Many organizations flirt with the notion of threat intelligence. Academically it makes sense. You\u2019re going to proactively learn about malicious IPs, domains, URLs and anonymous proxies before anyone in your environment starts interacting with them so that you can theoretically be better prepared to prevent, detect and respond to incidents related to these malicious corners of the Internet.You are also going to join some industry consortiums so you can get more specialized information as it relates to your business vertical. This is very popular in some verticals such as financial services and critical infrastructure.You may even go further to learn about malicious individuals and groups that are targeting you and trading in your intellectual property as gleaned from multilingual counterintelligence analysts operating in chat rooms, old school dial-up BBS and other locations where malware, nefarious services, credit card numbers and classified information is bought and sold. This goes beyond general cyber threat intelligence and often requires relationship building with the FBI and other federal agencies if the information is going to be acted upon. As such, we\u2019ll stick with cyber intelligence for the sake of this piece.Intelligence operationalizationSo far the promise of intelligence sounds pretty good. Why wouldn\u2019t you want more intelligence so you can be better prepared and more informed? Many critics of threat intelligence cite intelligence operationalization as being a fundamental flaw and that is certainly a big part of the story. \u00a0Most organizations do not have a large enough threat intelligence and\/or counterintelligence organization to process all the received intelligence in an efficient and effective way. As such, intelligence becomes little more than a lagging indicator. The malicious IPs, domains, URLs, Tor proxies and the like are constantly growing and moving. The volume of data from free, paid and hybrid intelligence services is overwhelming and brings baggage like:\u00a0Duplicate information \u2013 x is bad, x is bad, x is bad\u2026Conflicting details \u2013 x is bad - no x is goodOutdated data \u2013 x is bad - at least it was in 2001Information that is simply wrong \u2013 x is bad - sorry, our bad, didn\u2019t mean to put your entire ISP on a blacklistInformation that is too general to act upon \u2013 we\u2019ve seen bad stuff associated with top-level domain .cn \u2013 maybe you should disallow access to anything that is .cnThe other issue is that you are dealing in millions of intelligence variables. Operationalizing all those details with a SIEM, firewall, IPS and so on isn\u2019t practical. Organizations are still trying to tune their SIEMS to address the basics as outlined in my previous blog SIEMs sometimes suck. These systems are not built to handle a rotating active list of approximately 5 million bad IPs, for example, at any given time.In the end you are left with trying to prioritize the intelligence for yourself into a manageable subset that you consider to be the most critical, timely and accurate. You make an educated guess in terms of what to ignore and what to integrate. The net is that you are guessing when it comes to intelligence integration because you don\u2019t have many other choices.While free threat intelligence is the most common source of intelligence for most organizations, there are some vendors that provide enhanced paid services that aggregate, de-duplicate, verify, etc. and even build rules and signatures. This improves the overall threat intelligence experience and is far better than the guessing alternative. But beyond intelligence operationalization there is another missing variable:\u00a0 threat intelligence personalization.\u00a0Intelligence personalizationISACs are extremely beneficial and help organizations hone their intelligence focus. But even if you are getting specialized, industry-specific intelligence from an industry group such as the Financial Services ISAC, the Retail ISAC or any number of other ISACs, it\u2019s still not personalized to your organization\u2019s defensive stack.Because it\u2019s not personalized there isn\u2019t a clear path to integrate and evaluate the intelligence across your incident prevention, incident detection and incident response capabilities, especially if you want to look beyond your technology and evaluate the effectiveness of your people and processes. This lack of personalization means that you can\u2019t answer simple questions about your environment. For example:Can I verify that my firewalls and proxies are preventing access to my list of bad domains?Can I verify that when access is attempted and even allowed that my controls are detecting it?Do I know if inbound or outbound connections are made with these malicious sites my security team will know how to respond?Am I sure that there is a clear process to follow that is either automated or manual that my IR team is using?Are all of these variables measurable so that I can determine if my combination of people, process and technology is working effectively and improving over time?What to doDon\u2019t throw your threat intelligence strategy out. There are many ways to help you get value; here are three you should consider.First, when it comes to threat intelligence you often get what you pay for. Intelligence that\u2019s free isn\u2019t without value, but you might need to put a lot more time and resources into it to get that value than you could from a paid service that addresses some of the baggage I wrote about above. The paid service could very well end up costing you less. And, you don\u2019t want to be in a situation where by the time you figure out what\u2019s worth keeping, it\u2019s outdated. Speed matters with intelligence.Second, take advantage of the threat intelligence from your ISACs. You will have some industry-specific intelligence. But beyond that you\u2019ll be able to build industry relationships and hopefully discuss with others in your industry how they are operationalizing their threat intelligence.Third, leverage a solution that will allow you to personalize your threat intelligence by validating if your controls on your network are preventing, detecting and responding to your threat intelligence information. These solutions should be able to evaluate your people, processes and technology in your production environment, safely and continuously. By implementing a solution like this you have an automated method of understanding the juxtaposition of your threat intelligence and your security posture so you can focus your resources on managing the gaps.Threat intelligence doesn\u2019t have to be an academic pursuit or a lagging indicator. With some time and effort and investments in the right areas it can add a predictive level of security to your overall security posture to complement incident prevention, detection and response before your organization is even targeted.