Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Building a resilient enterprise with threat intelligence

By Ross Rustici
surveillance  data
November 13, 2020

This year challenged CISOs, CSOs, and IT teams like never before. With many companies transitioning quickly to remote-only work earlier this year, organizations, employees, and consumers have faced a correlative and dramatic growth in cybercrime, brand abuse, scams, and spear-phishing attacks. While some businesses had robust and resilient cybersecurity processes in place before the pandemic, many found themselves ill-equipped to address the increase in threat activity and rapid shifts in adversarial behavior. Correspondingly, successful decision-makers have discovered just how valuable threat intelligence services are in supporting business continuity, defending brand reputation, and ensuring consumer trust.

But building a cyber-resilient enterprise informed by threat intelligence is not an easy task. Risks and requirements are often as unique and diverse as organizations themselves. Determining factors like industry, size, and market contribute to one simple truth: a one-size-fits-all approach to incorporating threat intelligence does not exist. Some invariants, however, do remain; successful threat intelligence programs must staff the right people in the right positions. Below, I’ll introduce four core threat intelligence focuses to consider as businesses plan and allocate budgets for 2021:

 

Predictive Intelligence

Threat intelligence is best operationalized when leveraged to inform proactive decisions. Of all categories of intelligence, it is the most powerful. A well-positioned intelligence group will create products that combine tactical information such as IOCs with actionable analysis that enables consumers to take action, either reducing threat actor capabilities or damage from successful intrusions. Intelligence is best utilized when enabling the SOC, operational, or strategic management teams to take actions that promote positive business impacts and reduce the likelihood of costly interruptions.

More than any other type, the predictive intelligence function is potentially the most impactful, but it is also the most challenging to operate. Staffing this function is often difficult, and it is easy for teams to narrowly focus on changes to the threat landscape rather than concentrate on business value. Because it emphasizes holistic evaluation over raw data analysis, groups supporting this requirement often need greater business visibility than traditional, tactical TI teams solely focused on remediation and technical intelligence.

 

Strategic Intelligence

While predictive intelligence is the most impactful because it facilitates decisive, preventive action, not all situations involve future events. Strategic intelligence supports the executive level consumer with analysis and insight about ongoing strategic issues. While this can include predictive pieces designed to inform future decision making, more often than not, it informs response to an ongoing issue, concern, or crisis. Intelligence at its core is analysis designed to reduce time to decision and empower the consumer to arrive at better, more nuanced outcomes. By design, strategic intelligence focuses on business impact and the expected losses or gains of particular outcomes or events. Tactical data such as machine-readable information is left out of this type of product.

 

Incident Response Intelligence

Threat intelligence focused on facilitating faster resolution to ongoing security incidents can make the difference between a sleepless night for a security team and a concerning month for an executive team. Any incident response team operating without threat intelligence support will be ineffective in today’s threat environment. A reinforcing cycle of information sharing between the IR team conducting on-host and network forensics with a dedicated TI member or group will allow the responders to move faster and with greater purpose. TI provides focus and narrows down the possibilities of what the threat actor likely did next. Very mature shops build playbooks for the most common paths taken by the major adversary groups. This allows an IR team to know precisely where to look on a device to find where in an intrusion chain the activity was detected, where to find initial compromise, and where to bolster defenses to prevent further compromise. This type of tactical intelligence, when deployed appropriately, can save hours if not days on an incident response investigation.

 

Hunt Intelligence

The final major focus of intelligence is the hunt function. This can be defined narrowly as direct support to a hunt team whose mission is to look for evidence of compromise in data: a current gap in the security stack or would create too high of a false positive rate to be deployed as standard detection. The key to this narrow definition is to provide actionable insight into how adversaries are adopting tactics and techniques that bypass standard detections. This allows the hunt team to find the activity and either activate incident response teams or create custom detections and prevention capabilities to fill crucial gaps in existing coverage.

In a broader context, all tactical intelligence can fit into this mold. By providing IOCs and other tactical indicators to the SOC team, the security stack, or a specified hunt team, the intelligence team is empowering the defensive capabilities of a corporation to seek out new malicious activity they were previously unaware of. Putting those indicators in for sustained remediation by deploying domains and IPs to a firewall for example, is simply allowing the technology to do the hunting on the human’s behalf.

 

Insource versus Outsource

The four primary focuses of intelligence all require access to particular data and skill sets. In an ideal world, every company would have a sizable budget to create an in-house intelligence group with the analytic capabilities and data necessary to craft actionable insights and nuanced analysis for each of these four focus areas. Having the team in house allows them to be more responsive and understanding of the business needs. However, this is generally not a practical solution. Several factors make outsourcing this function a more cost-effective and practical solution.

  • The data required to build this level of capability is often exorbitant. The requirements that allow a team to move from tactical support to strategic and predictive analysis are significant. Teams that insource the data often spend more of their TI team’s time curating those data sources than adding value to the data pulled in. This results in a significant reduction in the impact of the team.
  • There is value in diversity. A team that is insourced can only learn through the activity directly impacting your business or through sharing communities that tend to focus on post mortems of activity significantly after the fact. Having a team that can pull tactics, techniques, and a greater understanding of the threat and vulnerability landscape from multiple customers and engagement allows for a greater shared understanding and improved defensive capabilities.
  • The skills required to support these different focuses are varied and low density, making hiring qualified individuals difficult and expensive. Threat intelligence professionals that can execute on strategic and predictive intelligence requirements are rare. Additionally, qualified candidates supporting hunt and IR capabilities should have some experience on the operational side of these missions to understand what truly reduces time to resolution and how to increase the signal to noise ratio of their products. Finding people with this experience who also have the analytical mindset to write the products needed is difficult. Outsourcing your intelligence function places the burden of sourcing, mentoring, and training on a third party, creating a plug and play capability for your security organization.

 

Regardless of the choices you make when building an intelligence capability, the one foundational question must be: how does this capability help reduce business risk? This is fundamental to building a successful intelligence program and every decision should flow from the answer to that question. Whether you need tactical support to network defenders or strategic and predictive intelligence to inform key business decisions, identifying that need is the lynchpin to building a high value organization.

KEYWORDS: cyber security risk management threat intelligence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ross Rustici is Director of Threat Analysis at ZeroFOX.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • financial- enews

    The Building of a Cyber Resilient Financial Services Sector

    See More
  • threat-intel-freepik1170x658v78.jpg

    Eliminate threat intelligence false positives with SASE

    See More
  • cyber-threat-freepik1170x658v56.jpg

    Cyber warfare: How to empower your defense strategy with threat intelligence

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!