vulnerability
  • 30. Can’t “Do” Cloud Things • Log Management Solutions • SIEMs • Others
  • 31. Future • More OSINT Resources – Deconflict Sites with Multiple Feeds & Add if Needed – File Base Pulls (script / replace existing RSS) – Vendor APT Reports (https://github.com/kbandla/APTnotes) – General News Blogs to Track What’s Going On Around Specific Time Period • Start with a finding from search then back out to see what was going on the week before or after – Integration with CIF to Centralize/Tag Data • Formalize Tag Structures
  • 32. Conclusion • Lots of Point Solutions but None Bring Together Like Good ‘ol Evernote • Start with Evernote to “Figure Stuff Out" • In End Figure Out What Your Requirements Are & Buy/Implement More Custom Solution
  • 33. Questions? • Twitter @grecs • Website NovaInfosec.com, @novainfosec • Contact http://bit.ly/nispcontact o Questions/Consulting