CyberAI – Global Strategic Imperative

Cyber Power

  1. At the heart of a Nation States strategy is the
    concept of cyber power, which is
    defined as the ability of a state to protect
    and promote its interests in and through
    cyberspace. Five broad
    dimensions of cyber power can be identified which align
    to the pillars of a robust cybersecurity strategy:
  • The people, knowledge, skills,
    structures and partnerships that
    are the foundation of a nation’s cyber
    power, underpinning all the other
    components and integrating them
    into a national approach.
  • The ability to protect a country’s assets
    through cyber security and resilience,
    in order to realise the full benefits
    that cyberspace offers to its
    citizens and economy.
  • The technical and industrial
    capabilities to maintain a stake in the
    evolution of key cyber technologies
    and deploy new advances in the
    interests of society.
  • The global influence, relationships
    and ethical standards to shape rules
    and norms in cyberspace in line with
    the values and interests and promote
    international security and stability.
  • The ability to take action in and
    through cyberspace to support
    national security, economic wellbeing
    and crime prevention. This includes
    cyber operations to deliver real world
    effect, and to help achieve strategic
    advantage, and law enforcement
    operations and the application of
    cyber sanctions to bring malicious
    cyber actors criminals to justice and
    disrupt their activities

List of acronyms and abbreviations that you may come across while studying the references –

BTK – Turkish Information and Communication Technologies Authority.
CBM – Confidence-Building Measure.
CCB – Centre for Cyber Security Belgium.
CCN-CERT Spanish Government National Cryptologic Center – Computer
Security Incident Response Team.
CERT – Computer Emergency Response Team.
C-HUB Cybersecurity Digital Innovation Hub (Portugal).
CIPAC – Critical Infrastructure Partnership Advisory Council
(United States).
CIRCIA- Cyber Incident Reporting for Critical Infrastructure Act
(United States).
CISA -Cyber and Infrastructure Security Agency (United States).
CSIRT -Computer Security Incident Response Team.
CSN -Cybersecurity Network Foundation (Serbia).
DEG- Information Technology and Information Systems Security Experts
Group (Latvia).

eID – E-identity.
EISA- Estonian Information Security Association
EU European Union.
FINMA -Swiss Financial Market Supervisory Authority.
FS-CSC -Swiss Financial Sector Cyber Security Centre.
FS-ISAC Swiss Financial Services Information Sharing and Analysis Center.
ICT -Information and Communications Technology.
ISAC -Information Sharing and Analysis Center.
ITS- Higher Technological Institutes (Italy).
IWG -Informal Working Group.
NCSC -National Cyber Security Centre.
NCSC-FI National Cyber Security Centre Finland
NICE
Framework
Workforce Framework for Cybersecurity
(United States).
NIS- Network and Information Security.
NIST -National Institute of Standards and Technology (United States).
OKTT -Objectively Recognisable Task (the Netherlands).
OSCE -Organization for Security and Co-operation in Europe.
PPP -Public-Private Partnership.
R&D -Research and Development.
SBOM -Software Bill of Materials.
SME -Small and Medium Enterprise.
SOC -Security Operation Center.
SOW -Safeonweb (Belgium).
TLP -Traffic Light Protocol.
UK -United Kingdom.
UKC3 -UK Cyber Cluster Collaboration.
UN -United Nations.
USOM -Turkish National Computer Emergency Response Center.

E2E Cyber Threat Intelligence Soln – Virustotal+Siemplify+Chronicle

Cyber Threat Intelligence – DMDSA ZTNA

Cyber Threat Intelligence Notes & Reference Guide 22-23

Cyber Nuclear Infra – NCAM 2022 – UN @NATO INDIA

Recap and Takeaways from Global Cyber Intelligence Conferences 2022

Advanced Cyber Threat Intelligence Playlist :

Cyber Threat Intelligence Blog in Progress.

https://easytech4all.net/author/easytechonline/

Quick cyber threat intelligence observations

Quick Global Cyber Threat Intelligence Observations 22-23

In recent years, the increasing frequency and ferocity of cyberattacks has driven the cybersecurity community to establish advanced and intelligent solutions to share and use cyber threat intelligence (CTI) to enhance our ability to identify malicious activity and its sources, inform decision-making solutions, and mitigate attacks in a timely manner. CTI facilitates situational awareness of the threat landscape, a deeper understanding of threat actors and their tactics, techniques, and procedures (TTPs), and greater agility to defend against evolving threats.

