Forsythe is a leading enterprise IT company,
providing advisory services, security, hosting
and technology solutions for Fortune 1000
organizations. Forsythe helps clients
optimize, modernize and innovate their IT to
become agile, secure, digital businesses.
www.forsythe.com
About Forsythe
In 207 BC, when
information traveled no faster
than a horse could ride…
…it was intelligence that led Rome to its critical
victory over Carthage during the Punic Wars.
Fast forward 2,000 years,
and intelligence is more important than ever.
Countries have spent
trillions of dollars building
up military forces to protect
their interests and deter
attacks by…
air land sea
But the biggest threat to security today comes
not from ground forces or air power,
but from cyberspace.
There are no rules of engagement in cyber
warfare when it comes to corporate data.
Enterprises in all industries are attractive targets…
…and most are not adequately
prepared to defend themselves.
According to PWC’s 2016 Global State
of Information Security Survey…
…theft of hard intellectual property
increased 56 percent in 2015.
The best form of defense against attacks and
those who perpetrate them is to know about them.
But for many organizations, good
quality intelligence is hard to come by.
Commercial threat intelligence technology and services
can help enterprises arm themselves with…
strategic
insights
tactical
insights
operational
insights
…enabling them to identify and respond
to global threat activity, and integrate
intelligence into their security programs.
Per Gartner, by 2018…
60% of large enterprises globally will utilize
commercial threat intelligence services
to help inform their security strategies.*
*Gartner, Smarter with Gartner, Use Threat Intelligence Services for an Agile Defense, June 10, 2015,
http://www.gartner.com/smarterwithgartner/use-threat-intelligence-services-for-an-agile-defense/
It is important to note that…
…threat data is not the
same as threat intelligence.
The difference?
Threat data is information without context.
Whereas…
Threat intelligence incorporates the
background that makes the information
relevant to an organization or industry.
Sorting through threat data and
operationalizing threat intelligence….
…can be overwhelming
But it doesn’t have to be.
Know your environment in and out.
In order to be applied, threat intelligence needs to
be supported by a solid understanding of your
assets, and what’s going on in your network.
Some questions to ask yourself…
What are your most valuable
information assets?
Where are these assets?
When are these assets
being accessed?
Who has access to
these assets and why?
Establish your business goals.
What are your overall business drivers?
protection? detection? attribution &
prosecution?
And what are you looking to
accomplish with threat intelligence?
Common goals include…
Enhancing automated
prevention
Shortening the lifecycle of
detection and remediation
Automating security
operations and
remediation efforts
Centralizing threat
intelligence programs and
standardizing processes
Assess your capabilities.
Establishing an understanding of
current capabilities is critical.
To help to determine your existing capabilities and
what is currently going on in your environment,
consider services such as…
vulnerability
assessments
architecture
assessments
compromise
assessments
They should be leveraged as part of a
continuous vulnerability management
program as you move forward.
Research available products and services.
There are a lot of threat intelligence services
you can subscribe to. Each offers…
different numbers
of indicators
different levels of
relevance and context
And there are varying levels of effort involved
in leveraging the information they provide.
Internal
Standardized
Highly targeted intelligence | Unrestricted usage
Commercial
Vendor-specific
Moderately targeted intelligence | Usage is restricted
Some standardization
Moderately targeted intelligence | Usage is restricted
Community
Varied formats
Little targeted intelligence | Usage restrictions vary
Open Source
Intelligence
Sources
Avoid drinking from the firehose.
The analytic value of threat data varies; while
certain details can be useful, like…
subject linesattachment names
malicious IP addresses domains
…they are often used only once, and are
therefore not good indicators on their own.
Knowing the difference between valuable
threat data and “noise” will go a long way.
only on what applies to your business.Focus
Share and share alike.
Sharing non-compromising information will help other
organizations learn more about specific threats.
Build circles of trust with organizations in the
same vertical that are not direct competitors.
This facilitates the sharing of…
security
principles
threats mitigation
advice
In today’s threat landscape, without a threat
intelligence-focused strategy…
The bad guys are getting faster and faster. Intelligence
provides a way for organizations to…
Get the insight needed
into attackers’ plans
Get the insight needed
into attackers’ plans
Prioritize and respond
to threats
Get the insight needed
into attackers’ plans
Shorten the time between
attack and detection
Prioritize and respond
to threats
Get the insight needed
into attackers’ plans
Focus staff efforts and
decision-making
Shorten the time between
attack and detection
Prioritize and respond
to threats
Properly operationalized, it’s a powerful tool
for enhancing the security of your…
enterprisenetwork
data employees
http://focussecurity.forsythe.com/articles/492/6-
Steps-for-Operationalizing-Threat-Intelligence
http://focus.forsythe.com
Authors:
David O'Leary
Director, Forsythe Security Solutions
David Hove
Practice Manager, Forsythe Security Solutions
Aaron Smith
Master Consultant, Forsythe Security Solutions
Shariq Hassan
Senior Consultant, Forsythe Security Solutions
Anne Grahn
Senior Communications Specialist,
Forsythe Security Solutions
Forsythe is a leading enterprise IT company,
providing advisory services, security, hosting
and technology solutions for Fortune 1000
organizations. Forsythe helps clients
optimize, modernize and innovate their IT to
become agile, secure, digital businesses.
www.forsythe.com

6 Steps for Operationalizing Threat Intelligence