The Inner Circle

 View Only

Threat intelligence and Risk Management

  • 1.  Threat intelligence and Risk Management

    Posted Aug 30, 2024 11:26:00 AM
    I'll like to introduce this very first series on Threat Intelligence by a commonly asked question: in your opinion, how long would it take your incident response team to detect and contain a compromission or data leak?

    According to the 2023 IBM Security report on the Cost of a Data Breach, it's take around 240 (8 𝐦𝐨𝐧𝐭𝐡𝐬) days to identify and contain a breach by the internal team, and this can time set can grow up to 320 days when the breach is disclosed by an attacker, which is quite huge.

    This is where Threat intelligence come in action, and you can leverage it to understand several aspects of your threat environment (identification of vulnerabilities, nature of threats...) and tailor solutions to match your risk appetite.

    So here are the building blocks of Threat intelligence in Risk Management:

    - 𝐅𝐫𝐚𝐦𝐞: Threat intelligence helps you to understand the direction and operations needed to perform your Risk Management.

    - 𝐀𝐬𝐬𝐞𝐬𝐬: you can use Threat Intelligence to identify, assess and track potential threats and vulnerabilities.

    - 𝐑𝐞𝐬𝐩𝐨𝐧𝐝: you can use Threat Intelligence to evaluate and implement courses of action to take after th risk identification.

    - 𝐌𝐨𝐧𝐢𝐭𝐨𝐫: you can use Threat Intelligence to monitor the threat changes and provide a strong support to your security decisions and practices.




    ------------------------------
    Raquel Fabiani TOUOYEM
    Cybersecurity Architect
    Credit Agricole
    ------------------------------