Sunday, February 5 2023

Is Sharing Caring?, a report on current cyber threat intelligence networking practices, results, and attitudes is now available.

For context, an excerpt of the introduction is below.

This article appeared in on the Pulsedive blog and has been published here with permission from the author.

Introduction

Cyber threat intelligence (CTI) is a growing space, with an industry-wide consensus that teams cannot effectively operate in an intelligence silo. In support of improved CTI sharing, stakeholders have invested in research and development efforts around cross-boundary collaboration, technical standardization, managing trust, and reporting best practices.

Yet, there’s a lack of clarity around how professionals can most effectively network. The conventional wisdom amongst practitioners is that CTI networking is achieved through trial & error and on an individual basis. Threat intelligence platform Pulsedive reached out to practitioners to capture their CTI networking experiences.

Objective

Benchmark CTI networking practices, results, and attitudes to provide
data-driven insights around how different methods stack up, how and why individuals participate, and the role organizations play.

[CTI Networking] is an untapped area for a lot of organizations… they are still very siloed when it comes to intelligence sharing.

This research serves as a starting point for more informed discussions around CTI networking. Our goal in openly sharing this knowledge is to encourage intentional, inclusive, and strategic approaches in the community. The questions we answer address lively debates currently only supported by anecdotal evidence, like: How do old-fashioned 1-to-1 DMs compare to invite-only Discords, paid memberships, and Twitter? What methods helped detect an attack or contributed to remediation? What’s more valuable—raw data or finished intelligence? To whom?

During the [redacted] breach… We didn’t realize it was [redacted APT] until [reaching out to Trust Groups] helped connect the dots for us. That made a MAJOR change in the investigation and helped kick our IR into gear… the event was over 3,000 human work hours. Much of what we did for remediation was based on what we learned in speaking to others.

Audience

This report is intended for four audience segments: management responsible for security program strategy to gain awareness on best practices, areas of friction, and organizational challenges; current CTI practitioners looking to optimize their networking efforts and understand peer experiences; security and intelligence professionals in related fields seeking to expand their involvement in CTI; and professionals entering or pivoting into CTI careers, to demystify what it means and how to participate.

Do not be afraid to bring new ideas to the table. I think we are afraid of being wrong or looking incompetent… Discussing new ideas, brainstorming, and sharing only makes us stronger.

Bonus: Presentations

SANS CTI Summit – January 28, 2022
SANS CTI Summit Slides – Is Sharing Caring? by Grace Chi

CactusCon10 – February 4, 2022
CactusCon10 – Sharing is Caring by Grace Chi

Previous

Netacea Closes $12M Series A Funding Round

Next

IoT Security Firm Phosphorus Cybersecurity closes $38M Series A Funding Round

Check Also

Widget

Don’t Miss

Cyber Executive Moves: Appgate, Trellix, Rubrik

Julia Bischoff

Appgate appoints a new CEO, Trellix hires loanDepot’s CISO, SANS Institute taps new CISO director. Secure access solutions provider Appgate appointed Leo Taddeo as chief executive officer and president. Taddeo stepped into the new role after serving as Appgate’s chief information security officer since February of 2022. The SANS Institute, a cybersecurity training company, appointed […]

Cyber Deals: Drata, Field Effect investments, and Veracode acquisition

Julia Bischoff

Cybersecurity venture funding and merger activity: This week’s largest deals were MDR and security automation investments, as MSP consolidation continues to attract corporate buyers. Funding Cork, Ireland-based, data encryption company Valutree acquired $12.8 million in their series A funding round, led by investors Molten Ventures and Ten Eleven Ventures. Funds will be used to expand […]

Cyber Deals: Spin Technology, CyberArk, Mesh Security

James Hu

Cybersecurity Venture Funding and Mergers: This week’s deals involved cloud security services, data privacy, and industrial cybersecurity companies. Funding Cloud cybersecurity firm Mesh Security has secured $4.5 million in venture funding. The round was led by Booster Ventures with participation from other investors. Spin Technology, a firm providing SaaS security solutions, raised $16 million in […]

Cyber Deals: Cybrary, Ping Identity, Axio Global

James Hu

Cybersecurity Venture Funding and Mergers: Key investments were made in cybersecurity training, secure enterprise browser, and risk management companies. M&A activity this week involved identity security, zero trust, and threat intelligence firms. Funding Cybrary, a cybersecurity training platform, raised $25 million in a Series C funding round. The round was led by BuildGroup and Gula […]

Cybrary Secures $25 Million in Series C Funding Round

James Hu

Cybrary, a Maryland-based cybersecurity training platform provider, raised $25 million in a Series C funding round. The round was led by BuildGroup and Gula Tech Adventures, two of its current investors. Following its $15 million Series B round announced in November 2019, this latest investment brings Cybrary’s total funding to date to $48 million. Cybrary […]

Cyber Deals: Exterro, Naoris Protocol, Cybit Sec

James Hu

Cybersecurity Venture Funding and Mergers: This week, notable funding and M&A activity involved compliance, enterprise security, and vulnerability assessment firms. Funding Exterro, a legal governance, risk, and compliance software provider, completed a strategic recapitalization valuing the firm at over $1 billion. The company, currently owned by Leeds Equity Partners, is targeting a potential 2023 initial […]