SlideShare a Scribd company logo
1
Threat Intelligence Strategy
With These Ideas
Improve Your
2
Introduction
Collecting, disseminating, and using
threat intelligence reduces
operational risk in order to
maintain and improve business
operations. As opposed to
producing a comprehensive range
of intelligence, it’s more effective to
concentrate intelligence efforts on
specific business objectives.
3
▪ Signals intelligence, open source intelligence, and
human intelligence are three primary means of
gathering cyber threat intelligence.
▪ Human intelligence is the most active of the three, and
active intelligence can shed light on specific threats that
may cause massive damage.
▪ The ideal situation is to utilize both passive and active
intelligence.
1. Beyond Passive Intelligence
4
▪ While freely available in large quantities, it would be a
mistake to rely solely on open source intelligence.
▪ Investing time and resources in the analysis of an
organization’s own incoming traffic (signals intelligence)
will reveal anomalies that relate specifically to them.
▪ By investing in a quality threat intelligence product, one
can gain access to a broad array of usable human
intelligence sources.
1. Beyond Passive Intelligence
5
▪ At times an organization’s platform must be rebuilt from
the ground up, or it needs to be replaced with a
vendor-built alternative.
▪ When it comes to a threat intelligence platform, two
questions must be asked:
○ Is the organization so different that existing
vendor-built platforms won’t suffice?
○ Will a homegrown platform survive the constantly
evolving threat landscape?
2. Building vs. Buying
6
▪ The threat landscape is continuously evolving, and
vendors focused specifically in this area are constantly
developing and refining their platforms.
▪ If an organization is in the position to do so, building and
maintaining a comprehensive threat intelligence
capability is a significant advantage.
2. Building vs. Buying
7
▪ Most breaches result from lost passwords, careless
online activity, and petty theft.
▪ Threat intelligence must identify both macro and micro
threat trends to be useful and minimize the risk of
suffering a serious breach.
▪ A single breach can cause massive long-term damage to
even the largest organizations.
3. Getting Context
8
▪ By understanding macro threat trends, it’s much easier
to spot and respond to anomalous threats within a
smaller time period.
▪ Macro threat trend analysis provides the context for
micro threat trend analysis.
3. Getting Context
9
▪ A threat intelligence strategy must help the organization
stay profitable.
▪ Red teams, security operations centers, incident
response, and vulnerability management are all areas
that can benefit from high-quality threat intelligence.
4. Communication of Intelligence
10
▪ Being involved early can inform organizations on which
specific aspects of threat intelligence will help them to
do their jobs, which in turn helps the organization stay
profitable.
▪ It’s worth the time to investigate the way intelligence is
disseminated within an organization.
4. Communication of Intelligence
11
▪ Some cyber specialists lack the ability to translate cyber
threats into language that leaders can understand and
act upon.
▪ Rectifying this is simple, as long as C-suite members are
willing to listen and engage.
5. Breach the Knowledge Gap
12
▪ C-suite members need information they can act upon,
take to the shareholders, or use to allocate budgets.
▪ If cyber specialists are not getting the support needed,
they must proactively help executives understand what
they can do to help.
5. Breach the Knowledge Gap
13
Takeaway
With threat intelligence there’s
always something to test and more
logs to check, so it’s only as
complicated as one wants it to be.
There’s one question that should
always be asked:
Will this help the organization
stay profitable?
14

More Related Content

PDF
7 Habits of Smart Threat Intelligence Analysts
PDF
Threat Intelligence Tweaks That'll Take Your Security to the Next Level
PDF
Proactive Defense: Understanding the 4 Main Threat Actor Types
PDF
Top 6 Sources for Identifying Threat Actor TTPs
PDF
4 Rules for Successful Threat Intelligence Teams
PDF
Threat Intelligence by the Numbers
PDF
Overview of Recorded Future Intel Cards
PDF
Industry Check: Where Real Companies Stand With Threat Intelligence
7 Habits of Smart Threat Intelligence Analysts
Threat Intelligence Tweaks That'll Take Your Security to the Next Level
Proactive Defense: Understanding the 4 Main Threat Actor Types
Top 6 Sources for Identifying Threat Actor TTPs
4 Rules for Successful Threat Intelligence Teams
Threat Intelligence by the Numbers
Overview of Recorded Future Intel Cards
Industry Check: Where Real Companies Stand With Threat Intelligence