However, the management of accurate, reliable, and complete cyber threat information from deployed security appliances, deception solutions, and third parties is increasingly challenging. The adoption of various methods, standards, and practices introduces major interoperability concerns. Legal requirements that dictate appropriate protection of users’ privacy must be respected and automating the process to improve the community’s readiness in counteracting cyber threats is essential. Investment in artificial intelligence and machine learning techniques is necessary for more efficient analysis of the vast amounts of information produced and exchanged among stakeholders to enhance the ability to reveal unexpected insights from communicated data, cope with the smart and innovative methods used by threat actors, and to identify advanced anti-forensics and evasion methods adopted by cyber-criminals. Considering the above and the increasing reliance of defense mechanisms on CTI sharing, research on advanced solutions for CTI management and sharing is significantly important.

This Special Issue aims to publish work relating to recent advances in CTI, regarding every step of its lifecycle, from its creation and sharing to analysis and consumption, aiming to significantly enhance the value of CTI for the cyber community. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

Threat modelling
Threat and vulnerability analysis
Artificial intelligence/machine learning-based cyber threat analysis
Data privacy in CTI management
Interoperability issues in CTI sharing
CTI evaluation
Deception technologies
Dynamic risk management analysis
Cyber-threat detection and response
CTI sharing
CTI consumption and integration
Cyber-threat hunting and curation
Blockchain-based CTI management
Dark web CTI exploration
Threat analysis for cyber-physical systems
CTI-based dynamic risk management

Lead Editor
Konstantinos Rantos1
Guest Editors
Vasilis Katos2 | George Drosatos3 | Konstantinos Demertzis4 | Konstantinos Fysarakis5




GLOBAL CYBER INTELLIGENCE – CONSECRATED
Global Cyber Intelligence Consecrated . This Video Presentation is rededicated to the International Cyber Defense Umbrella comprising of Military Alliance Cyber Commands , Government and Federal Cyber Defense Agencies , Private CTI Defense Corporations , Security Operations Centre , Computer Emergency Response Teams , Transnational Independent Cyber Threat Intelligence Analysts & Specialists.


KEY HIGHLIGHTS –

UN , US , NATO , INDIA , Federal Security Agencies , Military Cyber Force and Commands , Private CTI Agencies and Corporations.

# Two invaluable book recommendations from UN and suggestions to UN . My recent reads .
“The Basic facts about UN” is a mini encyclopaedia. Not just about UN but Copernican World Events and Crisis/Conflict response at the Macro Level including the development and progress of ICT’s and the ICT task force. The historical significance and evolution on a chronological linear timeline. Also quite significant was the section on Peaceful use of outer space – Relevant Treaties and Agreements. UNISPACE conferences , cooperation with European Space Agency (ESA) , NASA , International Astronautical Federation (IAF) , Committee on Earth observation satellites (CEOS) , Committee on Space Research (COSPAR) etc.

The other Book uncommon opportunities – Agenda for Peace and Equitable development
The Report of the International Commission on Peace and Food by International Center for Peace and Development USA and M.S. Swaminathan Research Foundation Chennai India .
Highlights are the sections on the “Peace Imperative” – Information Superhighways , War as an instrument of Policy , Nuclear Weapons (START 1 , START 2 , NPT , CTBT , Ballistic Missiles) , Confidential Studies by NATO , Cooperative Security, MAD doctrine , World Army Proposition and Hypothesis etc . Alacritous rise of India and China in the Global Order and what made it possible.

# US Cyber Policy for Deterrence. Executive Order 14028 Improving the Nation’s cybersecurity. This EO Mandates endpoint protection , defining logging requirements , implementing audit logging in a unified way and enhancing the capabilities to provide further insight into system and account actions. The EO responds to an increase in Cyberattacks that use ransomware to cripple critical infrastructure components related to National Security and the public . Enhancing existing information assurance security controls as a part of a Risk management framework is a suitable mechanism to facilitate compliance and justify funding based on these Presidential requirements.
White House Cyber Physical Resilience Initiative (ISSA SIG) – Cyber Resilience refers to the ability to protect electronic data and systems from cyberattacks as well as to resume business operations quickly in case of a successful attack. In times of increasing damage and sophistication of attacks it is of paramount importance to develop critical cyber resilience capabilities in each organisation. Yet cyber resilience is currently understood differently by various organisations despite the fact that NIST had published clear guidelines(800-160) then followed by other valuable publications and initiatives from MITRE , CERT -US , CISA etc.


