SlideShare a Scribd company logo
6 Steps for Operationalizing Threat Intelligence
Forsythe is a leading enterprise IT company,
providing advisory services, security, hosting
and technology solutions for Fortune 1000
organizations. Forsythe helps clients
optimize, modernize and innovate their IT to
become agile, secure, digital businesses.
www.forsythe.com
About Forsythe
6 Steps for Operationalizing Threat Intelligence
In 207 BC, when
information traveled no faster
than a horse could ride…
…it was intelligence that led Rome to its critical
victory over Carthage during the Punic Wars.
Fast forward 2,000 years,
and intelligence is more important than ever.
Countries have spent
trillions of dollars building
up military forces to protect
their interests and deter
attacks by…
air land sea
But the biggest threat to security today comes
not from ground forces or air power,
but from cyberspace.
There are no rules of engagement in cyber
warfare when it comes to corporate data.
Enterprises in all industries are attractive targets…
…and most are not adequately
prepared to defend themselves.
According to PWC’s 2016 Global State
of Information Security Survey…
…theft of hard intellectual property
increased 56 percent in 2015.
The best form of defense against attacks and
those who perpetrate them is to know about them.
But for many organizations, good
quality intelligence is hard to come by.
Commercial threat intelligence technology and services
can help enterprises arm themselves with…
strategic
insights
tactical
insights
operational
insights
…enabling them to identify and respond
to global threat activity, and integrate
intelligence into their security programs.
Per Gartner, by 2018…
60% of large enterprises globally will utilize
commercial threat intelligence services
to help inform their security strategies.*
*Gartner, Smarter with Gartner, Use Threat Intelligence Services for an Agile Defense, June 10, 2015,
http://www.gartner.com/smarterwithgartner/use-threat-intelligence-services-for-an-agile-defense/
6 Steps for Operationalizing Threat Intelligence
It is important to note that…
…threat data is not the
same as threat intelligence.
The difference?
Threat data is information without context.
Whereas…
Threat intelligence incorporates the
background that makes the information
relevant to an organization or industry.
Sorting through threat data and
operationalizing threat intelligence….
…can be overwhelming
But it doesn’t have to be.
6 Steps for Operationalizing Threat Intelligence
Know your environment in and out.
In order to be applied, threat intelligence needs to
be supported by a solid understanding of your
assets, and what’s going on in your network.
Some questions to ask yourself…
What are your most valuable
information assets?
Where are these assets?
When are these assets
being accessed?
Who has access to
these assets and why?
Establish your business goals.
What are your overall business drivers?
protection? detection? attribution &
prosecution?
And what are you looking to
accomplish with threat intelligence?
Common goals include…
Enhancing automated
prevention
Shortening the lifecycle of
detection and remediation
Automating security
operations and
remediation efforts
Centralizing threat
intelligence programs and
standardizing processes
Assess your capabilities.
Establishing an understanding of
current capabilities is critical.
To help to determine your existing capabilities and
what is currently going on in your environment,
consider services such as…
vulnerability
assessments
architecture
assessments
compromise
assessments
They should be leveraged as part of a
continuous vulnerability management
program as you move forward.
Research available products and services.
There are a lot of threat intelligence services
you can subscribe to. Each offers…
different numbers
of indicators
different levels of
relevance and context
And there are varying levels of effort involved
in leveraging the information they provide.
Internal
Standardized
Highly targeted intelligence | Unrestricted usage
Commercial
Vendor-specific
Moderately targeted intelligence | Usage is restricted
Some standardization
Moderately targeted intelligence | Usage is restricted
Community
Varied formats
Little targeted intelligence | Usage restrictions vary
Open Source
Intelligence
Sources
Avoid drinking from the firehose.
The analytic value of threat data varies; while
certain details can be useful, like…
subject linesattachment names
malicious IP addresses domains
…they are often used only once, and are
therefore not good indicators on their own.
Knowing the difference between valuable
threat data and “noise” will go a long way.
only on what applies to your business.Focus
Share and share alike.
Sharing non-compromising information will help other
organizations learn more about specific threats.
Build circles of trust with organizations in the
same vertical that are not direct competitors.
This facilitates the sharing of…
security
principles
threats mitigation
advice
6 Steps for Operationalizing Threat Intelligence
In today’s threat landscape, without a threat
intelligence-focused strategy…
6 Steps for Operationalizing Threat Intelligence
The bad guys are getting faster and faster. Intelligence
provides a way for organizations to…
6 Steps for Operationalizing Threat Intelligence
Get the insight needed
into attackers’ plans
Get the insight needed
into attackers’ plans
Prioritize and respond
to threats
Get the insight needed
into attackers’ plans
Shorten the time between
attack and detection
Prioritize and respond
to threats
Get the insight needed
into attackers’ plans
Focus staff efforts and
decision-making
Shorten the time between
attack and detection
Prioritize and respond
to threats
Properly operationalized, it’s a powerful tool
for enhancing the security of your…
enterprisenetwork
data employees
http://focussecurity.forsythe.com/articles/492/6-
Steps-for-Operationalizing-Threat-Intelligence
http://focus.forsythe.com
Authors:
David O'Leary
Director, Forsythe Security Solutions
David Hove
Practice Manager, Forsythe Security Solutions
Aaron Smith
Master Consultant, Forsythe Security Solutions
Shariq Hassan
Senior Consultant, Forsythe Security Solutions
Anne Grahn
Senior Communications Specialist,
Forsythe Security Solutions
Forsythe is a leading enterprise IT company,
providing advisory services, security, hosting
and technology solutions for Fortune 1000
organizations. Forsythe helps clients
optimize, modernize and innovate their IT to
become agile, secure, digital businesses.
www.forsythe.com

