About Strategic Threat Intelligence

Threat intelligence is a category of intelligence that focuses on information security. As defined by Gartner, it is “evidence-based knowledge…about an existing or emerging menace or hazard…to inform decisions regarding the subject’s response to that menace or hazard.”

Essentially, threat intelligence provides you with curated information to inform you about potential malicious activity and helps you make better decisions about how to prevent bad things occurring to you or your organisation.

In order to sustain a strong security posture, an organisation must develop and answer questions specific to the business, many of which must be answered continually as situations and environments evolve.

Questions such as: will bringing in additional security solutions really give that much more additional protection? Is updating each and every legacy system worth the cost? Who are my enemies and how might they attack me? Threat intelligence helps organisations to tackle these questions and make more informed decisions with context.

There are generally three ’levels’ of cyber threat intelligence: strategic, operational and tactical, which serve different functions.

  • Strategic intelligence (who/why)
    Focuses on assessing and mitigating current and future risks to businesses. As an example, a corporation releasing a new product or completing a merger will want to understand not only the potential impact but also the associated risks with the activity. This is particularly useful for CISOs and executive leadership who must justify budgets and make well informed investment decisions.
  • Operational intelligence (how/where)
    Helps fuel meaningful detection, incident response and threat hunting programs. This level of intelligence enables information security teams to identify patterns in attacks, from which logical system rules can be developed that can then detect specific indicators of malicious activity.
  • Tactical intelligence (what)
    Provides a reference material for analysts to interpret and extract context for use in defensive operations. This intelligence comes in the form of Indicators of Compromise (IOCs), which include items such as domains or IPs. Indicators are often changed quickly though, meaning that it is important for operational and strategic intelligence to also be incorporated into decisions.

The combination of these different levels of threat intelligence give security teams the ability to know how to proactively and reactively respond to risks. This includes what solutions to use, how they should be leveraged, and even just who to keep an eye on.

A Further look into Strategic Threat Intelligence

Strategic intelligence gives the bigger picture, looking at how threats and cyber-attacks are changing over time. Common focuses of strategic intelligence include historical trends, motivations, or attributions as to who is behind an attack.

With strategic intelligence, you can answer questions like who is attacking your organisation and why?? Why are you within scope for an attack? What major trends are happening? What can you do to reduce your risk profile? All of this helps to profile your adversaries and provide clues to their future operations and tactics.
All of this makes strategic intelligence a solid starting point for deciding which defensive measures will be most effective.

This gives insight into the following:

  • Targeting trends for industry sectors and geographies
  • Major attacker Tactics, Techniques and Procedures (TTP) changes over time
  • Attribution for intrusions and data breaches
  • Mapping cyber-attacks to geopolitical conflicts and events (South China Sea, Arab Spring, Russia-Ukraine)
  • Threat actor group trends
  • Global statistics on breaches, malware and information theft
  • Carrying out a thorough risk analysis and review of the entire technology supply chain
  • Informing your executive leadership about high risk threat actors, relevant risk scenarios, and threat exposure in the public-facing technology sphere and criminal underground
  • Learning which commercial ventures, vendors, partners, and technology products are most likely to increase or decrease risk to your enterprise environment

For example, if you are in the education sector, you may wonder what nation states and threat actor groups you should be concerned about, or where you need to focus your resources to reduce risk of an intrusion and theft of intellectual property.

Strategic threat intelligence is invaluable, incorporating expert opinions and insights that are based on aggregating both operational and tactical intelligence from known cyber-attacks.

By leveraging this data, organisations are better positioned to trade punches with tomorrow’s threats.

Information Security Buzz

You Migh Also Read: 

Does Fake News Affect Threat Intelligence?:

Employees Are Still The Cause Of Most Cyber Breaches:

 

 

« Cybercrime Costs Londoners £26m Every Month
Cambridge Analytica Claim To Sway Elections With Facebook Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Information Commissioner's Office (ICO)

Information Commissioner's Office (ICO)

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

Cyber Security Agency of Singapore (CSA)

Cyber Security Agency of Singapore (CSA)

The CSA is the national agency overseeing cybersecurity strategy, operation, education, outreach, and ecosystem development.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

Hexaware Technologies

Hexaware Technologies

Hexaware is an automation-led next-generation service provider delivering excellence in IT, BPO and Consulting services.

Reflectiz

Reflectiz

Reflectiz empowers digital businesses to make all web applications safer by non-intrusively mitigating any website risks without a single line of code.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

Evanssion

Evanssion

Evanssion is a value added distributor specialized in Cloud Native & Cyber Security across Middle East & Africa.

Banyax

Banyax

Banyax provides 24×7 real-time Cyber Defense Center Services using the latest technology tools to provide state-of-the-art defense.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

MyKRIS Asia

MyKRIS Asia

MyKRIS specialise in providing and managing Internet network services and cyber security services to enterprises.

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center is a state-of-the-art facility to deliver advanced cyber training programs and build the next generation of Azerbaijan’s cybersecurity professionals.

Security Discovery

Security Discovery

Stay ahead of cyber threats with Security Discovery. We offer expert consulting, comprehensive services, and a powerful vulnerability monitoring SaaS platform.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.

Cysmo Cyber Risk

Cysmo Cyber Risk

Cysmo is an innovative cyber risk assessment platform specifically designed for the needs of the German insurance industry.

AppSOC

AppSOC

AppSOC is a leader in Application Security Posture Management (ASPM) and Code-to-Cloud Vulnerability Management.

Velotix

Velotix

Velotix empowers organizations to maximize the value of their data while ensuring security and compliance in a rapidly evolving regulatory landscape.