Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 4 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

RSAC – Threat intelligence can work if we understand our needs and wants

by The Gurus
April 23, 2015
in Editor's News
Share on FacebookShare on Twitter

Threat intelligence can be a great value-added tool for businesses if it is data collection capabilities are used effectively.
Speaking at RSA Conference in San Francisco, Mark Orlando, director of cyber operations at Foreground Security said that there is “a lot more to intelligence than indicators and leveraging it for response”.
He said that as a tool for defence, threat intelligence is dead as IDS signatures are not subject to quality control, have a short shelf life, cannot be used for long and take cycles away from defence. “We are shifting our understanding of adversary and means and methods creates a false sense of security in our view,” he said,
“Yet processed properly it can be used to get us closer to an adversary’s tactics and the things they cannot change and question becomes if threat intelligence is not dead, how can we make sure it is useful? It could be another defender tool – it just has to be collected and applied well.”
With a market of options ranging from no cost to commercial vendor-specfic offers to internal offers, Orlando said it was important to understand what your monitoring goals are, namely: protecting your business; detecting bad guys; or action and prosecution?
He said: “What are your defensive capabilities? If you want to leverage threat intelligence in defence, you don’t want to take them out of your feed without understanding the feed. It sounds like a simple problem, but what is your awareness in the environment and how does an attacker get in? If you can get to their objectives and if don’t understand them, it is best to stop right there.”
In terms of bad indicators, Orlando said that with very expensive commercial solutions, if you are paying $100,000 you don’t want it acting like a souped up IDS.
“No one intelligence provider has all of the information on all of the threats, so it helps to cast a wide net,” he said. “So if you leverage open source or use industry knowledge, then use it all as long as you are normalising, embedding and ingesting it all.”
Looking forward, Orlando said that if intelligence is collected and used properly, you can do data-driven analysis and do analysis on the data in most contexts.
“Intelligence is a terrible tool for alerting; it should be an engine for incident and historical information,” he said. “Build on a better data collection and investigative methods and let threat intelligence drive that process.”

FacebookTweetLinkedIn
Tags: CollectionForeground SecurityIDSIntelligenceOpen SourceRSARSA ConferenceRSACThreatThreat Intelligence
ShareTweetShare
Previous Post

RSAC – PhishMe expand services to categorise campaigns

Next Post

RSAC – UK and US Government stress collaboration needs and benefits

Recent News

london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information