Wednesday, 21st August 2019
Logo

Actionable threat intelligence is a priority

Mimecast has released the latest report Threat Intelligence: Far-fetched Idea or Must-have Security Tactic? from the Cyber Resilience Think Tank, an independent group of more than a dozen security leaders dedicated to working together to address cyber resilience challenges facing organizations.

In this Mimecast-sponsored report, insights from global IT leaders have been sewn together to offer first-hand prescriptive advice and tactics for navigating the challenges of threat intelligence, including how to make actionable threat intelligence a priority in any sized organization. As one leader explains, “Good, actionable threat intelligence can help tell you who is behind an attack, the tools and tactics used, the who, the how and what they’re after.”

If threat intelligence isn’t built into an organization’s comprehensive cyber resilience strategy, the organization could be vulnerable to phishing attacks, malware incidents or worse. The Cyber Resilience Think Tank recently met to discuss threat intelligence and why it’s a must-have, and obtainable, security asset for organizations of all sizes - regardless of budget.

Malcolm Harkins, Chief Security and Trust Officer at Cylance and Cyber Resilience Think Tank member, said, “As a security industry, we have to move away from being in a constant state of reaction. I want to minimize damage to my organization—I want prevention. I’ve always looked at threat intelligence broadly: What’s my open source intelligence? What’s my human intelligence? What’s my signals intelligence? I want it all, because it all matters.”

The report provides key insights from the group on how to avoid data exhaust; how businesses can use information they already have in-house, like previous data breach and vulnerability reports; and what’s absolutely critical when it comes to implementing this critical security capability. Additional themes throughout the report include:

  • How threat intelligence is not just for the one-percent;
  • How to use open APIs and known threat patterns;
  • How to prove value with little (or no) budget; and
  • Why most threat intelligence is outsourced – and why it is OK.

Maurice Stebilia, CISO at HARMAN and Cyber Resilience Think Tank member, said, “I have various cybersecurity partners collecting intelligence on my behalf. All of their tools I have protecting the cloud, the network, the endpoint—they’ve taken those feeds and built them into their products so if there’s a vulnerability, it’s going to be blocked and captured. And I’ll get an alert.”

According to Marc French, Chief Trust Officer at Mimecast and Cyber Resilience Think Tank member, true intelligence means turning information into action.

Agreement solidifies commitment to share strategic information with partners and law enforcement.
Two thirds are now checking SMEs’ security training credentials, over one third make them part of th...
Collaborations with ISARA Corporation and ID Quantique will make quantum-safe crypto more widely ava...
ShieldIO awarded Startup Company of the Year by Enterprise Security Magazine for its advanced encryp...
Wipro has released its 2019 State of Cybersecurity Report that highlights the rising importance of c...
NetScout launches Cyber Threat Horizon for continuous visibility into the threat landscape.
Respondents identify people as biggest source of cyber threats, with Facebook and BA as most notable...
Research indicates an urgent need for newer SIEM technologies that increase SOC analyst productivity...