Actionable threat intelligence is a priority

Mimecast has released the latest report Threat Intelligence: Far-fetched Idea or Must-have Security Tactic? from the Cyber Resilience Think Tank, an independent group of more than a dozen security leaders dedicated to working together to address cyber resilience challenges facing organizations.

  • 5 years ago Posted in
In this Mimecast-sponsored report, insights from global IT leaders have been sewn together to offer first-hand prescriptive advice and tactics for navigating the challenges of threat intelligence, including how to make actionable threat intelligence a priority in any sized organization. As one leader explains, “Good, actionable threat intelligence can help tell you who is behind an attack, the tools and tactics used, the who, the how and what they’re after.”

 

If threat intelligence isn’t built into an organization’s comprehensive cyber resilience strategy, the organization could be vulnerable to phishing attacks, malware incidents or worse. The Cyber Resilience Think Tank recently met to discuss threat intelligence and why it’s a must-have, and obtainable, security asset for organizations of all sizes - regardless of budget.

 

Malcolm Harkins, Chief Security and Trust Officer at Cylance and Cyber Resilience Think Tank member, said, “As a security industry, we have to move away from being in a constant state of reaction. I want to minimize damage to my organization—I want prevention. I’ve always looked at threat intelligence broadly: What’s my open source intelligence? What’s my human intelligence? What’s my signals intelligence? I want it all, because it all matters.”

 

The report provides key insights from the group on how to avoid data exhaust; how businesses can use information they already have in-house, like previous data breach and vulnerability reports; and what’s absolutely critical when it comes to implementing this critical security capability. Additional themes throughout the report include:

 

  • How threat intelligence is not just for the one-percent;
  • How to use open APIs and known threat patterns;
  • How to prove value with little (or no) budget; and
  • Why most threat intelligence is outsourced – and why it is OK.

 

Maurice Stebilia, CISO at HARMAN and Cyber Resilience Think Tank member, said, “I have various cybersecurity partners collecting intelligence on my behalf. All of their tools I have protecting the cloud, the network, the endpoint—they’ve taken those feeds and built them into their products so if there’s a vulnerability, it’s going to be blocked and captured. And I’ll get an alert.”

 

According to Marc French, Chief Trust Officer at Mimecast and Cyber Resilience Think Tank member, true intelligence means turning information into action. 

Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
73% of organizations lack automated patch management, and 62% experienced incidents involving...
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to...
Aqua’s cloud native application protection platform becomes the only solution that protects cloud...
54% of organisations working on a security transformation project now or in the next 12 months.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...