Threat Intelligence Program is a set of people, process and technology which enables you to proactively Identify, collect, enrich and analyze threat information, strategic and tactical, so that your organization is ever ready to defend and respond to any kind of cyber attacks. Threat intelligence as applied in conventional security is any information that helps you tune your security defenses, build an effective response program for any contingency and also if required take preemptive measures to neutralize any looming threats. Key characteristics of any threat intelligence is that they should be timely, actionable and relevant to your organization. Threat intelligence gives out information about the attackers, their motivations, their tactics, techniques and procedure. This information and other contextual information when correlated gives out a better picture of the threats, vulnerabilities, and their impact. Threat intelligence helps you prioritize risk against your organizations and also helps in preparing a security roadmap for future security investments.
Key Program Metrics:
No of defensive rules based on IOC’s :
To achieve full operational intelligence continuum, automated defensive rules needs to be created. Therefore, how many defensive rules were created
No of architectural changes :
Architecture is a primary beneficiary of timely Threat Intelligence since architure makes control changes based on latest threat data.Therefore, number of architecture changes prompted based on operational data correlation
No of IOCs ingested :
How many produced positive correlation, how many lead to an incident remediation, as an organization makes (effective and appropriate) security architecture changes, and does the number of IOC correlations start to reduce over time
Percentage of TTPs Identified :
Identifying higher level adversary “choke points” that corresponds to TTPs is strategically important. How many proactively identified TTPs and understanding their relevance to business
Number of Internal/External Hunting Finds :
Hunter teams take a different approach and seek the root cause, namely the threat agent themselves, who are initiating one or more attacks. Therefore, number of internal hunters and external community engagements
Do let me know if you want us to add or modify above information.
Check out the Threat Intelligence (TI) market within FireCompass to get more information on these markets.