# NATO CCDCOE Locked Shields Livefire Exercise 2023 – a unique international Cyberdefence Exercise offering the most complex technical live fire challenge in the World. From a Strategic perspective the exercise offers training and practice in effective decision making and crisis coordination when facing large scale cyber attacks targeting the critical sectors and it’s infrastructure. NATO Cyber Commanders Handbook 2.0 at stakeholders meeting in Tallinn Estonia – leveraging a cooperative approach for Cyber Defence.

# India’s meteoric rise in United Nations Specialised Agency for Information and Communication Technologies – International Telecommunication Union (ITU) ranking for everything Cybersec . Ranked at 10th from the 47th Spot with an overall Score of 97.49. 4th Spot in Asia Pacific Region.
USA and UK ranked First and Second respectively. Saudi Arabia and Estonia was ranked third. South Korea , Singapore , Spain shared the fourth spot . Russia , UAE , Malaysia shared the Fifth Spot . Lithuania came in sixth followed by Japan , Canada , France at seventh , eight and ninth respectively.
Also 3 Indian Leaders have been named in Global Hall of Fame report that identified “CLOUD SECURITY AS THE BIGGEST CHALLENGE” – Indian Govt once said that they want to make INDIA the Global hub for Cybersecurity. And India is indeed making some good progress in that much needed direction . As a fast growing “World Class Digital Payment Ecosystem” economy – Cybersecurity and Cyber Resiliency become of paramount importance mechanically.

Open Source Software is India’s inherent Strength . A Quick analysis of the Internet and YouTube will reveal India’s talent in Open Source OS Linux distros – Ubuntu , Fedora , Kali Linux , Elementary OS , Debian etc . DIY’s and How 2 Do’s across the length and breadth of the Internet unveil this hidden untapped and unorganised skill set that needs to be developed and promoted further . The Beauty of OSS are the following.
1. Right to use study change distribute the software and its source code to anyone for any purpose.
2. Development in Collaborative Public Manner.
3. Examine the Code thereby facilitating public trust in the Software.

Linux has the largest installed base of all general purpose operating systems ( including AOSP and ChromeOS) . From running the terminals at the International Space Station to some of the fastest supercomputers..OSS is everywhere.
The Chromebook, which runs the Linux kernel-based ChromeOS, dominates the US K–12 education market and represents nearly 20 percent of sub-$300 notebook sales in the US. Linux is the leading operating system on servers (over 96.4% of the top 1 million web servers’ operating systems are Linux), leads other big iron systems such as mainframe computers, and is the only OS used on TOP500 supercomputers (since November 2017, having gradually eliminated all competitors).

Linux also runs on embedded systems, i.e. devices whose operating system is typically built into the firmware and is highly tailored to the system. This includes routers, automation controls, smart home devices, video game consoles, televisions (Samsung and LG Smart TVs use Tizen and WebOS, respectively), automobiles (Tesla, Audi, Mercedes-Benz, Hyundai, and Toyota all rely on Linux), spacecraft (Falcon 9’s and Dragon 2’s avionics use a customized version


More Snapshots in the above video presentation.

# Future of the Intelligence Community Workforce – Enabling a Secure Hybrid Work Environment – CIA and MITRE Corp.
# US Cert (Computer Emergency Response Teams) , Cybersecurity and Infrastructure Security Agency (CISA) National Security Agency (NSA) Events .
# Intelligence and National Security Alliance (INSA) and ISSA (Information Systems Security Association) Brainstorms Webinars Seminars .
#. EU Cyber Defence Innovation Program.
# European Cyber Agora.
# National Cyber Strategies to Defend Critical Infrastructure.
# Global Annual Cybersecurity Summits and National Cybersecurity Alliance endeavours.
# UKCSA UKSec – Challenges faced by Governments and International Law Enforcement.
#. Cybersecurity Projections and Predictions.
# Cyber Task Force – FBI Criminal Cyber Squad .
# Cyber World Congress – 24 hr Virtual Events.
#. Cyber Threat Intelligence Talks.
#. CyberAI and its impact on OSINT.
# Cyber Intelligence Units Quarterly Updates (Infoblox)
# CYBERWARFARE PREPAREDNESS by Allen Ari Dziwa.
# Military Cyber Commands and Cyber Force (SoC- Trident Jaguar)
# Assessing the risk and Protecting the Supply Chain.
#. Podcast on Cyberweapons.
#. Future of Cybersecurity and Risk Analysis.
# Cyber Threat Intelligence and Incident Response.
# Cybersecurity Advanced Persistent threat Defenders Overview.
#. Virtual Intelligent Automation Exchange – Director of AI Defense Intelligence Agency (DIA)
#. Small Business National Security Showcase (Directorate of Digital Innovation CIA)
#. CISO perspective – Delta Airlines.
#. Cyber Strategies for a World at War (Open Source Aggregation and Analysis).
#. WEF and INTERPOLs Global Risk Annual Assessments and SOC – Cyber Ploygon.
#Google Cloud Security talks and threat Analysis Group.
#Digital Risk Management e-learning platform for mediators. UN DPPA and Cyberpeace Institute.