What's hot (20)

PPTX
Security Analytics Beyond Cyber
PDF
Pitfalls of Cyber Data
PDF
Bridging the Gap Between Threat Intelligence and Risk Management
PDF
Threat Intelligence in Cyber Risk Programs
PPTX
SOC 3.0: strategic threat intelligence May 2016
PDF
Threat Hunting
PPTX
The Economics of Cyber Security
PDF
Alien vault sans cyber threat intelligence
PPTX
Introduction to Ethical Hacking
PDF
Cyber Threat Intelligence Integration Center -- ONDI
PDF
Outpost24 webinar - Improve your organizations security with red teaming
PDF
Demystifying Security Analytics: Data, Methods, Use Cases
PDF
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
PPTX
Top Level Cyber Security Strategy
PPTX
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
PPTX
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
PPTX
Effective Security Operation Center - present by Reza Adineh
PPTX
Cyber Resilience: Managing Cyber Shocks
DOCX
Sample Incident Response Plan
PDF
Threat Activity Groups - Dragos
Security Analytics Beyond Cyber
Pitfalls of Cyber Data
Bridging the Gap Between Threat Intelligence and Risk Management
Threat Intelligence in Cyber Risk Programs
SOC 3.0: strategic threat intelligence May 2016
Threat Hunting
The Economics of Cyber Security
Alien vault sans cyber threat intelligence
Introduction to Ethical Hacking
Cyber Threat Intelligence Integration Center -- ONDI
Outpost24 webinar - Improve your organizations security with red teaming
Demystifying Security Analytics: Data, Methods, Use Cases
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Top Level Cyber Security Strategy
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
Effective Security Operation Center - present by Reza Adineh
Cyber Resilience: Managing Cyber Shocks
Sample Incident Response Plan
Threat Activity Groups - Dragos
Ad

Similar to Improve Your Threat Intelligence Strategy With These Ideas (20)

PPTX
Threat intelligence life cycle steps by steps
PDF
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
PDF
CISO's Ultimate guide to Threat Intelligence
PPTX
Understanding the 8 Keys to Security Success
PPTX
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
PPTX
CyberSecurity Strategy For Defendable ROI
PDF
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
PPTX
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
PDF
Small Business Administration Recommendations
PDF
threat-lifecycle-management-whitepaper
PDF
Threat Lifecycle Management_Whitepaper
PDF
Symantec cyber-resilience
PDF
Risksense: 7 Experts on Threat and Vulnerability Management
PDF
Responding to and recovering from sophisticated security attacks
 
PPTX
Candor - open analytics nyc
PDF
Cyber Threat Intelligence
PDF
"information risk management in cybersecurity" Lecture 1
PPTX
Cybersecurity Best Practices in Financial Services
PDF
sophos-four-key-tips-from-incident-response-experts.pdf
PPTX
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
Threat intelligence life cycle steps by steps
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
CISO's Ultimate guide to Threat Intelligence
Understanding the 8 Keys to Security Success
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
CyberSecurity Strategy For Defendable ROI
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Small Business Administration Recommendations
threat-lifecycle-management-whitepaper
Threat Lifecycle Management_Whitepaper
Symantec cyber-resilience
Risksense: 7 Experts on Threat and Vulnerability Management
Responding to and recovering from sophisticated security attacks
 
Candor - open analytics nyc
Cyber Threat Intelligence
"information risk management in cybersecurity" Lecture 1
Cybersecurity Best Practices in Financial Services
sophos-four-key-tips-from-incident-response-experts.pdf
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
Ad

