Threat Intelligence Dos and Don'ts

The perception and adoption surrounding threat intelligence has evolved in the last few years. The approach to the evidence-based knowledge has changed dramatically as many organizations have created their own path toward leveraging threat intelligence by leveraging open source solutions or tapping into the advancements in the cybersecurity tools market. Simply put, it started very different than where it is now, according to Dave Ockwell-Jenner, senior manager of Security Threat and Operational Risk Management (STORM) at SITA, an information technology firm headquartered in Switzerland.

“I think that’s part of why it has seen this longevity as it’s continuing to evolve,” Ockwell-Jenner told InfoSec Insider during a recent video interview shot at MISTI’s Threat Intelligence Summit. “Companies started in a small way…now it’s moved more into the strategic realm, where companies are looking to threat intelligence to help inform their security programs and help make sure that those programs are commensurate with the threats they face.”

Additionally, many organizations are also using it to inform upstream management of their progress as it relates to measurably reducing risk within the business, he added.

During the full video interview below, Ockwell-Jenner discusses how organizations have changed the way they approach threat intelligence, and provides the primary Dos and Don’ts associated with developing a successful threat intelligence program.

 

Interested in learning more about this topic and others? Then you should be at our upcoming InfoSec World Conference & Expo.

unsplash-logo 广博 郝