Imagine that you’ve been tasked with investigating a dense cave system to see if there are dangers inside, but when you ask for a light source or a map to help you navigate through the darkness, you’re told those aren’t available. Good luck?
Unfortunately, that scenario isn’t so far removed from what many IT security professionals experience on a daily basis when it comes to investigating cyberattacks and vulnerabilities.
According to a recent study by CyberRisk Alliance, just 39% of IT decision-makers work in organizations where threat intelligence is used to prevent or mitigate attacks.
For every 10 security teams, in other words, about six lack access to a disciplined methodology to help make sense of what’s lurking on their attack surface.
Fortunately, that’s not the end of the story. Fifty-five percent of respondents said there are plans to build a threat intelligence program in the next 12 months. But what does that building process look like? Moreover, what do organizations need to pull it off effectively when resources are few and far between?
Focal points for building an effective threat intelligence program
The CRA survey asked respondents what they think their organization “needs the most help with in order to effectively implement a threat intelligence program.” Below, we’ve included their top recommendations and challenge areas they believe merit special attention in the months ahead.
For more insights on how IT security leaders are planning their threat intelligence agenda for 2024, download the full survey report here.