Tuesday, December 6 2022

Is Sharing Caring?, a report on current cyber threat intelligence networking practices, results, and attitudes is now available.

For context, an excerpt of the introduction is below.

This article appeared in on the Pulsedive blog and has been published here with permission from the author.

Introduction

Cyber threat intelligence (CTI) is a growing space, with an industry-wide consensus that teams cannot effectively operate in an intelligence silo. In support of improved CTI sharing, stakeholders have invested in research and development efforts around cross-boundary collaboration, technical standardization, managing trust, and reporting best practices.

Yet, there’s a lack of clarity around how professionals can most effectively network. The conventional wisdom amongst practitioners is that CTI networking is achieved through trial & error and on an individual basis. Threat intelligence platform Pulsedive reached out to practitioners to capture their CTI networking experiences.

Objective

Benchmark CTI networking practices, results, and attitudes to provide
data-driven insights around how different methods stack up, how and why individuals participate, and the role organizations play.

[CTI Networking] is an untapped area for a lot of organizations… they are still very siloed when it comes to intelligence sharing.

This research serves as a starting point for more informed discussions around CTI networking. Our goal in openly sharing this knowledge is to encourage intentional, inclusive, and strategic approaches in the community. The questions we answer address lively debates currently only supported by anecdotal evidence, like: How do old-fashioned 1-to-1 DMs compare to invite-only Discords, paid memberships, and Twitter? What methods helped detect an attack or contributed to remediation? What’s more valuable—raw data or finished intelligence? To whom?

During the [redacted] breach… We didn’t realize it was [redacted APT] until [reaching out to Trust Groups] helped connect the dots for us. That made a MAJOR change in the investigation and helped kick our IR into gear… the event was over 3,000 human work hours. Much of what we did for remediation was based on what we learned in speaking to others.

Audience

This report is intended for four audience segments: management responsible for security program strategy to gain awareness on best practices, areas of friction, and organizational challenges; current CTI practitioners looking to optimize their networking efforts and understand peer experiences; security and intelligence professionals in related fields seeking to expand their involvement in CTI; and professionals entering or pivoting into CTI careers, to demystify what it means and how to participate.

Do not be afraid to bring new ideas to the table. I think we are afraid of being wrong or looking incompetent… Discussing new ideas, brainstorming, and sharing only makes us stronger.

Bonus: Presentations

SANS CTI Summit – January 28, 2022
SANS CTI Summit Slides – Is Sharing Caring? by Grace Chi

CactusCon10 – February 4, 2022
CactusCon10 – Sharing is Caring by Grace Chi

Previous

Netacea Closes $12M Series A Funding Round

Next

IoT Security Firm Phosphorus Cybersecurity closes $38M Series A Funding Round

Check Also

Widget

Don’t Miss

Cyber Deals: Spin Technology, CyberArk, Mesh Security

James Hu

Cybersecurity Venture Funding and Mergers: This week’s deals involved cloud security services, data privacy, and industrial cybersecurity companies. Funding Cloud cybersecurity firm Mesh Security has secured $4.5 million in venture funding. The round was led by Booster Ventures with participation from other investors. Spin Technology, a firm providing SaaS security solutions, raised $16 million in […]

Cyber Deals: Cybrary, Ping Identity, Axio Global

James Hu

Cybersecurity Venture Funding and Mergers: Key investments were made in cybersecurity training, secure enterprise browser, and risk management companies. M&A activity this week involved identity security, zero trust, and threat intelligence firms. Funding Cybrary, a cybersecurity training platform, raised $25 million in a Series C funding round. The round was led by BuildGroup and Gula […]

Cybrary Secures $25 Million in Series C Funding Round

James Hu

Cybrary, a Maryland-based cybersecurity training platform provider, raised $25 million in a Series C funding round. The round was led by BuildGroup and Gula Tech Adventures, two of its current investors. Following its $15 million Series B round announced in November 2019, this latest investment brings Cybrary’s total funding to date to $48 million. Cybrary […]

Cyber Deals: Exterro, Naoris Protocol, Cybit Sec

James Hu

Cybersecurity Venture Funding and Mergers: This week, notable funding and M&A activity involved compliance, enterprise security, and vulnerability assessment firms. Funding Exterro, a legal governance, risk, and compliance software provider, completed a strategic recapitalization valuing the firm at over $1 billion. The company, currently owned by Leeds Equity Partners, is targeting a potential 2023 initial […]

Cyber Deals: Halborn, Irideos, Anvilogic

James Hu

Cybersecurity Venture Funding and Mergers: This week, cybersecurity venture funding and M&A activity involved blockchain, artificial Intelligence, and SaaS solution providers. Many of these deals will also be funding the future of cloud security. Funding Halborn, a blockchain cybersecurity firm, raised $90 million in a Series A funding round led by Summit Partners with participation […]

Huntress acquires Curricula for $22 million

James Hu

Huntress, a cybersecurity firm providing a security management platform to small and medium sized businesses, has acquired Curricula, a security awareness training service provider, for $22 million. Curricula is a freemium SaaS company offering solutions for employee cybersecurity training. Their methods incorporate behavioral learning techniques and engaging storytelling to maximize employee engagement. Small and medium […]