Reduce Risk With Threat Intelligence

Do you want to be more proactive in managing risk?

Most professionals would answer that they would like less exposure to threats but often do not have sufficient time, knowledge or personnel to implement all factors that influence their risk profile.

Prior security events and incidents often allow security professionals opportunities to learn valuable lessons that impact their risk profile going forward. But, what is the risk if you don’t pay attention to knowledge learned from these previous events?

Other real world events can teach us important lessons in this regard. For example, if you drive off a 200-foot-cliff in a speeding automobile, and you ignored the sign indicating the cliff, then the outcome will very likely be significant physical harm.

If we paid attention to this sign and had knowledge of its meaning, then it would reduce our risk of injury. If we had the misfortune of this event, then our learned experience would teach us to avoid such pitfalls in the future. This is a fairly obvious example of paying attention to a sign and avoiding risk.

When is it harder to avoid such risk in a security world? It is usually due to a myriad of factors that have direct and indirect influence on the outcome. They introduce uncertainty in the outcome.

Why does risk reduction matter to security professionals?

To help explain why security is not just about the learning from past experiences but also very much about applying that knowledge to reduce risk, let us examine the term ‘Threat Intelligence’.

The term ‘Threat Intelligence’ is in common use in today’s security world. The term is used in many different contexts, often times ambiguously to justify something that has nothing to do with either intelligence or threat. It occurred to us that perhaps before we consider using such a term that it would be suitable to understand the meaning of the words.

Threat – The word has typically been defined as ‘an expression of intention to inflict evil, injury, or damage’ or ‘the possibility that something bad or harmful could happen’. In both of these definitions and uses of the word, it is clear that threat refers to a future event that has not yet occurred. It is also clear that it refers to an intention that is not certain. Being consistent with the definition and its use in language would suggest that threat applied to a security practice refers to ‘events that have not yet occurred’. How can one possibly protect against events that have not yet occurred?

Before we answer that question. Let’s look at Intelligence.
Intelligence – The word has typically been defined as “the ability to learn or understand or to deal with new or trying situations” or “the ability to apply knowledge to manipulate one’s environment or to think abstractly as measured by objective criteria (as tests)”. From this definition, the word Intelligence could be best understood to mean based on information of existing evidence or facts, applying that information to form knowledge to better your environment.

If we combine the words and their definitions, it would seem to suggest ‘threat’ is about future and ‘intelligence’ is about knowledge of the past. Therefore, “Threat Intelligence reduces risk when applied with scientific processes combined with knowledge and experience”.

So how does one use Threat Intelligence to reduce risk in security operations?
Start by asking yourself: “What are you trying to secure?” Given that there are many outcomes possible in the complex world of the Internet, you need to first of all consider the assets that are you are trying to secure from future threats.

Most professionals would suggest that they are not interested in improving security of a computer system or a network that they don’t own nor have direct use of. What if you use a service provider for cloud storage or compute services to your enterprise? Now you have to care about that provider’s services and their security exposure.

“Be clear on what scope you want to manage security risk for.”
Assuming that you have an understanding of the full scope you wish to protect, the next step is to consider what threats are relevant to that scope.

Here’s a simple example: If you are an automobile manufacturer, you are unlikely to care about a threat to the airline industry such as a bomb threat to aircraft. However, if a threat is constructed by a threat actor that attempts to attack all control systems used by manufacturing equipment that is used by both industries – then you at least have to consider the possibility that it has an impact on your future.

Does that mean you have to consider all threats regardless of source or target? No. But you have to at least consider the influence of that threat and its relevancy to your world.

“Relevancy of a threat to your world is a critical aspect of reducing risk exposure.”
Many factors influence relevancy. Is the threat source known? Is the target known? Are the protocols or behaviors being used by the threat in use in your environment? Does the threat discriminate or does it apply techniques that can broadly apply to many different environments?

First of all, threat sources are usually unknown when those sources are primarily human actors. Frequently, threat sources will deliberately obfuscate themselves and/or place blame on other actors. There are multiple reasons why threat sources want to remain anonymous. One reason is to avoid prosecution by law enforcement after an attack has occurred. In many cases, those attempting to detect threats are aided by knowing who is attacking as they can determine motives and targets. Detectors may also be aware of previously used threat source tactics and therefore can predict future behaviors more accurately, thereby increasing their security response. Therefore, there is strong justification by threat sources to avoid identification.

