Gathering Cyber-Threat Intelligence – There’s a Better Way!

Redport Information Assurance
In a recent online read of Dark Reading, Mr. Phatak an independent security researcher and blogger for Dark Reading provided a commentary on developing your own cyber-threat intelligence program and platform. There are several start-ups in the vast field of gathering cyber threat intelligence. Many of the start-ups believe if they hurry and subscribe to the several threat intelligence services that they would be able to spot threats faster and thereby minimize the damage and losses which are usually associated with various cybersecurity incidents. Unfortunately, the market is currently being inundated with these types of quick-fire cyber-threat intelligence service providers. However, Mr. Phatak states otherwise. He has had several one on one meetings with those responsible for cybersecurity in the C-Suite. The CISOs’ and CIOs’ wanted something different besides subscribing to yet another cyber-threat intelligence service provider. Therefore, Mr. Phatak has concluded what enterprises need most are very well prepared strategic plans to both operate and automate cybersecurity threat intelligence based on both pertinent and actionable intelligence. The major steps to achieve this goal stated by Mr. Phatak were to follow and develop the following objectives; (1) Define What You're Trying to Achieve, (2) Only ingest what your computer enterprise system can ingest, (3) Know your cyber threat intelligence consumers and finally, (4) Make sure you provide precise and comprehensive cyber-threat intelligence reports or else your consumers will think that the cyber incidents never happened. The final statement here of writing reports with the cyber-threat intelligence data can be captured and used in order to produce and maintain various cyber threat metrics. These metrics can also provide additional intelligence by producing cyber threat trending reports which could provide a wealth of knowledge for planned actionable intelligence for now and in the future.

By Randall Sylvertooth, D.Sc.

Reference: http://www.darkreading.com/threat-intelligence/getting-threat-intelligence-right/a/d-id/1328720?


For more information about Redport’s information assurance and cyber security services, visit www.redport-ia.com, email us at info@redport-ia.com, like us on Facebook, and follow us on Twitter@redport_ia.

Gaithersburg, MD, USA