<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=254990494906321&amp;ev=PageView&amp;noscript=1">

Intelligence-Led Security And The Modern Tech Stack

The Echosec Team June 11, 2019 OSINT, Open Source Threat Intelligence

Three years ago, an eternity in the information security space, two chief information security officers spoke on a topic at RSA Conference 2016 in San Francisco that has kept many a CISO awake at night: how best to build an integrated corporate security technology stack.

The pair were from vastly different organizations – one provided healthcare-based software solutions that connected payers, providers, and patients in the U.S. healthcare system, while the other was a Manhattan-based multinational financial services firm – but the challenges each faced were identical.

New call-to-action

Some of the key takeaways were as follows: Define what you are trying to protect and measure, obtain appropriate buy-in from senior executives, and install the right tools and services that fit your culture.

Fast forward to 2019 and that sage advice is still relevant. What's becoming more apparent is that in order to define what needs protecting and stay ahead of modern threats, a strong security technology stack needs to be intelligence-led.

retail mall dark

What is Intelligence-Led Security?

 

Intelligence-led security is the practice of gathering and analyzing data to prevent attacks and mitigate risks, as well as discovering information breaches or leaks that may already be in place.  

Better intelligence is the only way to stop the creativity of modern cyber criminals and the schemes that they produce. As proof, one need look no further than the Symantec Internet Security Threat Report, Volume 24, released earlier this year. The report is an annual exercise in which the company shares, “the latest insights into global threat activity, cyber criminal trends and attacker motivations.”

Example: Formjacking

The report notes that while ransomware and cryptojacking were go-to moneymakers for cyber criminals, 2018 brought diminishing returns, resulting in lower activity.

“Like flies to honey, miscreants swarm to the latest exploits that promise quick bucks with minimal effect,” the authors of the report stated. “Ransomware and cryptojacking had their day; now it’s formjacking’s turn."

Formjacking attacks are simple and lucrative: cyber criminals load malicious code onto retailers’ websites to steal shoppers’ credit card details, with 4,800+ unique websites compromised on average every month.

The report explains how both well-known and small-medium businesses were attacked, conservatively yielding tens of millions of dollars to bad actors last year.

intelligence-led-security

Minimize Damage

It is the job of security technology tools to prevent an attack or minimize damage if hit, but as Craig McDonald, the CEO of Australian-based MailGuard, a cloud web and email security service noted earlier this year, choosing the right one can be difficult.

“As a business owner myself, I understand the frustration,” McDonald wrote in a blog posted on the company’s web site. “The constantly evolving complexity of cyber-attacks, combined with the wide range of sophisticated technology solutions out there can sometimes be daunting.”

A Risk Management Framework

Developing a cybersecurity risk management framework is key, McDonald adds, both in terms of software and hardware purchases and the evaluation of new tools that can reside within the security stack.

An example of the latter are open-source intelligence (OSINT) tools that may not have been part of the discussion three years ago, but certainly are today, as intelligence led security is becoming more present.

According to a report released in March by Homeland Security Research Corp., OSINT is becoming a necessity and the market is growing.


The market, it states, is being boosted by several drivers, including:

  • An increased use of social networks and the rise of user-generated content, including video sharing, groups and forums, which expand the amount of content available for intelligence experts to gather and analyze.
  • The rapid advances in big data, data analytics and artificial intelligence that are facilitating the conversion of millions of scattered data into manageable databases.
  • The growth of OSINT training courses around the world, which have boosted the number of potential users of advanced systems.

iStock-466429661

Open Source Intelligence For Security

OSINT is one of the fastest-growing verticals in 2019. Hackers are interacting over the dark net and managing operations and assaults in web forums and groups. Constant monitoring of these activities can provide valuable information about planned attacks.

Open source and publicly available information is extremely useful for making responsible and proactive risk management decisions. Best practices involve gathering this intel and combining it with other data points to provide context to the situation. The most effective teams compile the gathered data and use it to guide and inform an appropriate security response, rather than reacting to a single data point and triggering an unnecessary reaction.

New call-to-action 

There is massive uptick in the use of intelligence-led security and risk management operations around the globe, as modern security teams are evolving their approach based on today's threat landscape.

Echosec Helps Companies Detect Threats through Open Source Data sources like social media and the dark web.

BOOK A DEMO

 

THE INTEL

Quarterly updates, news and opinionGET THE INTEL

READ MORE

New call-to-action
New call-to-action
New call-to-action
New call-to-action