WHAT IS CYBER THREAT INTELLIGENCE?

      2 Comments on WHAT IS CYBER THREAT INTELLIGENCE?

Threats to cybersecurity, such as ransomware, DDoS attacks, security breaches, data thefts, and malware attacks, are becoming more frequent across the globe. Based on studies conducted by Ponemon Institute, the average cost of a data breach is $242 per record. The companies on an average lose more than $8 million in every single data breach. Hence being reactive in addressing these challenges is not an effective strategy anymore and organizations are slowly realizing that. They must take proactive steps by building robust and secure systems by investing in threat detection and response technologies. Threat intelligence programs are becoming more crucial than ever in order to identify and prevent cyberattacks before they happen, to minimize the damage.

In this blog we will discuss about what is threat intelligence, it’s types and threat intelligence lifecycle.

Cyber Threat Intelligence

WHAT IS THREAT INTELLIGENCE
Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and action-oriented advice about an existing or emerging menace or hazard to assets. This information is then used to inform decisions regarding the subject’s response to that hazard, according to Gartner.

The information that enables organizations to take proactive steps to prevent or minimise the effect of cyber-attacks is threat intelligence. It includes information about potential attackers, their intent, indicators of compromise. These insights can help organizations make quick & informed security decisions in case of cyber threats. 

The development of threat intelligence is a circular and continuous process known as the Intelligence Cycle. Intelligence about attacks alone will not serve the purpose. Organizations should implement the correct tools & strategies to safeguard their data, operations and customers.

WHY IS THREAT INTELLIGENCE IMPORTANT AND WHO BENEFITS FROM IT?
To learn more about threats, create robust security strategies, and mitigate attacks before happening, organizations leverage the key data about threat actors. According to Grand View Research, the threat intelligence market is expected to grow at 17.4% CAGR from 2017 to 2025. It would potentially earn revenues of nearly $12.6 billion in 2025.

The security measures of most organizations are also weakened because of huge amounts of data and shortage of skilled cybersecurity professionals. It leads to a gap between what threats should be addressed and what the organization is capable of addressing. It certainly leads to situations where serious threats are not noticed. Most SOC teams can only investigate 56% of alerts, while only 34% of them are legitimate. The security experts spend about 25% of their time investigating false positives, according to Ponemon Institute studies. These indicates wastage of time and resources, and dissolves the purpose of cybersecurity programs. A cyber threat intelligence solution should address such issues and strengthen the security by identifying the intent, motivation of attackers, actions to minimise such attacks, integrating disparate data to give timely warnings, and promoting proactive decision making.

Threat intelligence benefits everyone involved in security:

Security Analysts: It improves the cyber defense strategies of organizations.

Intelligence Analyst: It helps in identifying threat actors to stop the misuse of information assets.

Computer Security Incident Response Team (CSIRT): It looks into incident investigations, and analyses threats to mitigate the losses.

SOC: It provides solutions to strengthen internal warnings, alerts and enable better incident response.

Threat intelligence is also important for executive leadership. It empowers them to understand cyber risks & make data-driven decisions to reduce their impact.

THE THREAT INTELLIGENCE LIFECYCLE
The process of understanding, analyzing, prioritizing and utilizing threat information is not a linear one-time process, but it is part of a continuous lifecycle. A threat intelligence strategy that uses Machine Learning is iterative & adapting to strengthen the security techniques of an organization and enables security experts to maximize the value of the intel they receive. The threat intelligence lifecycle has following six phases:

REQUIREMENTS GATHERING AND PLANNING

The security teams set the objectives, align them with the core vision of the organization, and predict the impact of decisions made based on this intelligence. They also uncover information about threat actors, magnitude of the attack, and methods to increase security.

DATA COLLECTION

After the requirements are gathered, the team collects relevant threat data. This may include indicators of compromise (like malicious IP addresses, emails, URLs and domains) or other vulnerable information. This data is collected by looking at multiple sources such as, network event logs, traffic logs, open web, dark web, social media, paste sites, industry thought leaders, subject matter experts, etc.

DATA PROCESSING

The data gathered in previous stage is sorted, organized and filtered to support further analysis. The redundant, irrelevant information is removed and metadata tags are added. The manual process of adding data to spreadsheets, encrypting, decrypting files is automated.

DATA ANALYSIS

The processed data is now analyzed in this stage. The teams understand the data, check whether the data satisfies the requirements identified in the first stage, and identify for potential security risks. The data is then converted into a format (report, presentation deck, threat list) the senior executives can understand. The security experts highlight the key action items to mitigate threats.

DISSEMINATION

The results from analysis stage are presented to the stakeholders. Every piece of intelligence is tracked to maintain continuity between threat intelligence cycles.

FEEDBACK AND ADJUSTMENTS

After the reports are presented, stakeholder feedback is solicited to determine any changes to objectives, threat intelligence operations and procedures and priorities.

THREE TYPES OF THREAT INTELLIGENCE
Each threat type has a different purpose and is aimed at a specific audience. The threat intelligence types are:

STRATEGIC THREAT INTELLIGENCE

Key audience: Senior/C-Suite managers (CISO, CTO, etc.), company board members.
What it does: It provides a big picture of the organization’s threat landscape, threat actors, risks and trends. This intelligence is less technical since the target audience is stakeholders.

OPERATIONAL (TECHNICAL) THREAT INTELLIGENCE

Key audience: Threat hunters, CSIRT, SOC analysts, vulnerability management teams.
What it does: This focuses on understanding important operational aspects, including threat actor capabilities, infrastructure and TTPs. It includes technical information from threat intelligence feeds. The security teams use this to optimize cybersecurity operations with targeted actions.

TACTICAL THREAT INTELLIGENCE

Key audience: SOC analysts, system architects, SIEMs, firewalls, endpoints.
What it does: This includes contextual information about TTPs and targeted vulnerabilities. The security teams use this to understand threat vectors and mitigate potential attacks. The teams leverage this information to strengthen existing security controls and accelerate incident response.

Cyber Threat Intelligence has become crucial in our globally expanding threat landscape. With targeted proactive threat intelligence, organizations can make their security systems more robust as well as mitigate the risks that could damage their reputation and financial health, thus keeping them few steps ahead of cybercriminals.

V3iT™ will help you in protecting your systems from targeted attacks. You can either implement your own custom solution or use cyber threat intelligence feed. Contact us today to learn about V3iT™ services and solutions & how we can help your business.

2 thoughts on “WHAT IS CYBER THREAT INTELLIGENCE?

  1. Charissa Deetz

    This is the perfect web site for anybody who really wants to find out about this topic. You know so much its almost tough to argue with you (not that I really will need to…HaHa). You certainly put a fresh spin on a subject that’s been written about for years. Wonderful stuff, just great!

  2. LouisPneub

    Hey there my friends. We are excited we heard this blog. I’ve been scratching my head for this info since last weekend and I will be sure to tell everyone I know to swing by. The other night I was traversing through the most relevant threads trying to secure a solution to my tough questions. Now I am going to take great care in whatever path I can. We are getting all worked out on the revelations we are observing. Moreover, I just hoped to thank you from the bottom of my heart for such open sourcing. This has forced me out of my comfort zone. Many novel improvements are shaping around my world. Its really a good forum to make new ideas available. I must make mention that I am into.

Comments are closed.