Security Intelligence: Driving Security From Analytics To Action
Security Intelligence: Driving Security From Analytics To Action
Security Intelligence:
Driving Security From Analytics to Action
Table of Contents
3
Too often, intelligence and security are out of sync.
Teams and objectives are siloed, analysis lacks relevance,
and the response is slow and reactionary — resulting
in lost time and resources. Of course, the alignment of
intelligence and security is precisely where organizations
can see some of their most dramatic operational gains,
whatever the security or risk initiative may be. When
we take a unified approach by embedding analytics and
automation into the core of everyday security workflows
and decision-making, security intelligence and its outputs
can transform security and make the greatest impact.
4
Security Intelligence: By Design
Functionally, security intelligence is a method by which data and insights are collected,
analyzed, and automated to accelerate distinct security systems and functions. More
than that, it’s a mindset; a philosophy for how intelligence can drive every security
initiative and strategic decision. In the same vein as other “by design” doctrines, security
intelligence brings automation and insight to the forefront of every facet of security,
including strategic planning, technical design and architecture, and implementation
and execution.
Security intelligence enables organizations to build, store, and reapply common insights
and operational workflows wherever possible — rather than starting from scratch each
time. As security intelligence expands to additional functions and stakeholders, the
organization maintains institutional knowledge and the data and insights grow more
robust for every security initiative.
5
Common Approach, Meaningful Outcomes
With a common process and framework underlying security intelligence, the business
benefits and security outcomes also share similarities for any security, risk, or
threat initiative it supports. In particular, security intelligence benefits fall into three
primary categories:
Business, risk, and stakeholder alignment. Security intelligence only works when
the data and operational outputs are specifically tailored and relevant to you: Your
organization, your people, your processes and procedures, and your assets, threats,
and risk tolerance. Among the scores of metadata, security intelligence relies on
three contextual lenses that appropriately set its scope and purpose:
When applied and analyzed from this perspective, security intelligence enables you
to more accurately assess and respond to risk, automatically prioritize CVEs based on
threat severity, and filter out noisy threat feeds and hacker chatter to minimize false-
positives and enrich more important investigation and response.
6
Supercharge 6 Critical
Security Solution Areas
7
Intelligence is no longer a side project or siloed within a
threat intelligence team. Security intelligence supports
a wide range of roles and functions across all security
activities, including physical and information security,
fraud, IT, risk, compliance, executive reporting, and more.
8
Given the diverse array of security intelligence use-cases, you need to treat security
intelligence not as one tool, but as a modularized solution capable of extending to
distinct security activities. The core capabilities lay a common foundation for security
intelligence, typically including the collection, analysis, scoring, automation, integration,
and dashboards and reporting. Then, solution-specific functionality augments the
platform and tailors it to the unique needs and activities of one or more distinct security
intelligence solution areas. These solution areas are listed alphabetically here:
Brand Protection. From phishing attacks, to stolen PII, to fake mobile apps and
social media accounts — how far does your attack surface extend and where
has your data leaked? Security intelligence equips organizations with continuous
visibility to monitor and detect new cases of unsanctioned mentions, data leaks,
and impersonations of your corporate brand. Security intelligence, however, doesn’t
end at the detection of brand threats — it also streamlines the takedown and
remediation steps on your behalf.
Geopolitical Risk. Discover how physical threats manifest, and often mirror,
online threat activity. Applying geodata and other location-based analytics, security
intelligence acts as your eyes and ears online. It keeps watch of your physical
assets and facilities providing early signals of planned attacks, protests, and acts
of terror. Security intelligence also serves as a physical protection layer, delivering
alerts about your executives and key personnel who may be high-value targets in
kidnapping, extortion, or other scenarios where their physical safety and well-being
may be at risk.
9
Third-Party Risk. Even the best, most-exhaustive vendor questionnaires and
controls are not enough to manage third-party risk today. The data becomes
obsolete when it’s returned, and gaps in responses and evidentiary materials turn
risk prioritization and heat map exercises into a game of darts. Security intelligence
fills these gaps. It supplements what you know about your third-parties with deeper,
primary-sourced data and risk analysis. With this information at your fingertips, you
can make immediate, better-informed decisions about third-party risk and what to
mitigate when it’s needed — without waiting weeks for responses.
