Integrating Threat Intelligence to Enhance an Organization's Information Security Management

被引:6
|
作者
Gschwandtner, Mathias [1 ]
Demetz, Lukas [2 ]
Gander, Matthias
Maier, Ronald [3 ]
机构
[1] Leopold Franzens Univ, Innsbruck, Tirol, Austria
[2] Univ Appl Sci FH Kufstein, Kufstein, Tirol, Austria
[3] Leopold Franzens Univ, Dept Informat Syst Prod & Logist Management, Innsbruck, Tirol, Austria
关键词
focus group discussion; information security; threat intelligence; vulnerability management;
D O I
10.1145/3230833.3232797
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As security incidents might have disastrous consequences on an enterprise's information technology (IT), organizations need to secure their IT against threats. Threat intelligence (TI) promises to provide actionable information about current threats for information security management systems (ISMS). Common information range from malware characteristics to observed perpetrator origins that allow customizing security controls. The aim of this article is to assess the impact of utilizing public available threat feeds within the corporate process on an organization's security information level. We developed a framework to integrate TI for large corporations and evaluated said framework in cooperation with a global acting manufacturer and retailer. During the development of the TI framework, a specific provider of TI was analyzed and chosen for integration within the process of vulnerability management. The evaluation of this exemplary integration was assessed by members of the information security department at the cooperating enterprise. During our evaluation it was emphasized that a prioritization of management activities based on whether threats that have been observed in the wild are targeting them or similar companies. Furthermore, indicators of compromise (IoC) provided by the chosen TI source, can be automatically integrated utilizing a provided software development kit. Theoretical relevance is based on the contribution towards the verification of proposed benefits of TI integration, such as increasing the resilience of an enterprise network, within a real-world environment. Overall, practitioners suggest that TI integration should result in enhanced management of security budgets and more resilient enterprise networks.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Integrating information security and intelligence courses
    Hutchinson, W
    [J]. SECURITY EDUCATION AND CRITICAL INFRASTRUCTURES, 2003, 125 : 75 - 83
  • [2] Developing intelligence-based threat definitions for global information security management
    Korzyk, AD
    [J]. INFORMATION TECHNOLOGY AND ORGANIZATIONS: TRENDS, ISSUES, CHALLENGES AND SOLUTIONS, VOLS 1 AND 2, 2003, : 862 - 864
  • [3] An Enhanced Threat Intelligence Driven Hybrid Model for Information Security Risk Management
    Amin, Habib E. L.
    Samhat, Abed Ellatif
    Chamoun, Maroun
    Oueidat, Lina
    Feghali, Antoine
    [J]. PROCEEDINGS 2024 IEEE 25TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, WOWMOM 2024, 2024, : 5 - 12
  • [4] Towards Collaborative Cyber Threat Intelligence for Security Management
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Dimitrakos, Theo
    [J]. ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 339 - 346
  • [5] Acquiring Cyber Threat Intelligence through Security Information Correlation
    Settanni, Giuseppe
    Shovgenya, Yegor
    Skopik, Florian
    Graf, Roman
    Wurzenberger, Markus
    Fiedler, Roman
    [J]. 2017 3RD IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2017, : 415 - 421
  • [6] Integrating Information Security into Quality Management Systems
    Stoll, Margareth
    [J]. TECHNOLOGICAL DEVELOPMENTS IN NETWORKING, EDUCATION AND AUTOMATION, 2010, : 455 - 460
  • [7] Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems
    Amthor, Peter
    Fischer, Daniel
    Kuehnhauser, Winfried E.
    Stelzer, Dirk
    [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [8] The Value of data sets in Information and Knowledge Management as a Threat to Information Security
    Zywiolek, Justyna
    Schiavone, Francesco
    [J]. PROCEEDINGS OF THE 22ND EUROPEAN CONFERENCE ON KNOWLEDGE MANAGEMENT (ECKM 2021), 2021, : 882 - 891
  • [9] Integrating a Security Operations Centre with an Organization's Existing Procedures, Policies and Information Technology Systems
    Mutemwa, Muyowa
    Mtsweni, Jabu
    Zimba, Lukhanyo
    [J]. 2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 177 - 182
  • [10] Integrating Physical Programming to Information Security System Management
    Kongsuwan, Pauline
    Shin, Sangmun
    [J]. 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 143 - 148