Here is a bitchingly hard question: how to get organizations to move up the maturity scale of using threat intelligence (TI), from blindly [ok, not always blindly] dropping indicator feeds into tools to [at least] appreciating and utilizing strategic threat intelligence?
Now, a cynicist [and …well…aren’t we all?] may say “why help people who won’t help themselves?” For once, this is my job But more importantly, there seem to be enough organizations that want to get there, but don’t see a path – so we can provide that.
In essence, how to teach people addicted to instant noodles to appreciate caviar? BTW, my esteemed colleague have used the caviar metaphor first in his recent TI paper, but as a native Russian I totally own all caviar metaphors!
So, I touched on why they may not be using better intel in the past, but now the question is: how to get them to? BTW, we are NOT talking about the internally-sourced intel, its value is of course indisputable, but the effort is generally even higher than what we are talking about in this post.
Here is an idea of how to start the journey: look at this TI use cases table. Specifically, the column on strategic intel. Pick ONE box, say “Security architecture and monitoring planning based on long-term threats and relevant actor capabilities” and find THREE ways how it is valuable to your organization. Convinced? Then start doing it… BTW, Augusto has great additional ideas here in this post.
P.S. If this seems incomplete, you are not wrong … as usual, we have to save enough juicy stuff for our upcoming TI paper…
Blog posts related to threat intelligence:
- About The Tri-Team Model of SOC, CIRT, “Threat Something”
- Baby’s First Threat Intel Usage Questions
- How a Lower Maturity Security Organization Can Use Threat Intel?
- Threat Intelligence and Operational Agility
- My Threat Intelligence and Threat Assessment Research Papers Publish (2014)
- Threat Assessment – A Tough Subject (And Sharks with Fricking Lasers!)
- On Threat Intelligence Management Platforms
- How to Use Threat Intelligence with Your SIEM?
- On Internally-sourced Threat Intelligence
- Delving into Threat Actor Profiles
- On Threat Intelligence Sources
- How to Make Better Threat Intelligence Out of Threat Intelligence Data?
- On Threat Intelligence Use Cases
- On Broad Types of Threat Intelligence
- Threat Intelligence is NOT Signatures!
- The Conundrum of Two Intelligences!
- On Comparing Threat Intelligence Feeds
- Consumption of Shared Security Data
- From IPs to TTPs
Read Complimentary Relevant Research
Five Golden Rules for Creating Effective Security Policy
Policy writing is a risk communication exercise that is frequently performed by people who lack the skills needed to create good security...
View Relevant Webinars
Fundamental Principles of Software Asset Management
Whether you've got too much software or not enough, uncontrolled software costs are a drain on your IT department, consuming resources...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.