Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

5 “Actionable Intelligence” Questions Enterprises Should Ask Before Being Breached

From ongoing threat research, to crowd sourcing information, to Big Data analytics, and the list goes on, some security solutions provide mountains of data that are getting higher all the time. And while all of this “intelligence” is important (and potentially overwhelming), enterprises need to take a step back and ask a significant question before they find themselves breached; not after: is the intelligence supplied by our security solution truly actionable?

From ongoing threat research, to crowd sourcing information, to Big Data analytics, and the list goes on, some security solutions provide mountains of data that are getting higher all the time. And while all of this “intelligence” is important (and potentially overwhelming), enterprises need to take a step back and ask a significant question before they find themselves breached; not after: is the intelligence supplied by our security solution truly actionable?

At first glance, this question may seem redundant. After all, isn’t it a given that security solutions deliver actionable intelligence? The answer is yes and no. Yes, virtually all security solutions deliver actionable intelligence. But no, they do not all provide it to same extent, level, quality, and degree. And the absolute worst time for an enterprise to discover a gap between what they expected and what they need is during a cyber attack. That is like learning that the building’s sprinkler system is ineffective — or even worse, broken — during a fire.

Actionable Security IntelligenceWith that being said, it is both fair and necessary to highlight that the definition of “actionable intelligence” can differ from vendor to vendor; and this difference can be surprisingly, even shockingly large. As such, it is up to enterprises to do some digging — proactively, not reactively — and ensure that the intelligence supplied by their current or prospective security solution is truly actionable, and not just an attractive marketing claim.

To that end, here are five questions that enterprises should ask about actionable intelligence now, not later:

1. Can we identify compromised assets within the corporate network, as well as beyond the corporate network (i.e. remote employees, 3rd party vendors, distributed sites, etc.)?

2. Are we able to use indicators of compromise for further analysis?

3. Can we easily retrieve analysis results to get additional insight into network activity?

4. Can we correlate indicators from compromised devices with other security-related events?

5. Can we integrate all of our actionable threat intelligence into our legacy security solutions so that we get the protection we need?

Simply put, enterprises should be able to answer an unqualified “yes” to each question, and not settle for anything less. Otherwise, what sounds good in theory will not translate into practice, and enterprises will find themselves scrambling to recover in the aftermath of an attack, instead of implementing a swift, accurate, and effective response based on truly actionable intelligence. The former is a risky proposition that threatens to severely and possibly permanently damage profits and reputations. The latter, however, is arguably the only way for enterprises to stay safe and keep the bad guys from getting the upper hand.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Funding/M&A

Twenty-one cybersecurity-related M&A deals were announced in December 2022.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...