Network Security

Threat Intelligence: Putting the Horse Before the Cart

Threat intelligence has received a lot of attention from the industry, ranging from vendors expanding their product portfolios and venture capitalists funding new start-ups to end user organizations looking for insights into advanced cyber-attacks that aren’t available from traditional perimeter defense tools. However, threat intelligence in and of itself is just another data source that adds to the complexity and velocity of having to analyze data in a manual fashion.

<p><span><span><strong>Threat intelligence has received a lot of attention from the industry, ranging from vendors expanding their product portfolios and venture capitalists funding new start-ups to end user organizations looking for insights into advanced cyber-attacks that aren’t available from traditional perimeter defense tools. However, threat intelligence in and of itself is just another data source that adds to the complexity and velocity of having to analyze data in a manual fashion. </strong></span></span></p>

Threat intelligence has received a lot of attention from the industry, ranging from vendors expanding their product portfolios and venture capitalists funding new start-ups to end user organizations looking for insights into advanced cyber-attacks that aren’t available from traditional perimeter defense tools. However, threat intelligence in and of itself is just another data source that adds to the complexity and velocity of having to analyze data in a manual fashion.

In the first few weeks of 2016, a new round of data breaches at companies including NationBuilder, MacKeeper, Landry’s, Cottage Health, and Northwest Primary Care have made headlines. They illustrate how difficult it remains to identify risk indicators when cyber attackers, including their strategy, competences, and actions, are unknown. To overcome the inherent limitations of focusing on control gaps and vulnerabilities when performing cyber risk assessments, more and more organizations are turning to threat intelligence to enrich their security detection and response capabilities. Since a threat is the agent that takes advantage of a vulnerability, this relationship must be a key factor in the risk assessment process. It can no longer be treated as risk’s neglected step child.

In fact, advanced security operations teams leverage threat intelligence to gather insight into the capabilities, current activities, and plans of potential threat actors (e.g., hackers, organized criminal groups, or state-sponsored attackers) to anticipate current and future attacks. Sources range from government agencies (e.g., the National Terrorism Advisory System by the U.S. Department of Homeland Security, United States Computer Emergency Readiness Team) and industry information sharing forums (e.g., the Financial Services Information Sharing and Analysis Center, Red Sky Alliance) to commercial threat intelligence services that provide information about IT security threats, vulnerabilities, incidents, and other security-related issues.

Gartner predicts that by 2020, 25% of global enterprises will engage the services of a “cyberwar mercenary” organization, including threat intelligence services. However, organizations must recognize that subscribing to these services only increases the challenges associated with processing and extracting actionable information from security data, which in its raw form remains only a means to an end. Stand-alone threat intelligence services, just like silo-based security tools, only add to the volume, velocity, and complexity of data feeds that must be analyzed, normalized, and prioritized.

Unfortunately, the latter represents one of the biggest challenges in today’s fight against cyber-attacks. Traditional security tools are silo-based and require legions of staff to comb through the huge amount of data to connect the dots and find the needle in the haystack. The bitter truth is that the security industry has too few professionals to tackle these tasks. According to the Information Security Audit and Controls Association (ISACA) there are more than 1 million unfilled security jobs worldwide. Thus, it is not surprising that it takes on average eight months for an advanced threat to be detected in a victim’s network. Even for organizations that can afford a deep bench of security analysts, accumulating distributed data can take months, during which time attackers can exploit vulnerabilities and extract data.

Finally, threat intelligence has little value unless it is put into context of an organization’s security posture. Most don’t have the resources to apply the required logic to correlate external threat data with their internal security intelligence. This results in the underutilization of threat intelligence feeds or requires expensive outside consultants to perform the analysis.

Fortunately, new technologies that take a pro-active approach to cyber risk management are emerging to not only aggregate multiple threat intelligence feeds, but more importantly correlate external and internal security data with its business criticality or risk to the organization. This allows for increased operational efficiency and faster time-to-remediation without requiring expensive consulting services.

RelatedDistinguishing Threat Intelligence From Threat Data

Advertisement. Scroll to continue reading.

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version