mob-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Mobile

Disseminating Cyberthreat Intelligence to Enhance Information Security

Today, cyberthreat intelligence is used by organizations across the globe to increase the stability of their security postures, and the exchange of threat intelligence has become increasingly important. Existing cyberthreat intelligence resources are largely open source (or publicly available), an architecture that helps the cybersecurity community better understand security risks and develop preventive and response plans to address them. The current manuscript provides insights into the role and importance of threat intelligence and explains the modes available for business and security teams to obtain reliable intelligence on the evolving cyberthreat landscape. Though the essential building blocks of cyberthreat intelligence are expected to remain largely the same moving forward, the threat intelligence dissemination process could be further improved using emerging technologies like blockchain. The manuscript also briefly discusses the threat intelligence platforms that are currently available and the limitations of cyberthreat intelligence.

Please Fill Out This Form to Download the White Paper

About the Author

Susan Villaquiral Cortés

Susan Villaquiral Cortés

Chief Information Security Officer and Chief Operating Officer at ArkNova SAS

Susan Villaquiral Cortés currently heads the security efforts at ArkNova S.A.S as a Chief Information Security Officer and Chief Operating Officer. With her experience as a telecommunications engineer, Susan has expertise in defining and managing information security and cybersecurity strategies. She has greater experience working with cybersecurity strategies for critical infrastructure such as healthcare, project management, and IT infrastructure high availability assurance. Susan’s current research interest involves threat intelligence for securing networks which include elements such as but not limited to, indicator identification, tactics and procedures for intelligence collection and assessment, tool configuration, and intelligence reporting.