How much you can rely on the threat source being identified correctly and then being able to determine a response based on solely the source information is limited at best. Even if the threat source is accurately determined, if you are responsible for a reasonably large and complex environment, do you know what a specific threat intends to attack in your environment? How certain are you of that? What evidence do you have to support that prediction?

“Identifying a Threat Source has limited value to determining the relevancy or impact of a threat.”
Does the threat have a specific target? Does the threat attempt to cause harm to a specific domain or asset in your environment? A Distributed Denial-of-Service (DDoS) attack against your domain is obviously relevant. A data breach at your cloud payroll service provider is obviously relevant to you, but do you know the extent of the data breach? The relevance and impact of the breach depends on what data was stolen as well as were you the target or someone else that provider supports?

Threats can also be the outcome of non-malicious actions either by human or naturally occurring phenomena. A lightning strike to a vital power unit that provides perimeter security surveillance could result in a threat.

“Understanding the Threat Target can have significant influence on the relevancy of a threat.”
How does the threat manifest itself? Does it use protocols or behaviors that are in use in your environment? This question seems reasonably easy to answer to the layman.

Unfortunately it is not that easy. Most large enterprises struggle to keep abreast of all applications and systems in their environment. Most do not lock down the environment to stop new applications or systems from being introduced. Therefore, there are always new systems and applications that could (and are) legitimately be introduced without a security professional being consulted.

Due to the protocols and complex application interactions that occur on the global Internet, understanding and identifying threat behaviors that are applicable to your environment vs benign normal behavior is an extremely complex analytical task.

“Threat behaviors have significant value for threat relevancy but are extremely difficult to analyze and predict.”
Earlier in the text, we asked the question “How can one possibly protect against events that have not yet occurred? "

While there is no silver bullet, Threat Intelligence helps you reduce risk if used in combination with scientific processes that support your knowledge and experience.

LinkedIn Allan Thomson: http://bit.ly/1L7h9mi

Allan Thomson is Chief Technology Officer at LookingGlass Cyber Solutions Inc.  @LGScout

 

« Apple v FBI: The US Debates Privacy
Canada Cuts 5 Eye Intelligence Sharing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Northbridge Insurance

Northbridge Insurance

Northbridge is a leading Canadian business insurance provider. Services offered include Cyber Risk insurance.

International Association for Cryptologic Research (IACR)

International Association for Cryptologic Research (IACR)

(IACR is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

Engage Black

Engage Black

Engage Black provides solutions for securing and protecting cryptographic keys, data at rest, and data in motion.

Illumio

Illumio

Illumio delivers adaptive security for every computing environment, protecting the 80% of data center and cloud traffic missed by the perimeter.

Thinklogical

Thinklogical

Thinklogical manufactures secure, KVM, video, audio, and computer peripheral signal switching solutions for defence C4ISR applications.

Galvanize

Galvanize

Galvanize is a leading provider of award-winning, cloud-based security, risk management, compliance, and audit software for some of the world’s largest organizations.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

Forum of Incident Response & Security Teams (FIRST)

Forum of Incident Response & Security Teams (FIRST)

FIRST is the global Forum of Incident Response and Security Teams.

Red Alert Labs

Red Alert Labs

Red Alert Labs is an IoT security provider. We created an independent security lab with a disruptive business offer to solve the technical and commercial challenges in IoT.

PAX Momentum

PAX Momentum

PAX Momentum is the Mid-Atlantic’s premier startup accelerator, specializing in cyber, enterprise software, telecom, CleanTech, FinTech, InsureTech, and AI.

Zitec

Zitec

One of Europe's largest and most prominent full-cycle software development services companies, Zitec is the digital transformation partner to companies in the EU, UK, USA, Canada and ME.

Red Maple Technologies

Red Maple Technologies

Started and run by engineers from the UK Intelligence and Defence communities, Red Maple is a technical consultancy and product company.

Security Risk Advisors (SRA)

Security Risk Advisors (SRA)

Security Risk Advisors deliver cybersecurity services to leading companies in the Financial Services, Healthcare, Pharmaceuticals, Technology and Retail industries.

Sacumen

Sacumen

Sacumen is a niche player in the cybersecurity market, solving critical problems for security product companies.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.