10
One Plus One Equals Three
It’s important to note that all six security intelligence solution areas operate entirely
independent of the other five. So, no matter which solutions you put into action, you
get the same high-quality capabilities and alerts. Even better, when you extend security
intelligence to additional solution areas, they feed into each other by sharing the data,
context, and integration across multiple solutions.
Implementing additional solutions will increase the value of your security intelligence
exponentially. For instance, here’s how you may find that your third-party risk solution
augments the capabilities and insight of your existing brand protection activities: Let’s
say you’re conducting a third-party risk review and you identify a particularly concerning
risk event for one of your strategic partners. You discover that they had a data breach
that could damage your company’s reputation because the incident resulted in your
partner leaking sensitive data that your customers entrusted to your organization. The
complementary nature of security intelligence solutions adds value both as a discrete
solution and as an aggregate, resulting in new economies of scale as it expands.
11
Security Intelligence That
Fits Your Organization
12
Security intelligence easily scales up and down to match
the size, maturity, and specific needs of any organization.
Whether you’re new to the technology and still identifying
your goals, or you’re a longstanding proponent with
aggressive expansion plans, security intelligence adapts
to your needs and priorities. Recorded Future’s modular
security intelligence solutions ensure it’s easy to adopt
additional solutions to adapt over time without arduous
implementations or steep learning curves.
13
Think Big, Start Smart
Practically every security function can extract value from the exponential benefits and
technical advantages of a robust security intelligence program. Take this into account as
you determine your implementation strategy with clear priorities in mind and ideas for
who will benefit the most right out of the gate. Six, 12, 18 months from now, how do you
want your organization to be using security intelligence? What will it take to get there?
Starting smart is about starting with purpose — not just speed — in mind. Whether
you want to implement a single security intelligence solution area or all six, the most
successful organizations we see tend to begin in similar fashion — with a clear, concerted
approach based on a set timeline. Adopt an agile mindset for both your security
intelligence rollout and ongoing activities. Doing so will keep you dynamic and poised to
shift as quickly as your adversaries.
14
Kick Off With Quick Wins
15
Wherever you are in your security intelligence journey, there are easy, practical steps
that will ensure you get the most from security intelligence. When you begin your next
security intelligence project, make sure you:
Identify success metrics and reports early on. Assign performance metrics
for security intelligence prior to launching new capabilities. You may elect to
benchmark your mean-time-to-remediate (MTTR) new threats, the number of
alerts that are enhanced with intelligence, or how many feeds are being ingested.
Alternatively, you could measure analyst efficiency. For example, one study shows
that Recorded Future improved customers’ security workflows by 50%. If you expect
similar efficiency gains given the size and scope of your security intelligence and
automation plans, you can track a similar percentage gain for your organization.
As long as the metrics you set are based on realistic assumptions, you will have a
valuable barometer to continuously mature your program over time.
Recognize the ROI. You will see nearly instantaneous returns on your initial
investments into security intelligence. In fact, an independent analysis conducted
by Forrester found that Recorded Future customers have seen 328% ROI on their
security intelligence improvements. With a short, 3-month payback period and
high ROI, articulating the value in terms of business benefit should help you gain
internal buy-in.
Identify opportunities with the security tools you already use. Integrating
security intelligence into your existing technologies and applications is an excellent
first step. This minimizes the disruption to existing work streams and adds net-
new capabilities that accelerate or enhance the outputs of the existing work being
done. Recorded Future works with all of the leading security technology providers
to offer quick, templated integrations for solutions in categories like SIEM, SOAR, IR,
EDR, GRC, and many more. For even further integration and system customization,
Recorded Future provides robust, bi-directional RESTful APIs to support your work
the way you need it.
16
Reach Higher With Security Intelligence
Security intelligence is the cyber fuel you need to power and propel your security
forward. Use it to extend your visibility, to elevate your output, and to automate your
response for any or all six solution areas.
As you embed security intelligence more broadly throughout your organization, the
returns you see will begin to grow exponentially within and across each solution.
Whatever your priorities, security intelligence will evolve with them to amplify your risk
reduction efforts and drive you — your team, your objectives, your business — to reach
even higher echelons of performance and efficiency.
Recorded Future arms security teams with the only complete security
intelligence solution powered by patented machine learning to lower risk. Our
technology automatically collects and analyzes information from an unrivaled
breadth of sources and provides invaluable context in real time and packaged
for human analysis or integration with security technologies.
www.recordedfuture.com
© Recorded Future, Inc. All rights reserved. All trademarks remain property of their
@RecordedFuture
respective owners.
17