Page 41 - index
P. 41







Actionable Approach to Fighting Cybercrime using Cyber Threat

Intelligence


Actionable Approach to Fighting Cybercrime using Cyber Threat Intelligence


By Dennis Lee, Territory Manager North America, Blueliv



Introduction

Organizations are finding themselves in a world where having defensive controls like a firewall,
secure datacenter and stringent security policies is simply not enough. In 2014, we’ve seen
companies like JP Morgan Chase, Sony Pictures and eBay pour millions into security programs,
yet they still suffered from devastating and very public security incidents.


These organizations including private and public entities are getting tired of deploying layers of
defenses, waiting for an attack. They want to take action and stop cybercriminals and state
sponsored hackers by looking beyond their network.

One of the first steps in enabling an actionable security program is to use Cyber Threat
Intelligence to uncover threats that are lurking in the shadows. This can be accomplished by:

• Acquiring raw feeds from the Government and other private organizations.

• Knowledge sharing with other Information Security teams in your industry.

Unfortunately, this leads to having too much data which becomes difficult to manage and
ultimately non actionable. The solution is to use a Cyber Threat Intelligence platform that can
identify cyber threats targeted to your organization in real time.

Let’s explore the types of threat intelligence essential to know by using one of my customers
who’s a Global Life and Financial services entity– let’s call them XYZ Corp.

Botnet Intelligence

Entities need to identify bad cyber actors that threaten them. Many of these actors operate
command-and-control servers that can issue commands to Botnets. Botnets can passively wait
in silence or actively wreak havoc by:

• Launching dynamic and unpredictable DDoS attacks.

• Conduct large scale E-mail Spam campaigns.

• Serve as collection points for stolen data.

XYZ Corp can take action by:

41 Cyber Warnings E-Magazine – December 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   36   37   38   39   40   41   42   43   44   45   46