{"id":12758,"date":"2018-07-10T08:10:11","date_gmt":"2018-07-10T16:10:11","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/07\/10\/news-6526\/"},"modified":"2018-07-10T08:10:11","modified_gmt":"2018-07-10T16:10:11","slug":"news-6526","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/07\/10\/news-6526\/","title":{"rendered":"So you&#8217;ve been asked to start a threat intel program"},"content":{"rendered":"<p><strong>Credit to Author: William Tsing| Date: Tue, 10 Jul 2018 15:00:00 +0000<\/strong><\/p>\n<p>Ever since the Mandiant APT1 report landed like a bomb in private sector security reporting, threat intelligence has been a hot buzzword many companies have been chasing over. \u00a0But what is threat intelligence? \u00a0What do you need to execute it well? \u00a0And how many new tools do you need to buy? \u00a0The ambiguity around these questions leaves many people wondering &#8220;How on earth do I start a threat intel program?&#8221;<\/p>\n<h2>Maybe don&#8217;t?<\/h2>\n<p>Threat intelligence is a very new, very popular buzzword in the security industry. \u00a0But as a capability, it&#8217;s both very expensive, and meant to sit on top of a mature security program. \u00a0Do you have mitigations in place against the <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/05\/owasp-top-ten-boring-security-that-pays-off\/\" target=\"_blank\" rel=\"noopener\">OWASP top 10<\/a>? \u00a0Have you <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2016\/12\/vetting-your-vendors-money-isnt-everything\/\" target=\"_blank\" rel=\"noopener\">vetted your existing vendors<\/a> for efficacy? \u00a0Do you have a fully staffed and trained SOC, or are your analysts working double shifts? \u00a0If you don&#8217;t have clear answers to those questions, your security program probably is not mature, and would not really benefit from an additional costly function.<\/p>\n<p>Cost can be a serious concern. \u00a0While SOC analysts have a fairly wide spread for salary range, threat intelligence analysts with government training are not that common, resulting in a salary premium. \u00a0Below you can see a relatively common private sector intelligence analyst salary as contrasted with a salary for a government trained analyst.<\/p>\n<div id=\"attachment_24428\" style=\"width: 610px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24428\" data-permalink=\"https:\/\/blog.malwarebytes.com\/101\/business\/2018\/07\/youve-asked-start-threat-intel-program\/attachment\/salary\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/salary.png\" data-orig-size=\"1336,434\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"salary\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/salary-300x97.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/salary-600x195.png\" class=\"wp-image-24428 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/salary-600x195.png\" alt=\"salary comparison\" width=\"600\" height=\"195\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/salary-600x195.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/salary-300x97.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/06\/salary.png 1336w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\">Glassdoor threat intel salaries for the private and public sector<\/p>\n<\/div>\n<p>A well trained threat intel analyst embedded in a mature security team can be an outstanding force multiplier, but without a well oiled environment to place them into, they can inflate staffing budgets without providing a significant return on investment.<\/p>\n<h2>But I have to<\/h2>\n<p>If you must start a threat intel program, the first step is to look for the components you already have. \u00a0Spending on threat intel vendors or employees with highly specific experience can lead to astronomical costs, and raises the odds that enterprise leadership won&#8217;t find value in the team. \u00a0So start small: almost every Tier II SOC has senior members with a wealth of experience in the threat landscape, and an itch for more responsibility. Rather than casting a line into a very tight market for new staff, it&#8217;s much more cost effective to send those SOC members to intelligence training, then task them with creating training for everyone else. \u00a0Some companies have accomplished this via transitioning SOC staff from monitoring to threat hunting.<\/p>\n<h3>Threat hunting &#8211; intel you should already be doing<\/h3>\n<p>Per Wikipedia, &#8220;Cyber threat hunting is the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.&#8221; \u00a0In practice, what this amounts to is training analysts to tell the entire story of a threat: where did it start, what TTPs were employed in the attack, what systems were touched, and what corroborating information can be gained from public data. \u00a0When a responder is trained to tell the full story of a threat in this manner, organizations can not only respond to a threat, but can also learn from it and adjust mitigations accordingly.