Providing even more clarity to organizations’ cybersecurity programs. Credit: Thinkstock In part one, I outlined what CTI is and where it can be acquired to demonstrate its value. Here I will dive deeper into how organizations can be efficient in using this tool to mature their security programs’ management of today’s threats. After CTI sources for the company’s threat intelligence program have been selected, the CISO now needs to address use cases on how this information can be leveraged to provide value and reduce risk exposure. Use cases for why CTI is important are as follows: Improved network security operations CTI can be used by the CISO to help improve the performance of the installed technology suite. Next-generation firewalls, IDS/IPS systems and secured web gateways are just some of the technologies that apply rules to block malicious traffic. CTI can be used to validate threat indicators, malware signatures, domain reputations and can help reduce false positives. Using streaming CTI as a service built into these devices the business should be able to take advantage of near real-time threat analysis. Patch management prioritization Patch management is one of the primary security controls used by all security programs and it is never 100% effective. The process is time consuming and even when using patch management solutions that have been automated to their respective enterprise environments, a CISO will still need to prioritize which patches to apply. This is where CTI can help patch management teams save time. Additionally, CTI can help teams be more efficient by prioritizing patches based on vulnerabilities that are being actively exploited and are applicable to the current business environment, not based on a CVSS score. Security operations Most enterprise network environments generate more alerts than security operations center (SOC) teams or incident response (IR) teams can properly investigate. Analysts unfortunately triage this deluge of data into events that should be escalated to the IR team; events to investigate when time permits or events that look normal so we will ignore them. In this environment, CTI can be used to provide situational awareness. Risk scores can be attached to threat indicators that will generate a flag in the security operation centers SIEM. This would then alert analysts to query the threat database to investigate a high priority threat anomaly, allowing both teams more efficient use of their time and providing contextual threat data on the events they are investigating. Attack/threat analysis CTI for this use case can assist IR teams when they are responding to an active cyber incident. When the attack is initially detected, CTI can provide insight into who may be behind the attack, the tactics and tools used to initiate the attack and the likely impact to the organization. I personally have used it during incident response to obtain real-time information to search in triaging the event and recommended procedures to halt the incident and clean up its after effects. Triage & remediation In this final use case, CTI is used by the IR teams and information security teams to document and uncover the impact of a breach event. Unfortunately, cyber criminals will conduct attacks in waves using multiple tools and techniques. I myself have seen attacks where several types of malware were used together. By using CTI, my teams knew which indicators to look for as we searched through the debris left after the intrusion incident. Using CTI in this final case provides context to security teams so they can quickly search for and remove any attacker’s residual connections from the network.I hope from this discussion I have provided valid points on why cyber threat intelligence should be used to improve security programs and provide valuable benefits to an organizations’ strategic business operations. I truly believe CTI is a strategic asset and CISO’s need to incorporate it into their security programs and train their teams on how to efficiently use their selected information sources for the betterment of their company. Related content opinion Do you know your gap? Understanding risk exposure and security control inconsistencies is one of the most important aspects of a business’s security program. While this process may seem complicated at first glance, by following these steps, CISOs can more efficientl By Gary Hayslip Aug 23, 2018 9 mins Compliance Risk Management IT Leadership opinion Hack like a CISO Developing the security officers' processes, strategies and techniques for managing their time, resources and teams. By Gary Hayslip Jul 19, 2018 8 mins IT Skills IT Leadership Security opinion 5 simple steps for SMBs to ensure cyber resiliency While these tips are by no means a complete guide for how SMBs can be resilient, they can be the start of a continuous process small and mid-sized business should implement to be better prepared. By Gary Hayslip Jun 21, 2018 7 mins Small and Medium Business Disaster Recovery Data and Information Security opinion What should a cyber-resilient business look like? Cyber resiliency and the value it brings to a company and its customers will depend on how well the business incorporates its security program as a strategic partner. By Gary Hayslip May 15, 2018 5 mins Data and Information Security Network Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe