Cyber Threat Intelligence 1607731783

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13
At a glance
Powered by AI
The key takeaways are that cyber threat intelligence provides visibility into security hazards to reduce risks of information loss and business disruptions. It focuses on analyzing potential and current cyber attacks.

Cyber threat intelligence (CTI) is the analysis and collection of information on potential and current cyber attacks that threaten an organization's security. CTI aims to prevent data breaches and save costs associated with security incidents.

Sources of cyber threat intelligence include technical data like threat lists and malicious infrastructure, social media, dark web forums, and data provided by public media sources. Each source has benefits and limitations that require analysis to determine value.

Everything You Need To Know

Cyber threat intelligence provides proper


visibility into emerging security hazards to
reduce the risk of information loss, minimize
or block disruption in business operations,
and maximize regulatory consent
What is Cyber Threat Intelligence (CTI)?

Threat Intelligence or Cyber Threat Intelligence (CTI)


is a part of cybersecurity that focuses on the analysis
and collection of information on both potential and
current cyber-attacks that threaten the security of an
organization or its assets.

Cyber Threat Intelligence is a proactive security


measure that prevents data or security breaches and
saves the financial cost required to clean up such a
mess after a breach.
// CYBER THREAT INTELLIGENCE

Not all threats are created equally, and not


all threats would have the same impact on
an organization if successful.

It’s important for companies to be aware of


all potential threats, but threat intelligence
goes a step further and allows those
companies to dedicate security resources to
strengthen defenses where necessary to
strengthen the security posture against the
attacks that are most likely to actually occur.

In cybersecurity, the capability to predict


future attacks even before they reach
targeted networks can help organizations
prioritize their responses, speeding up the
decision-making process as well as response
time, providing better security altogether.
Importance of Security Strategy
and Cyber Threat Intelligence
In the initial stages of creating a threat cyber-intelligence capability, it
is vital to develop an understanding of the services, providers, tools
and platforms that are currently available on a day-to-day basis.

Unfortunately, as interest in this area of security has increased, the


term “threat cyber-intelligence” has been adopted and applied in
many places where it may not be applied in a correct way. In
particular, the terms “data”, “information” and “intelligence” may
often used interchangeably.

Intelligence tells a story that can be used to inform decision making.


Fundamentally, intelligence never answers a simple question, but
paints an image that can be used to help people answer much more
complicated questions.

Information on buying trends could be used in combination with


behavioral psychology research to help shoppers find the items they
want. This intelligence does not directly answer the question of how
to make people buy more, but it helps in a process of business
decision making.
CYBER THREAT INTELLIGENCE
Importance of Security Strategy
and Cyber Threat Intelligence
In many cases, accessing data from threat feeds is considered the “on”
switch for a threat intelligence capability. Because these tools are
often open source and dealing with technical indicators, they are often
touted as a good starting point for developing a strategy.

Threat cyber-intelligence is a relatively new area of information


security, and those who have the necessary services and technology
should be interested in making sure that organizations understand the
benefits they will see with this type of capability.

But as with any emerging technology, exaggeration from time to time


exceeds reality, we must make a good management of expectations.

Since there is an exponentially greater amount of data than ever


before, there are also many more opportunities to gain intelligence
from it. But, with so many sources and so many data, this is difficult to
do manually.

Many times, the term “threat cyber-intelligence” is used to describe the


sources of all this data, but in reality they are simply data sources that
must be processed before they can be considered intelligence.

CYBER THREAT INTELLIGENCE


Sources of Intelligence

Social Media:
Undoubtedly, there is a lot of potentially useful data on social
media channels, but it is difficult to determine false positives
and misinformation.

In general, we will find many references to the same threats and


tactics, which can be a heavy burden for security analysts.

DarkWeb (part of the Internet not


reachable by search engines):
Undoubtedly, there is a lot of potentially useful data on social
media channels, but it is difficult to determine false positives
and misinformation.

In general, we will find many references to the same threats and


tactics, which can be a heavy burden for security analysts.

CYBER THREAT INTELLIGENCE


Sources of Intelligence

Technical data (for example, lists of


threats, malicious infrastructure):
This type of data is available in large quantities, often free of charge.
Due to its binary nature, it is easy to integrate it with the existing
security technologies, although a great amount of additional analysis
will be needed to obtain a real context. These sources present a high
probability of false positives, and the results are frequently outdated.

Data provided by public media:


These sources often provide useful indicators of new and emerging threats,
but it will be difficult to connect them with relevant technical indicators to
measure the genuine risk of each of them on its own.

Forums:
Because these channels are specifically designed to host relevant
discussions, they are a potentially valuable source of information about
threats. That said, time should be spent collecting and analyzing to identify
what is truly valuable about them.

CYBER THREAT INTELLIGENCE


Importance Of Threat Intelligence

Many times, organizations adopt a volumetric approach to security,


particularly when it comes to addressing vulnerabilities. And, of course,
without the cyber-intelligence of threats to inform about the strategy, it only
makes sense to prioritize the vulnerabilities according to the number of
susceptible systems.

But with a robust threat intelligence program that provides vulnerability


analysis from a wide variety of available sources, firms can take a much
more strategic and risk-based approach. Instead of painting by numbers,
Organizations can consult a range of sources and receive alerts about
specific indicators that increase the risk of a CVE being exploited.

Seventy five percent of the vulnerabilities reported since the beginning of


2016 appear on websites and social networks an average of seven days
before the primary information channels. And as references to disclosed
vulnerabilities increase, so does the likelihood of exploitation. The nature
of the sources also becomes a factor in these terms.

A thread in the references in criminal forums or dark web communities will


also contribute to a higher risk score, as the threatening actors begin to
discuss and share methods to exploit. The risk will increase once again
when the indicators show that the vulnerability is part of an Exploit kit.
HOW TO COUNTER POSSIBLE TROUBLES?
Define the goals, and strictly stick with it. The
clearer you are, the areas that believe that cyber-
intelligence will change the security profile, the
more likely we are to succeed.
2020
Do not be afraid to be very specific from the
beginning to ensure that you maximize value in
just a few key areas.

Do not look for a provider, find a partner.

To develop the intelligence capacity, re-purpose


a new goal to reach the initially established
objectives.

A threat cyber-intelligence provider who invests


in the success of their jobs and works with the
firms, to discover new potential use cases is
much more valuable than a provider who simply
sees your organization as another paycheck.
You can't defend your
business if you don't
know what threats are
coming your way.

You might also like