Integrating Threat Intelligence to Enhance an Organization's Information Security Management

被引:6
|
作者
Gschwandtner, Mathias [1 ]
Demetz, Lukas [2 ]
Gander, Matthias
Maier, Ronald [3 ]
机构
[1] Leopold Franzens Univ, Innsbruck, Tirol, Austria
[2] Univ Appl Sci FH Kufstein, Kufstein, Tirol, Austria
[3] Leopold Franzens Univ, Dept Informat Syst Prod & Logist Management, Innsbruck, Tirol, Austria
关键词
focus group discussion; information security; threat intelligence; vulnerability management;
D O I
10.1145/3230833.3232797
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As security incidents might have disastrous consequences on an enterprise's information technology (IT), organizations need to secure their IT against threats. Threat intelligence (TI) promises to provide actionable information about current threats for information security management systems (ISMS). Common information range from malware characteristics to observed perpetrator origins that allow customizing security controls. The aim of this article is to assess the impact of utilizing public available threat feeds within the corporate process on an organization's security information level. We developed a framework to integrate TI for large corporations and evaluated said framework in cooperation with a global acting manufacturer and retailer. During the development of the TI framework, a specific provider of TI was analyzed and chosen for integration within the process of vulnerability management. The evaluation of this exemplary integration was assessed by members of the information security department at the cooperating enterprise. During our evaluation it was emphasized that a prioritization of management activities based on whether threats that have been observed in the wild are targeting them or similar companies. Furthermore, indicators of compromise (IoC) provided by the chosen TI source, can be automatically integrated utilizing a provided software development kit. Theoretical relevance is based on the contribution towards the verification of proposed benefits of TI integration, such as increasing the resilience of an enterprise network, within a real-world environment. Overall, practitioners suggest that TI integration should result in enhanced management of security budgets and more resilient enterprise networks.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] INFORMATION SECURITY RISK MANAGEMENT: AN INTELLIGENCE- DRIVEN APPROACH
    Webb, Jeb
    Maynard, Sean
    Ahmad, Atif
    Shanks, Graeme
    [J]. AUSTRALASIAN JOURNAL OF INFORMATION SYSTEMS, 2014, 18 (03) : 391 - 404
  • [22] THE ORGANIZATION AND MANAGEMENT OF INFORMATION SECURITY ISSUES IN HEALTH-CARE
    LOUWERSE, CP
    [J]. INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1994, 35 : 195 - 200
  • [23] Holistic information security management in multi-organization environment
    Wiander, Tirno
    Savola, Reijo
    Karppinen, Kaarina
    Rapeli, Mikko
    [J]. 2006 IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS, VOLS 1-7, 2006, : 2942 - 2947
  • [24] Information wars as a threat to the information security of Ukraine
    Sopilko, Iryna
    Svintsytskyi, Andrii
    Krasovska, Yevheniia
    Padalka, Andrii
    Lyseiuk, Andrii
    [J]. CONFLICT RESOLUTION QUARTERLY, 2022, 39 (03) : 333 - 347
  • [25] Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle
    Zacharis, Alexandros
    Katos, Vasilios
    Patsakis, Constantinos
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (04) : 2691 - 2710
  • [26] Information Security Management: A Case Study in a Portuguese Military Organization
    Martins, Jose
    dos Santos, Henrique
    Rosinha, Antonio
    Valente, Agostinho
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 32 - 48
  • [27] Cyber Security Threat Intelligence Monitoring and Classification
    Wang, Bo-Xiang
    Chen, Jiann-Liang
    Yu, Chiao-Lin
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2021, : 70 - 72
  • [28] Risk management system as the basic paradigm of the information security management system in an organization
    Hoffmann, Romuald
    Kiedrowicz, Maciej
    Stanik, Jerzy
    [J]. 20TH INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATIONS AND COMPUTERS (CSCC 2016), 2016, 76
  • [29] Cyber threat intelligence for critical infrastructure security
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Mori, Paolo
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23):
  • [30] A Threat Intelligence Tool for the Security Development Lifecycle
    Kannavara, Raghudeep
    Vangore, Jacob
    Roberts, William
    Lindholm, Marcus
    Shrivastav, Priti
    [J]. PROCEEDINGS OF THE 12TH INNOVATIONS ON SOFTWARE ENGINEERING CONFERENCE (ISEC), 2019,