More Related Content

PPTX
Cyber threat intelligence: maturity and metrics
PDF
Cyber threat intelligence ppt
PDF
Global Cyber Threat Intelligence
PPTX
Cyber Threat Intelligence
PDF
Threat Hunting
PDF
Welcome to the world of Cyber Threat Intelligence
PPTX
Cyber Threat Intelligence: Building and maturing an intelligence program that...
PPTX
Cyber Threat Intelligence | Information to Insight
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence ppt
Global Cyber Threat Intelligence
Cyber Threat Intelligence
Threat Hunting
Welcome to the world of Cyber Threat Intelligence
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence | Information to Insight

What's hot (20)

PDF
Cyber Threat Intelligence
PDF
Threat Intelligence Workshop
PDF
Cyber Threat Intelligence
PDF
Threat Intelligence 101 - Steve Lodin - Submitted
PPTX
Effective Security Operation Center - present by Reza Adineh
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PPTX
Cyber Threat Intelligence.pptx
PDF
INCIDENT RESPONSE NIST IMPLEMENTATION
PDF
NIST cybersecurity framework
PPTX
SEIM-Microsoft Sentinel.pptx
PPTX
Rothke rsa 2012 building a security operations center (soc)
PDF
IBM QRadar Security Intelligence Overview
PPTX
Threat hunting - Every day is hunting season
PDF
Cyber Threat Intelligence
PPTX
SOC Architecture Workshop - Part 1
PPSX
Next-Gen security operation center
PDF
Threat Hunting Report
PDF
Threat Hunting Procedures and Measurement Matrice
PPTX
Security Information Event Management - nullhyd
Cyber Threat Intelligence
Threat Intelligence Workshop
Cyber Threat Intelligence
Threat Intelligence 101 - Steve Lodin - Submitted
Effective Security Operation Center - present by Reza Adineh
Security operations center-SOC Presentation-مرکز عملیات امنیت
Cyber Threat Intelligence.pptx
INCIDENT RESPONSE NIST IMPLEMENTATION
NIST cybersecurity framework
SEIM-Microsoft Sentinel.pptx
Rothke rsa 2012 building a security operations center (soc)
IBM QRadar Security Intelligence Overview
Threat hunting - Every day is hunting season
Cyber Threat Intelligence
SOC Architecture Workshop - Part 1
Next-Gen security operation center
Threat Hunting Report
Threat Hunting Procedures and Measurement Matrice
Security Information Event Management - nullhyd
Ad

Similar to 6 Steps for Operationalizing Threat Intelligence (20)

