Threat Intelligence

Published: Feb. 27, 2019, 11:02 p.m.

Do companies who deliver "threat intelligence" deliver on that promise, or is there more the customer needs to bring to the table to be able to take action?

Check out this post and discussion for the basis of our conversation on this week's episode which is\xa0co-hosted by me,\xa0David Spark\xa0(@dspark), the creator of\xa0CISO Series\xa0and\xa0Allan Alford\xa0(@AllanAlfordinTX), CISO at\xa0Mitel.\xa0Our sponsored guest for this episode is Eric Murphy (@_EricMurphy), VP, security research, SpyCloud.

\xa0

Thanks to this week\u2019s podcast sponsor, SpyCloud


Learn more about how you can protect employees and customers from account takeover with SpyCloud.

On this episode of\xa0Defense in Depth, you\u2019ll learn:
  • Threat intelligence is about telling a story. And that story is broken up into three parts: strategic, operational, and tactical intelligence. Threat intelligence today really isn\u2019t about creating that story. Most of the cases are about correlating data points.
  • Threat intelligence becomes stale when you are reactionary vs. being proactive.
  • Threat intelligence fails when you don\u2019t mix multiple intelligence points to form a more complete full story of your adversaries.
  • Feeds are not valuable by themselves. When you combine it with your internal data, that\u2019s when you could actually come up with something actionable.
  • If you\u2019re not ingesting and onboarding your data appropriately into your internal threat intelligence team, why do you even have it?
Find more at CISOSeries.com