Threat-Informed Defense for the Financial Sector
Connect adversarial threat mitigations to cybersecurity program resources tailored to the financial sector, namely the Cyber Risk Institute …
September 10, 2023
Many analytics are dependent on specific tools or artifacts. Adversaries can easily evade these with low-cost changes that exploit the dependencies. This project developed a method to evaluate analytics relative to the adversary’s cost to evade. We further created approaches and tips for defenders to make their analytics less evadable. We demonstrated the methodology with a core set of analytics.
This is an old version of the Summiting the Pyramid project. For the latest version, see: Summiting the Pyramid.
Adversaries can easily evade cyber analytics that are dependent on specific tools or artifacts.
Create and apply a methodology to evaluate the dependencies inside analytics and make them more robust by focusing on adversary behaviors.
Shift the advantage towards defenders with improved analytics that catch adversaries even as they evolve and detect future campaigns.
Connect adversarial threat mitigations to cybersecurity program resources tailored to the financial sector, namely the Cyber Risk Institute …
Building upon the research of Summiting the Pyramid, Ambiguous Techniques is a methodology to determine malicious intent behind seemingly benign …
Prioritize Known Exploited Vulnerabilities shows defenders how to take a threat informed approach to vulnerability management.
Sign up for our "Stay Informed" mailing list to receive announcements for project publications, upcoming events, and other news about the Center.