![]() |
Recently, as part of the scope in establishing a Security Operation Center for a European telecommunications company, I have been asked to develop a cyber threat intelligence (CTI) program. The goal is to better understand the motives, capabilities and objectives of threat actors that might seek to target the organization so that adequate countermeasures could be implemented as part of the broader SOC program. The proposed path was to adopt a requirements-based approach rather than the blind purchase of a commercial intelligence tool. Developing a requirements-based model plays a crucial role in driving the success of a CTI program. Objectives included the use of the intelligence gathered to inform decision makers at different levels (using data science and machine learning models) regarding adversary tools, tactics, and procedures (TTPs), at both strategic and tactical levels. An efficient and effective CTI strategy can increase the return on security investments and decrease the risks to the organization’s assets. Furthermore, the focus on protecting high-value information assets (HVIAs) helps avoid common mistakes such as:
As we know, a CTI solution must provide actionable data in a timely, accurate, and relevant manner (and at an optimal rate/frequency in the context around they are consumed), and take into consideration any existing security controls which may remediate or act as a countermeasure to the threats which have been identified to provide remediation and, identifying and answering specific technical and business questions. In particular, the scope of the CTI model can benefit by broadening the scope of the use cases. Examples of some of the benefits include:
In an environment with tight budgets, the implementation of a CTI program using a phased and requirements-based approach can enable small investments to materially enhance the overall security posture of the organization. With today’s threat landscape, there are no silver bullets to security and risk management. A one-size-fits-all approach may just distort the ability to identify adversaries and protect what matters most. The post First principles of a Cyber Threat Intelligence Program appeared first on Speaking of Security - The RSA Blog and Podcast. |
