g11436719719165

Location:
Flowers: , Eggs:

Comments

How to establish a threat intelligence program

Instituting an in-house cyber threat intelligence (CTI) program as part of the larger cybersecurity efforts can bring about many positive outcomes:

The organization may naturally switch from a reactive cybersecurity posture to a predictive, proactive one.

Know more @ linux system administrator salary

The security team may become more efficient and better prepared for detecting threats, preventing security incidents and data breaches, and reacting to active cyber intrusions.
The exchange of pertinent threat intelligence with other organizations may improve collaboration and preparedness.
But these positive results are dependent of several things.

threat intelligence program

Some may think that, for example, cybersecurity is directly proportionate to the amount of threat intelligence they collect.

In reality, though, threat intelligence information can only serve their organization to the extent that they are able to digest the information and rapidly operationalize and deploy countermeasures.

“You may collect information on an ongoing or future threat to your organization to include who the threat actor is, what are they going after, what is the tactic they will utilize to get in your network, how are they going to move laterally, how are they going to exfil information and when will the activity take place. You can collect all the relevant threat information but without the infrastructure in place to analyze the large amount of data coming in, the organization will not succeed in successfully orienting themselves and acting upon the threat information,” Santiago Holley, Global Threat Intelligence Lead at Thermo Fisher Scientific, told Help Net Security.
2020-06-25 17:38:04, views: 655, Comments: 0
   
0
0
`
zebratrade