<\/p>\n<h3>Tools you need and tools you don&#8217;t<\/h3>\n<p>First and foremost, you do not need a third party threat intelligence feed. \u00a0It&#8217;s a nice to have, but the reality is that external vendors cannot provide data specific to your company, and frequently struggle to offer relevant data filtered by industry vertical. \u00a0Vastly more important is to make appropriate use of the data you have. \u00a0Here&#8217;s a non comprehensive list of data that many companies collect, but don&#8217;t exploit effectively:<\/p>\n<ul>\n<li>Malicious spam can be used to pinpoint types of threats specific to the organization, as well as relative popularity of exploits used<\/li>\n<li>Log review is commonly done as part of after action reports associated with a breach. \u00a0But they can also be used proactively to review patterns of activity, and adjust mitigations accordingly.<\/li>\n<li>Password failures. \u00a0If a threat actor is attempting to brute force an account, is it a dictionary attack or have the credentials previously been valid on the system? \u00a0Looking at use of outdated passwords can pinpoint a past data leak, or give visibility into how stolen company data is disseminated out to threat actors.<\/li>\n<\/ul>\n<p>Reviewing internal data for threat intelligence can be much more effective than a third party feed because all internal data is by definition tailored to your company&#8217;s specific threat profile. \u00a0It also costs nothing, which doesn&#8217;t hurt.<\/p>\n<h2>Where to go next<\/h2>\n<p>Threat intelligence is a relatively new field in private sector infosec, but a few researchers have produced valuable resources for getting people on the right path.<\/p>\n<p><a href=\"https:\/\/www.securosis.com\/blog\" target=\"_blank\" rel=\"noopener\">Securosis<\/a>\u00a0provides both a threat intel blog, and a library of papers offering deep dives into security principles and best practices.<\/p>\n<p>The SANS reading room has a <a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/threat-intelligence-is-effectively-37282\" target=\"_blank\" rel=\"noopener\">great white paper<\/a>\u00a0on identifying what threat intel is, and what it can do in best cases. \u00a0Very useful in communicating with executives who might be unclear on these ideas.<\/p>\n<p>And if you&#8217;ve already started a threat intel program, check out the <a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/basics\/measuring-effectiveness-information-security-controls-33398\" target=\"_blank\" rel=\"noopener\">SANS paper<\/a> on evaluating information security controls. \u00a0The scope is a bit broader than a single cyber security function, but should provide valuable input on how to judge if your program is working for you at a reasonable cost.<\/p>\n<p>Threat intelligence is still a very new idea that doesn&#8217;t yet have widely agreed upon best practice. \u00a0So while there are some good resources to get started, the best resource for you is most likely other people in the same position. \u00a0Talking to peers, reading current blogs, and keeping tabs on productive teams can position you well for success. \u00a0Good luck, and stay safe.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/business\/2018\/07\/youve-asked-start-threat-intel-program\/\">So you&#8217;ve been asked to start a threat intel program<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/business\/2018\/07\/youve-asked-start-threat-intel-program\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: William Tsing| Date: Tue, 10 Jul 2018 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/business\/2018\/07\/youve-asked-start-threat-intel-program\/' title='So you've been asked to start a threat intel program'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/06\/people-coffee-tea-meeting-feature.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>What are the bumps in the road you can expect and avoid when setting up a threat intel progarm for your business?<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/business\/\" rel=\"category tag\">Business<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/how-tos\/\" rel=\"category tag\">How-tos<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/101\/\" rel=\"tag\">101<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/remediation\/\" rel=\"tag\">remediation<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/threat-intel\/\" rel=\"tag\">Threat Intel<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/business\/2018\/07\/youve-asked-start-threat-intel-program\/' title='So you've been asked to start a threat intel program'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/business\/2018\/07\/youve-asked-start-threat-intel-program\/\">So you&#8217;ve been asked to start a threat intel program<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,1001,11171,14718,11143],"class_list":["post-12758","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-business","tag-how-tos","tag-remediation","tag-threat-intel"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12758"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12758\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}