3 Pillars of Cyberthreat Intelligence

Strong enterprise cybersecurity programs must be a built on a framework that incorporates strategic, operational, and tactical leadership and goals.

Martin Dion, VP EMEA Services, Kudelski Security

November 22, 2017

3 Min Read
Dark Reading logo in a gray background | Dark Reading

As an enterprise, you used to worry about your competitors and your goal was to outpace them, to outservice them, and to outsmart them. Today, you can be the smartest and the fastest and have the best service and solutions, but it doesn't matter anymore because to "them" you are just another giant with feet of clay.

"Them" are your cyber opponents. They are referred to as hackers, state-sponsored attackers, corporate spies, hacktivists.…  It doesn't really matter what you call them or what their motivations are. The fact is that you — more specifically, your business assets — are their targets. Simply put, it's about good guys vs. bad guys, both trying to make money in cyberspace. In that context, the Internet is analogous to a very bad neighborhood and, within part of it, an open war is waging where criminal organizations are trying to seize their fair share of the profits in a very unstable terrain and time period. 

What can you do to protect your assets and investments? Part of the answer is that you must know your enemy, their tactics, your strengths, your weaknesses, and the battleground. In short, you need cyber intelligence. But for most organizations, intelligence is a complex concept to grasp. It is not about spies or "infiltrating" the Darknet, which, in reality, is only a tool and a tactic to generate intelligence.

In the enterprise, the purpose of intelligence is to provide security teams with information that leads to smart decisions and avoids decision-making cognitive biases. For example, a bias such as "trusting your gut" may be natural when you negotiate one on one. But gut-trusting in the context of a nation-to-nation negotiation with an individual who represents the complex interest of a country would not bear fruit. The same logic applies to the military, because without a profound understanding of one's own and of its enemy capabilities, and of the operation theater, lives can be endangered unnecessarily. 

In the private sector, intelligence serves as a similar process and tool, particularly the current environment of massive digital transformation. Here, the role of intelligence is to collect, analyze, and produce complete, accurate, timely, and relevant threat assessments that inform decision makers as they act on the information. 

Strong enterprise Intelligence programs are built on three pillars: strategic, operational, and tactical. The table below summarizes the three major pillars, who bears responsibility, and the goal.

{Table 1}

The good news is that many organizations already have much of this framework in place. By borrowing and learning from it, security leaders will be better able to successfully deliver and grow their business in today's complex threat landscape.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry's most knowledgeable IT security experts. Check out the INsecurity agenda here.

About the Author

Martin Dion

VP EMEA Services, Kudelski Security

Originally from Montreal, Martin has been navigating the tormented water of cybersecurity for over 20 years. He was the founder and CTO at Above Security Canada where he worked locally and in the Caribbean's. Twelve years ago, he moved to Switzerland to launch SecureIT, serving EU and MEA fortune 500 clients. When both organizations were acquired by Hitachi Security, he moved to MIG Bank as chief security officer. He is now the vice president of EMEA delivery at Kudelski Security, which he joined 5 years ago.

Martin originally studied information system management (CA), followed by operational risk management (US) and criminology (UK) complemented by executive education at Harvard Business School and at the Center for Creative Leadership. He holds CISSP, CISM, ISO 27001 and OCEG certifications. He focusses on enterprise security strategy definition, cyber intelligence and on top of certification classes, teaches innovation and business modelling in various Swiss universities.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights