Cyber Threat Profiling Save

A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense

Project README

Cyber Threat Profiling Resources

A library of reference materials, tools, and other resources to accompany The Ultimate Guide to Cyber Threat Profiling ebook, published by Tidal Cyber

"The concept of threat profiling offers the potential for threat prioritization, but even when security leaders choose to pursue it, misconceptions over its validity and utility and the lack of a clear and repeatable approach to profiling – as it relates to organization-wide threats – have all hampered its adoption. Even when teams do take steps to prioritize threats, efforts often prolong (in many cases indefinitely) or are impeded by a need for deep intelligence subject matter expertise."

The Guide was created to address each of these challenges, lower barriers to entry into cyber threat profiling, and drive its wider adoption.

Download the ebook here

The Ultimate Guide to Cyber Threat Profiling

Index

Frameworks & Methodologies

Cybersecurity & Cyber Threat Frameworks & Foundational Resources (General)

Threat Profiling/Modeling Frameworks & Methodologies

Adversarial Threat Profiling Guidance & Resources (General)

Threat Data Sources

Adversarial Threat Data (with Structured Metadata)

Niche & General Cyber Incident Data Sources

MITRE ATT&CK®

Working with ATT&CK Data

Threat Quantification

Threat-Informed Defense

  • Threat Informed-Defense Ecosystem start.me page: Living compendium of tools, trainings, & resources related to Threat-Informed Defense
  • Tidal Cyber Community Edition: A freely-available threat-informed defense platform for researching threat actors, building technique sets, and more. Community Edition users are able to share their work and participate in the larger Tidal Cyber community of defenders. (Transparency note: Tidal Cyber maintains this threat profiling resource repository!)

Detection Engineering, Threat Hunting, Adversary Simulation/Emulation, & Purple Teaming

Risk

Risk Resources (General)

Measurement & Estimation

Organizational Context

  • Developing Priority Intelligence Requirements: Guidance around alignment between elements of your organization’s business & strategy, its technological assets, and relevant risks (as they relate to the development of intelligence requirements)
  • U.S. SEC EDGAR Company Filings Database: Filings from public companies can be a great resource for surfacing high-level organizational priorities, objectives, and pressures (whether you are building a threat profile from inside or even outside of the organization (e.g. as an MSSP))

Workflow Resources & Tools

Cyber Threat Intelligence (CTI) Introductory Resources

MITRE ATT&CK® is a registered trademark of The MITRE Corporation

Open Source Agenda is not affiliated with "Cyber Threat Profiling" Project. README Source: tidalcyber/cyber-threat-profiling

Open Source Agenda Badge

Open Source Agenda Rating