Hybrid Event: Threat Intelligence as Part of Cybersecurity - BCS ISSG

cybersecurity

Neon light trails Futurium, Berlin, PHOTO CREDIT: MaximalFocus

In the 20th century, the ability to perceive and address threats was primarily confined to the public sector. Intelligence agencies, militaries, and law enforcement entities honed their threat intelligence expertise to comprehend and prioritize potential dangers. However, as we entered the 21st century, the private sector took center stage in facing cyber threats, equipped with both the visibility and capability to respond. Nevertheless, many organizations in the private sector lack the essential threat intelligence skills required to navigate through the vast sea of available information effectively.

This article will delve into the evolution of threat intelligence throughout history and explore how businesses can leverage these crucial skills to gain a deeper understanding of the threat landscape. By doing so, they can foster better decision-making processes.

Martin Lee (photo) is a seasoned professional with two decades of experience in the security industry. He serves as the technical lead of security research at Talos, Cisco's prominent threat intelligence and research organization. Additionally, within the same group, he holds the position of EMEA lead for Strategic Planning & Communications. Martin is a dedicated researcher at Talos, focused on enhancing Internet resilience and raising awareness about current threats. His work involves extensive research on system vulnerabilities and monitoring shifts in the threat landscape.

Cisco Systems London Threat Intelligence as Part of Cyber Security - BCS hybrid event

With certifications as a CISSP and a Chartered Engineer, Martin has recently authored a comprehensive book titled "Cyber Threat Intelligence," which further demonstrates his expertise and commitment to the field.

A Model Threat Intelligence

In the context of cybersecurity and threat intelligence, the flow of information is critical for effective decision-making and proactive defense. A well-structured threat intelligence model ensures that decision makers are at the core, driving the entire process to meet their information needs.

At the center of the model, we have the Decision Maker, representing the individuals or entities responsible for making strategic choices regarding their organization's security posture.

  1. Information Needs: The Decision Maker sets the questions and areas of concern that they require intelligence on. These information needs could be related to emerging threats, vulnerabilities, potential attacks, or even broader situational awareness.

  2. Researched Intelligence: This layer represents the actionable intelligence collected by the "Intelligence Analyst" and their team. They investigate, analyze, and validate data from various sources to create comprehensive and relevant intelligence reports.

  3. Intelligence Reports: The output of the Intelligence Analyst is the "Intelligence Report." These reports contain insights and recommendations derived from the analysis of threat data, tailored to address the specific information needs of the Decision Maker.

  4. Action: Armed with the intelligence reports, the Decision Maker takes informed actions to enhance their organization's security posture, proactively mitigating potential threats, and responding effectively to ongoing incidents.

  5. Intelligence Manager: This role oversees the entire threat intelligence process, ensuring that it aligns with the organization's goals, manages resources and oversees the quality and accuracy of intelligence reports.

Overall, this model emphasizes a seamless flow of information and communication between the various roles involved in the threat intelligence process. Decision makers play a central role, directing the focus of the intelligence efforts and in turn, receive actionable insights that guide their strategic actions. Meanwhile, the Intelligence Analysts and Intelligence Manager work together to ensure that the intelligence produced is relevant, accurate, and timely.

In a rapidly evolving threat landscape, this intelligence-driven approach empowers organizations to be proactive in defending against cyber threats, making data-driven decisions that protect their assets, data, and reputation. By fostering a smart, adaptive and collaborative threat intelligence ecosystem, organizations can stay one step ahead of potential adversaries and secure their digital future.

Good Intelligence Is…

Centralized - efficient resource use.

Responsive to user needs.

Objective - independent assessments.

Systematic - methodological collection.

Sharing - widely shared while respecting sources.

Continuously reviewed.

Accessible - written and available for the intended user.

Timely - within a timeframe

Words of Estimative

In the world of threat intelligence, uncertainty is inherent and making estimations becomes essential. We use various descriptors to assess the confidence in our intelligence. By employing these words of estimative, we strive to provide the most accurate and relevant threat intelligence, even in the face of uncertainty:

  • Confidence Levels: Ranging from Low to Medium to High, these indicate our certainty in the accuracy of the intelligence.

  • Probability Levels: Classifying threats as Remote, Likely, or Almost Certain helps gauge the likelihood of an event or attack.

  • Source Reliability: We determine if the sources providing information are Reliable or Unreliable.

  • Credibility: Assessing whether the information is Credible or Doubtful helps us weigh the accuracy and trustworthiness of the intelligence.

Bletchley Park

Bletchley Park, nestled in the idyllic landscapes of Buckinghamshire, England, was where World War II heroes wielded intellect as their potent weapon. At its heart lies the tale of enigmatic codes and the relentless pursuit of answers. The genius Alan Turing led the finest minds in challenging the German Enigma machine, creating the "Bombe," the first electronic computer, to crack its confounding codes.

Their triumph provided crucial intelligence to the Allied forces, altering the tides of war and saving countless lives. Bletchley Park's impact on cybersecurity reaches far beyond history, reminding us of the importance of strong cryptographic algorithms and collaborative efforts in our digital age.

As torchbearers of this unyielding camaraderie, let us draw inspiration from Bletchley Park's pioneers, safeguarding our interconnected world and protecting sensitive information. May their legacy guide us as we navigate the cryptic waters of the ever-evolving digital realm, harnessing the boundless power of human intellect to secure a prosperous future.