My Threat Intelligence and Threat Assessment Research Papers Publish

简介: http://blogs.gartner.com/anton-chuvakin/2014/05/15/my-threat-intelligence-and-threat-assessmen...

http://blogs.gartner.com/anton-chuvakin/2014/05/15/my-threat-intelligence-and-threat-assessment-research-papers-publish/

by Anton Chuvakin  |  May 15, 2014  |  1 Comment

My threat-related research papers are published on Gartner.com. World, please welcome …

The first paper focuses on threat intelligence usage: “Threat intelligence has emerged as a key security control that helps organizations detect, triage and investigate threats. This assessment compares types of threat intelligence data and outlines common usage patterns.”

Select quotes follow:

  • “The time has come to invest resources into understanding and countering specific threats — a threat-centric approach will complement the existing preoccupation with vulnerability- and asset-centric security.”
  • “To make use of TI, the organization needs not just the tool, but also the entire capability that combines people, process and technology. Prepare to dedicate efforts and time to TI. As with many security technologies, the value you get from threat intelligence is related to the effort you put in.”
  • “Usage of threat intelligence adds value on all stages of the attack life cycle, enabling what some companies call “intelligence-led security.”
  • “Evaluate TI use cases. The organization should carefully evaluate all use cases for threat intelligence — both strategic and tactical — and select those that map to the needs and capabilities (and of course, maturity levels) of the organization.”
  • “On a high level, all security organizations can benefit from knowing more about the threats they face. However, given differences in risks and available resources, organizations may limit their involvement with threat intelligence at different levels of maturity.”

The other paper is centered around threat assessment: “The threat assessment process makes use of threat intelligence in order to determine which threats are relevant to an organization. It identifies threat types, specific threats and even explicit threat actors to include in risk management processes.”

Some fun quotes follow:

  • “Threat assessment is most critical to those organizations that must prioritize resource allocation for dealing with advanced and targeted threats.”
  • “IT security, physical security, fraud, legal, human resources, compliance and other internal groups all have valuable knowledge that may help coordinate efforts on some aspects of threat assessment.”
  • “Establish a repeatable threat assessment process that looks at threat capabilities and intents and then relates them to organizational resources, processes and personnel. Use threat intelligence to fill the gaps in your knowledge and visibility.”
  • “Factor threat assessment results and ongoing threat intelligence activities into risk management and security programs in general. Reliable intelligence on how and why threat actors attack a given type of organization should be used to optimize protection against those attacks or to deter them in the first place.”

Access to papers requires Gartner GTP subscription. For those without, see some of the related blog posts below.

Blog posts related to threat research project:

Previous posts announcing research publication:

目录
相关文章
|
4月前
|
Dart
B - MaratonIME challenges USPGameDev
B - MaratonIME challenges USPGameDev
|
9月前
|
Java API 开发工具
KIRO(Knowledge, Insights, and Relationships Ontology)
KIRO(Knowledge, Insights, and Relationships Ontology)是一个由微软提供的开源知识图谱平台,用于构建、管理和查询知识图谱。
165 3
Choosing Teams
Choosing Teams
99 0
Choosing Teams
|
JavaScript 前端开发 vr&ar
Use Augmented Reality technology to bring enhanced customer experience
Use Augmented Reality technology to bring enhanced customer experience
89 0
Use Augmented Reality technology to bring enhanced customer experience
|
人工智能 自然语言处理 安全
Driving the Digital Transformation in China's Insurance Industry
The insurance industry is adopting new technologies to improve its products and operations. This article describes some of the major advancements in China's insurance industry.
1629 0
Driving the Digital Transformation in China's Insurance Industry
|
Oracle 关系型数据库 Unix
|
SQL 安全
Protecting Websites through Semantics-Based Malware Detection
Malware detection is a fundamental feature of web security and serves as the first line of defense for most websites.
1337 0
|
数据挖掘 C#
Analyzing The Papers Behind Facebook's Computer Vision Approach
Analyzing The Papers Behind Facebook's Computer Vision Approach Introduction                 You know that company called Facebook? Yeah, the one that has 1.
911 0
Threat Intelligence-Driven Risk Analysis
http://www.threatconnect.com/threat-intelligence-driven-risk-analysis/ ...
758 0