Cyber Threat Intelligence: Who’s Using it and How?

Understanding your adversaries and collecting information about them can strengthen your defences and deliver a proactive approach against threats. Cyber threats are one of the most emerging and dynamic kind of threats that are causing damages in billions and putting companies out of businesses.

Our information assets can be protected in this evolving threat landscape with the complete and accurate knowledge about threat vectors, sources and working. Cyber threat intelligence is a proactive approach of collecting, testing, analysing and sharing information about emerging threats. Reactive solutions to evolving cyber risks do not provide a high level of assurance and often result in substantial damages.

Gartner defines threat intelligence as “evidence-based knowledge, including context, mechanisms, indicators, implications and action-oriented advice about an existing or emerging menace or hazard to assets.” Cyber threat intelligence (CTI) is built on data that is collected and analysed from various sources. Informed and accurate detection of any threat is pivotal in shaping a security posture against it. CTI using knowledge based systems and artificial intelligence identify threats, the context and the targets. Security controls are normally designed by viewing an organization from inside out. CTI helps us see our assets from the point of view of attacker.

CTI is a broad topic and often its complex language hinders its proper usage. A brief of critical components that ensure a vibrant CTI are listed below.

  1. SOURCES:

Sources of information both internal and external form the basis of efficient and effective CTI effort. Threat intelligence rely of reliable and accurate data sources. Internally all devices that feed data to SIEM are source of data. In addition to this learning experiences of organization and its employees is a critical source of precious information.

Hackers share their codes, vulnerabilities and attack vectors enhancing each malicious attempt from the last. Most of the security companies treat their information as confidential and hence redundant security tasks are performed. CTI stresses on sharing information by open source or by vendor threat feeds.

  1. ANALYTICS

Strong analytical machine learning algorithms that can give meaning to collected data and provide reasonable insights about emerging threats are essential. Selection of software solutions must be based on business objectives and aligned with organizational strategies.

  1. TARGETED ACTIONS

CTI provides results based on which actions can be performed to elevate the risk profile. Actions based on CTI deliver better results and generate more information for future steps.

Companies around the globe which have any connection with cyber world must utilized some level of CTI so that their business functions keep operational.

CTI is an emerging concept which is enhancing with each passing day. The data collected today helps it protect against more threats tomorrow. The results delivered by CTI are promising and will shape the future of cyber security. However it is important to understand that more reliable and accurate sources must be added to facilitate and deliver useful intelligence. Incorporating CTI capabilities in your information security programme earlier can deliver better return on investments as maturity of your security programme increases.

 

2 thoughts on “Cyber Threat Intelligence: Who’s Using it and How?

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s