Exchanging Cyber Threat Intelligence: There Has to Be a Better Way

Exchanging Cyber Threat Intelligence: There Has to Be a Better Way
The report titled "Exchanging Cyber Threat Intelligence: There Has to Be a Better Way" found that while security professionals are increasingly recognizing the importance of threat intelligence, the majority remain dissatisfied with its accuracy and quality. Meanwhile, because many security teams still execute threat investigations solo rather than pooling intelligence, their ability to quickly act on threats is limited. The report found:

67% of IT and security professionals spend more than 50 hours per week on threat investigations, instead of efficiently using security resources and sharing threat intelligence.

Lack of accuracy and timeliness is among the top complaints about threat intelligence, which in turn hinders its effectiveness and security teams ability to quickly mitigate threats

Only 31% of respondents cited threat intelligence as actionable

Exchanging threat intelligence amongst peers, industry groups, IT vendors and government bodies can result in more holistic, accurate and timely threat intelligence and a stronger security posture.

Two-thirds of respondents (66 percent) reported that threat intelligence could have prevented or minimized the consequence of a data breach or cyber attack, indicating that more infosecurity professionals are realizing the importance of threat intelligence

"Cybersecurity takes a village, and this survey spotlights a real need for the cybersecurity community and public sector to better cooperate and communicate to share intel on security threats, said Larry Ponemon, Ph.D. chairman and founder of the Ponemon Institute. More accurate and comprehensive exchange of threat intelligence will speed up our ability to respond to attacks and will result in stronger defense against cyber threats - whether that's amongst enterprises or our nation's critical infrastructure, he added.

The vast majority of respondents are focused on threat sharing, with 84 percent of organizations fully participating or partially participating in an initiative or program for exchanging threat intelligence with peers and/or industry groups.

But, most of these organizations are only participating in peer-to-peer exchange of threat intelligence (65 percent) instead of a more formal approach such as threat intelligence exchange services or consortium, which contributes to the dissatisfaction with the quality of the threat intelligence obtained.

"There's a real need for actionable, timely and effective threat intelligence sharing, said Jesper Andersen, CEO of Infoblox. As industry players, we have a responsibility to our customers and consumers to make sure we're doing everything to facilitate comprehensive threat intelligence within the ecosystem. This means establishing an exchange platform that enables sharing that is trusted, neutral and offers a 360-degree view of market threats."

Other key findings from the survey include:

Most respondents believe threat intelligence improves situational awareness, with an increase from 54% of respondents in 2014 to 61 percent of respondents in this year's study.

66% of respondents say shared information is not timely, and 41% say it is too complicated.

Potential liability and lack of trust in intelligence providers prevent some organizations from fully participating in threat intelligence exchange programs, with 58% and 60% respectively citing these concerns.

24% of organizations would rather exchange threat intelligence via a threat intelligence exchange service and 21% via a trusted intermediary, with only 4% preferring to share intelligence directly with other organizations indicating a need for an exchange platform that enables such sharing because it is trusted and neutral.

While the value of threat intelligence declines within minutes, only 24% of respondents say they receive threat intelligence in real time (9%) or hourly (15%). Seventy-three percent of respondents say they use threat indicators and the most valuable types of information are indicators of malicious IP addresses and malicious URLs.

AWS Partner Network
PCI DSS Compliant
PCI DSS Certification
NASSCOM Emerge 50 Awards