PPTX
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
DOCX
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
PPTX
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
PDF
Road map for actionable threat intelligence
PDF
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
PDF
Threat Intelligence in Cyber Risk Programs
PPTX
How to Mitigate Risk From Your Expanding Digital Presence
PPTX
Infosec 2015 - Using threat intelligence to improve security response
PDF
IT Executive Guide to Security Intelligence
PDF
ISF Congress 2016 - Session 7.2_Kukreja
PDF
Using Threat Intelligence to Improve Your Company.pdf
PDF
security-team-guide-reducing-operational-risk.pdf
PDF
What is threat intelligence ?
PPTX
Operational Security Intelligence
PDF
Improve Your Threat Intelligence Strategy With These Ideas
PDF
Operationalizing Threat Intelligence 1 Converted Kyle Wilhoit
PPTX
Threat Intelligen.pptx
PPT
13734729.ppt
PDF
Threat_intelligence_Handbook
PPTX
Operational Security Intelligence Breakout Session
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
Road map for actionable threat intelligence
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
Threat Intelligence in Cyber Risk Programs
How to Mitigate Risk From Your Expanding Digital Presence
Infosec 2015 - Using threat intelligence to improve security response
IT Executive Guide to Security Intelligence
ISF Congress 2016 - Session 7.2_Kukreja
Using Threat Intelligence to Improve Your Company.pdf
security-team-guide-reducing-operational-risk.pdf
What is threat intelligence ?
Operational Security Intelligence
Improve Your Threat Intelligence Strategy With These Ideas
Operationalizing Threat Intelligence 1 Converted Kyle Wilhoit
Threat Intelligen.pptx
13734729.ppt
Threat_intelligence_Handbook
Operational Security Intelligence Breakout Session
Ad

More from Sirius (20)

PDF
Healthcare Cybersecurity Survey 2018 - Sirius
PPTX
6 Guidelines on Crafting a Charter for your Business Transformation
PPTX
Exhaust into Fuel: Turning Data into a Strategic Business Asset
PPTX
3 Keys to Web Application Security
PPTX
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
PPTX
Optimizing Your IT Strategy: 5 Steps to Successfull Hybrid IT
PPTX
Optimizing Security Operations: 5 Keys to Success
PPTX
Keep Calm and Comply: 3 Keys to GDPR Success
PPTX
Beyond backup to intelligent data management
PPTX
Making the Jump to Hyperconvergence: Don't Get Left Behind
PPTX
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
PPTX
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
PPTX
6 Ways to Deceive Cyber Attackers
PPTX
Your Cloud Strategy: Evolution or Revolution
PPTX
Maturing Endpoint Security: 5 Key Considerations
PPTX
Open Source, Open Mindset: 4 Keys to Continuous Cloud Transformation
PPTX
7 Essential Services Every Data Center Solutions Provider Should Have
PPTX
10 Keys to Data-Centric Security
PPTX
5 Keys to Addressing Insider Threats
PPTX
5 Ways to Close Your Information Technology Skills Gap
Healthcare Cybersecurity Survey 2018 - Sirius
6 Guidelines on Crafting a Charter for your Business Transformation
Exhaust into Fuel: Turning Data into a Strategic Business Asset
3 Keys to Web Application Security
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Optimizing Your IT Strategy: 5 Steps to Successfull Hybrid IT
Optimizing Security Operations: 5 Keys to Success
Keep Calm and Comply: 3 Keys to GDPR Success
Beyond backup to intelligent data management
Making the Jump to Hyperconvergence: Don't Get Left Behind
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
6 Ways to Deceive Cyber Attackers
Your Cloud Strategy: Evolution or Revolution
Maturing Endpoint Security: 5 Key Considerations
Open Source, Open Mindset: 4 Keys to Continuous Cloud Transformation
7 Essential Services Every Data Center Solutions Provider Should Have
10 Keys to Data-Centric Security
5 Keys to Addressing Insider Threats
5 Ways to Close Your Information Technology Skills Gap

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Modernizing your data center with Dell and AMD
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
KodekX | Application Modernization Development
PDF
cuic standard and advanced reporting.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectral efficient network and resource selection model in 5G networks
GamePlan Trading System Review: Professional Trader's Honest Take
Modernizing your data center with Dell and AMD
NewMind AI Weekly Chronicles - August'25 Week I
20250228 LYD VKU AI Blended-Learning.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The AUB Centre for AI in Media Proposal.docx
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KodekX | Application Modernization Development
cuic standard and advanced reporting.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Unlocking AI with Model Context Protocol (MCP)
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

6 Steps for Operationalizing Threat Intelligence