Reduce Risk With Threat Intelligence

Do you want to be more proactive in managing risk?

Most professionals would answer that they would like less exposure to threats but often do not have sufficient time, knowledge or personnel to implement all factors that influence their risk profile.

Prior security events and incidents often allow security professionals opportunities to learn valuable lessons that impact their risk profile going forward. But, what is the risk if you don’t pay attention to knowledge learned from these previous events?

Other real world events can teach us important lessons in this regard. For example, if you drive off a 200-foot-cliff in a speeding automobile, and you ignored the sign indicating the cliff, then the outcome will very likely be significant physical harm.

If we paid attention to this sign and had knowledge of its meaning, then it would reduce our risk of injury. If we had the misfortune of this event, then our learned experience would teach us to avoid such pitfalls in the future. This is a fairly obvious example of paying attention to a sign and avoiding risk.

When is it harder to avoid such risk in a security world? It is usually due to a myriad of factors that have direct and indirect influence on the outcome. They introduce uncertainty in the outcome.

Why does risk reduction matter to security professionals?

To help explain why security is not just about the learning from past experiences but also very much about applying that knowledge to reduce risk, let us examine the term ‘Threat Intelligence’.

The term ‘Threat Intelligence’ is in common use in today’s security world. The term is used in many different contexts, often times ambiguously to justify something that has nothing to do with either intelligence or threat. It occurred to us that perhaps before we consider using such a term that it would be suitable to understand the meaning of the words.

Threat – The word has typically been defined as ‘an expression of intention to inflict evil, injury, or damage’ or ‘the possibility that something bad or harmful could happen’. In both of these definitions and uses of the word, it is clear that threat refers to a future event that has not yet occurred. It is also clear that it refers to an intention that is not certain. Being consistent with the definition and its use in language would suggest that threat applied to a security practice refers to ‘events that have not yet occurred’. How can one possibly protect against events that have not yet occurred?

Before we answer that question. Let’s look at Intelligence.
Intelligence – The word has typically been defined as “the ability to learn or understand or to deal with new or trying situations” or “the ability to apply knowledge to manipulate one’s environment or to think abstractly as measured by objective criteria (as tests)”. From this definition, the word Intelligence could be best understood to mean based on information of existing evidence or facts, applying that information to form knowledge to better your environment.

If we combine the words and their definitions, it would seem to suggest ‘threat’ is about future and ‘intelligence’ is about knowledge of the past. Therefore, “Threat Intelligence reduces risk when applied with scientific processes combined with knowledge and experience”.

So how does one use Threat Intelligence to reduce risk in security operations?
Start by asking yourself: “What are you trying to secure?” Given that there are many outcomes possible in the complex world of the Internet, you need to first of all consider the assets that are you are trying to secure from future threats.

Most professionals would suggest that they are not interested in improving security of a computer system or a network that they don’t own nor have direct use of. What if you use a service provider for cloud storage or compute services to your enterprise? Now you have to care about that provider’s services and their security exposure.

“Be clear on what scope you want to manage security risk for.”
Assuming that you have an understanding of the full scope you wish to protect, the next step is to consider what threats are relevant to that scope.

Here’s a simple example: If you are an automobile manufacturer, you are unlikely to care about a threat to the airline industry such as a bomb threat to aircraft. However, if a threat is constructed by a threat actor that attempts to attack all control systems used by manufacturing equipment that is used by both industries – then you at least have to consider the possibility that it has an impact on your future.

Does that mean you have to consider all threats regardless of source or target? No. But you have to at least consider the influence of that threat and its relevancy to your world.

“Relevancy of a threat to your world is a critical aspect of reducing risk exposure.”
Many factors influence relevancy. Is the threat source known? Is the target known? Are the protocols or behaviors being used by the threat in use in your environment? Does the threat discriminate or does it apply techniques that can broadly apply to many different environments?

First of all, threat sources are usually unknown when those sources are primarily human actors. Frequently, threat sources will deliberately obfuscate themselves and/or place blame on other actors. There are multiple reasons why threat sources want to remain anonymous. One reason is to avoid prosecution by law enforcement after an attack has occurred. In many cases, those attempting to detect threats are aided by knowing who is attacking as they can determine motives and targets. Detectors may also be aware of previously used threat source tactics and therefore can predict future behaviors more accurately, thereby increasing their security response. Therefore, there is strong justification by threat sources to avoid identification.

