Session 3.4b Update: Threat-Informed Defences for Information Technology (IT) / Operational Technology (OT) with ATT&CK and D3FEND
Tracks
Thursday, November 14, 2024 |
11:30 AM - 12:30 PM |
Bradman Theatre |
Details
This presentation is designed for everyone. Whether you are a complete beginner struggling with technology, a seasoned cybersecurity professional, or a decision-maker, this presentation has insights and practical tools for everyone.
In the ever-evolving realm of IT/OT cybersecurity, understanding and mitigating exploitable vulnerabilities and threats proactively is the only path forward. MITRE’s ATT&CK (Adversarial Tactics, Techniques and Common Knowledge) and D3FEND (Detection, Denial, and Disruption Framework Empowering Network Defence) frameworks provides an evolving approach to comprehend and counteract the Tactics, Techniques, and Procedures (TTPs) employed by threat actors.
Although relatively new, these cybersecurity frameworks serve as a shared language guiding in both offensive and defensive strategies to fully map and understand the threat surface and protect Defence systems and data assets.
ATT&CK has had such impact that it is officially used by the Cybersecurity and Infrastructure Security Agency (CISA) in their threat report “PRC State-Sponsored Actors Compromise and Maintain Persistent Access to US Critical Infrastructure”, which was co-authored by ASD and ACSC. Using ATT&CK, the report explained and mapped the living-of-the-land (LOTL) TTPs of Volt-Typhoon; used to gain access in the US Critical Infrastructure for the last five years.
A major difference with other frameworks is that ATT&CK and D3FEND are constantly growing with the input of the cybersecurity community. Managed by MITRE, both frameworks grow by adding new attackers TTPs witnessed by front liners everywhere.
Securing Defence Information Systems
The fast pace of change in cybersecurity can be overwhelming for those who try to keep up-to-date. The ATT&CK/D3FEND frameworks serve as a knowledge base of what’s actually happening in the field. It catalogues attackers and defenders TTPs and the common vulnerabilities they exploit, how to detect and mitigate them while providing a clear taxonomy of how such breaches can occur. ATT&CK allows to single out TTPs related to Advanced-Persistent-Threat (APT) groups that attack specific industries, such as Defence Industrial Base. By understanding these TTPs, professionals can proactively prioritise security measures to secure Defence information systems and data assets.
ATT&CK has four matrices:
- Enterprise matrix for Windows, Linux, and MacOS;
- ICS matrix for Industrial Control Systems;
- Enterprise cloud matrix for Azure AD, Office365, Google Workspace, SaaS, IaaS, Network, and Containers; and
- Mobile matrix for Android & iOS.
Speaker
Mr Nico Riquelme-Ramirez
Information Security Consultant
QinetiQ Australia
ㅤ
Biography
• Meet Nico, a passionate learner and explorer in the realms of technology, engineering, science, and critical thinking. His journey has been marked by diverse experiences, from consulting in Defence deploying Radars across Australia to venturing into the intricate world of Information Warfare. Currently with QinetiQ Australia, Nico is helping clients improve their Information Security.
• Before embarking on a quest for a Master’s degree in Project Management at ANU, Nico contributed to the cause of Seeing Machines, developing cutting-edge driver and occupant monitoring systems to ensure safe journeys home.
• Gained global exposure with Procter & Gamble, where he applied his Industrial Engineering skills to the safe and reliable production of diapers, millions of them.