1PowerCyber @ Easytech4all CTI Research & Analysis consultancy focuses it’s energies on Military Cyber Commands and Global Federal Agencies CTI reports , webinars , brainstorms , bright talks by global industry and Agency experts to build a threat Intel knowledge pool . The Cyber Threat Intel Knowledge pool in turn takes shape of mindmaps , infographics and video content presentations to be used for Blogs , Digital Magazines , Newsletters and CMS .

This Knowledge pool also facilitates analysis and benchmarking of EDR/NDR , Siem , SOAR solutions available for different ecosystems . This coupled with OSINT research conducted through different search engine Algorithms facilitates proactive Cyber Threat Intelligence Projections incorporating various Geopolitical , Strategic and Policy inputs. Eventually this threat Intel gets included on Collaborative CMS & services integration platform.

Cyber Strategic Communication based on OSINT and Global Cyber Policy Analysis also remains an area of Major interest as it is indispensable for future Cyber threat projections.

OS Hardening – Mapping Desktop / Mobile OS and Application Security with every successive firmware and security patch is continuous work in progress at the Threat Intel Research Consultancy.

This Video Presentation is a succinct snapshot of some Preliminary and detailed experience with Global Cyber Intelligence Think Tanks , Organizations and Associations .

From Researching Analysing Cybersecurity and CTI Products/Services to functioning as a Cyber Threat Intel Provider for Governments , Global Agencies and CTI Organisations. The Scope for Transnational Cyber Alliance remains stupendous.

1Power Easytech4all Cyber threat Intelligence Solution primarily relies on the Cyber Prudence and Strategic Insights of Global Experts from UN Cyber Policy Assessments and Debates on ICT’s , White House Cyber Policy EO’s , Risk Assessments , White House Cyber Resilience Initiatives through various organisational SIGs etc . Also ISSA , INSA ,NATO , UNIDIR , European Defence Agency (EDA) , National Security Agency (NSA) , Cybersecurity and Infrastructure Security Agency (CISA ), Federal Bureau of Investigation (FBI) , World Economic Forums (WEF) Annual Critical Risk Assessments and Cyber Polygons (SOCs) in addition to Pvt Agency Security Operations Centers findings plus CTI analysis.

They are the Cyber beacons for the World shaping Global Cyber Policy and Cyber Deterrence Countermeasures plus standards .


1PowerCyber @ easytech4all.net

https://1powercyber.substack.com

https://1powercyber.blogspot.com

https://easytech4all.tumblr.com

https://linktr.ee/1powercyber







1PowerCyber
In a Nutshell : Cybersecurity & Adv Cyber Threat Intel Research. Mobile OS Hardening. CyberSec Software & Platform Reviews. Content Creation. CMS LMS WebDev. Convergence. Diving Deep into incredible Research on CyberSec. Cloud Archives. Defense Grade Security Intelligence,Awareness,Forecasts,Strategy. Research and Reports. Simplifying Complex Pieces of Incredible Intel. CyberSec Trends. Vulnerability Statistics. US DOD Enterprise Security. Email Threat Analysis. Data Breach Industry Forecasts. UK National Cybersecurity Reports. Adversary Threat Hunting. Protecting Digital Assets. Advanced Persistent Threat Analysis (APT) CyberCrime Modus Operandi and Statistics. Nation State Security Trends. National CyberPower Reports. Age of Cyber Warfare. Research reports on Advanced Cyberdefense Threat Intelligence by US Department of Defense , US Navy , National Cybersecurity Alliance ,US Cyber Command , NSA , FBI , US Department of Homeland Security DHS , CrowdStrike , Edgescan etc.

Leave a comment