How much you can rely on the threat source being identified correctly and then being able to determine a response based on solely the source information is limited at best. Even if the threat source is accurately determined, if you are responsible for a reasonably large and complex environment, do you know what a specific threat intends to attack in your environment? How certain are you of that? What evidence do you have to support that prediction?

“Identifying a Threat Source has limited value to determining the relevancy or impact of a threat.”
Does the threat have a specific target? Does the threat attempt to cause harm to a specific domain or asset in your environment? A Distributed Denial-of-Service (DDoS) attack against your domain is obviously relevant. A data breach at your cloud payroll service provider is obviously relevant to you, but do you know the extent of the data breach? The relevance and impact of the breach depends on what data was stolen as well as were you the target or someone else that provider supports?

Threats can also be the outcome of non-malicious actions either by human or naturally occurring phenomena. A lightning strike to a vital power unit that provides perimeter security surveillance could result in a threat.

“Understanding the Threat Target can have significant influence on the relevancy of a threat.”
How does the threat manifest itself? Does it use protocols or behaviors that are in use in your environment? This question seems reasonably easy to answer to the layman.

Unfortunately it is not that easy. Most large enterprises struggle to keep abreast of all applications and systems in their environment. Most do not lock down the environment to stop new applications or systems from being introduced. Therefore, there are always new systems and applications that could (and are) legitimately be introduced without a security professional being consulted.

Due to the protocols and complex application interactions that occur on the global Internet, understanding and identifying threat behaviors that are applicable to your environment vs benign normal behavior is an extremely complex analytical task.

“Threat behaviors have significant value for threat relevancy but are extremely difficult to analyze and predict.”
Earlier in the text, we asked the question “How can one possibly protect against events that have not yet occurred? "

While there is no silver bullet, Threat Intelligence helps you reduce risk if used in combination with scientific processes that support your knowledge and experience.

LinkedIn Allan Thomson: http://bit.ly/1L7h9mi

Allan Thomson is Chief Technology Officer at LookingGlass Cyber Solutions Inc.  @LGScout

 

« Apple v FBI: The US Debates Privacy
Canada Cuts 5 Eye Intelligence Sharing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Asavie

Asavie

Asavie provide solutions for Enterprise Mobility Management and secure IoT Connectivity.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

Alan Turing Institute

Alan Turing Institute

Alan Turing Institute is the UK national institute for data science. A major focus is Big Data analysis with applications including cyber security.

2Secure

2Secure

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security.

Dcoya

Dcoya

Dcoya's complete security awareness training program gives you out-of-the-box compliance with PCI-DSS, HIPAA, SOX and ISO regulations.

Salient CRGT

Salient CRGT

Salient CRGT is a leading provider of health, data analytics, cloud, agile software development, mobility, cyber security, and infrastructure solutions.

Evidence Talks Ltd

Evidence Talks Ltd

A leading forensic computing authority developing unique digital forensic technologies. Tools that detect potential terrorists & criminals & used by the military, enforcement & intelligence commmunity

Government CSIRT - Chile

Government CSIRT - Chile

Government CSIRT is the Computer Security Incident Response Team for State networks and government cyberspace in Chile.

IoT Security Institute (IoTSI)

IoT Security Institute (IoTSI)

IoT Security Institute is an academic and industry body dedicated to providing frameworks and supporting educational services to assist in managing security within an Internet of Things eco-system.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

Vijilan Security

Vijilan Security

Vijilan provides 24/7 SOC services to MSPs/VARs. Our Security Operations Center is global, and our services are exclusive to the Channel.

World Cyber Security Summit

World Cyber Security Summit

World Cyber Security Summit, by Trescon, is a thought-leadership driven platform for CISOs who are looking to explore new-age threats and the technologies/strategies that can help mitigate them.

Locuz

Locuz

At Locuz, we’ve made it our mission to help businesses like yours create an actionable digital strategy.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.

Amtivo Group

Amtivo Group

Amtivo provides Certification, Inspection and Training services to national and local Government bodies, multi-nationals, enterprise clients and SMEs.