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Spectral efficient network and resource selection model in 5G networks
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Machine learning based COVID-19 study performance prediction
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Approach and Philosophy of On baking technology
Unlocking AI with Model Context Protocol (MCP)
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
CIFDAQ's Market Insight: SEC Turns Pro Crypto
NewMind AI Weekly Chronicles - August'25 Week I
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

Improve Your Threat Intelligence Strategy With These Ideas

  • 1. 1 Threat Intelligence Strategy With These Ideas Improve Your
  • 2. 2 Introduction Collecting, disseminating, and using threat intelligence reduces operational risk in order to maintain and improve business operations. As opposed to producing a comprehensive range of intelligence, it’s more effective to concentrate intelligence efforts on specific business objectives.
  • 3. 3 ▪ Signals intelligence, open source intelligence, and human intelligence are three primary means of gathering cyber threat intelligence. ▪ Human intelligence is the most active of the three, and active intelligence can shed light on specific threats that may cause massive damage. ▪ The ideal situation is to utilize both passive and active intelligence. 1. Beyond Passive Intelligence
  • 4. 4 ▪ While freely available in large quantities, it would be a mistake to rely solely on open source intelligence. ▪ Investing time and resources in the analysis of an organization’s own incoming traffic (signals intelligence) will reveal anomalies that relate specifically to them. ▪ By investing in a quality threat intelligence product, one can gain access to a broad array of usable human intelligence sources. 1. Beyond Passive Intelligence
  • 5. 5 ▪ At times an organization’s platform must be rebuilt from the ground up, or it needs to be replaced with a vendor-built alternative. ▪ When it comes to a threat intelligence platform, two questions must be asked: ○ Is the organization so different that existing vendor-built platforms won’t suffice? ○ Will a homegrown platform survive the constantly evolving threat landscape? 2. Building vs. Buying
  • 6. 6 ▪ The threat landscape is continuously evolving, and vendors focused specifically in this area are constantly developing and refining their platforms. ▪ If an organization is in the position to do so, building and maintaining a comprehensive threat intelligence capability is a significant advantage. 2. Building vs. Buying
  • 7. 7 ▪ Most breaches result from lost passwords, careless online activity, and petty theft. ▪ Threat intelligence must identify both macro and micro threat trends to be useful and minimize the risk of suffering a serious breach. ▪ A single breach can cause massive long-term damage to even the largest organizations. 3. Getting Context
  • 8. 8 ▪ By understanding macro threat trends, it’s much easier to spot and respond to anomalous threats within a smaller time period. ▪ Macro threat trend analysis provides the context for micro threat trend analysis. 3. Getting Context
  • 9. 9 ▪ A threat intelligence strategy must help the organization stay profitable. ▪ Red teams, security operations centers, incident response, and vulnerability management are all areas that can benefit from high-quality threat intelligence. 4. Communication of Intelligence
  • 10. 10 ▪ Being involved early can inform organizations on which specific aspects of threat intelligence will help them to do their jobs, which in turn helps the organization stay profitable. ▪ It’s worth the time to investigate the way intelligence is disseminated within an organization. 4. Communication of Intelligence
  • 11. 11 ▪ Some cyber specialists lack the ability to translate cyber threats into language that leaders can understand and act upon. ▪ Rectifying this is simple, as long as C-suite members are willing to listen and engage. 5. Breach the Knowledge Gap
  • 12. 12 ▪ C-suite members need information they can act upon, take to the shareholders, or use to allocate budgets. ▪ If cyber specialists are not getting the support needed, they must proactively help executives understand what they can do to help. 5. Breach the Knowledge Gap
  • 13. 13 Takeaway With threat intelligence there’s always something to test and more logs to check, so it’s only as complicated as one wants it to be. There’s one question that should always be asked: Will this help the organization stay profitable?
  • 14. 14