Taking Action with Threat Intelligence


Town Hall Insights
Chicago CISO Community

Anthony Lauro

Director, Security Technology and Strategy

Akamai Technologies

PRESENTER

Todd Covert

National General CISO

Allstate

DISCUSSION LEADER

Jeff Deakins

Director, IT Security (CISO) and Infrastructure

The Marmon Group

DISCUSSION LEADER

Nitin Raina

CISO

ThoughtWorks

DISCUSSION LEADER

Elizabeth Ogunti

CISO

JBT Corporation

DISCUSSION LEADER

Paolo Vallotti

CISO & VP of Operations

Tate & Lyle

GOVERNING BODY HOST
MARCH 2023

Cybersecurity threats don't take time off. And with challenges like varying budgets, staffing and technologies, CISOs must react and adapt accordingly to ensure their SOC is performing effectively. This requires that security leaders gain deep visibility into assets, access, and network flows, and have an eye on security policy enforcement down to a granular level.

How can they share information internally about threat intelligence and ransomware attacks in a useful manner? Top CISOs from the Chicago CISO community came together in a recent Town Hall to discuss how to take action with threat intelligence and communicate the risks in an appropriate way to C-suite colleagues and board members.

Anthony Lauro, Director, Security Technology and Strategy at Akamai Technologies, set up the discussion, with Todd Covert, National General CISO at Allstate, Nitin Raina, CISO at ThoughtWorks, Elizabeth Ogunti, CISO at JBT Corporation, Jeff Deakins, Director of IT Security (CISO) and Infrastructure at The Marmom Group, and Paolo Vallotti, CISO and Vice President of Operations at Tate & Lyle, leading the small group breakout discussions.
 

Providing the Right Level of Visibility on Threats and Risks

Anthony Lauro started the discussion about the challenges to providing internal visibility as it relates to threat intelligence. He noted that the head of a SOC might be very technical, which does not translate as well to those leaders with more business acumen. CISOs have to think about people who can up-level the information to those who need it – or consider providing updates that range from technical to business-oriented. 

He also said that in order to protect a modern enterprise from cloud-introduced threats, security leaders should share information in order to create a complete picture of the threats. Finally, CISOs must think in terms of a ‘threat-hunting road map’ to ensure that you are gathering intelligence, building fences, fostering good vendor partnerships, and preparing your team for when an attack takes place.


Key Takeaways from the Discussion on Threat Intelligence

  • Share relevant metrics about risk.
    One group noted that C-level executives want the security team to quantify the risk so they can make further decisions, such as whether or not to push out a product update or hold off. They want to compare the potential cost of the risk versus the potential cost of missing out on offering something new, so they can be “doubly sure the changes are appropriate,” as one CISO said.

Another group added that metrics need to be provided at the level the board or stakeholder is interested in. One CISO shared that you might put together an intelligence report, and the SOC is ready to close the book, while business leaders think it needs more work and quantification of risks. It’s a challenge to share at the right level in the right format in which all stakeholders can consume it.
 

  • Create filters for your threat intelligence
    CISOs agreed that they get threat intel from different feeds – but some of it is “noisy data” that they can’t act on. It’s critical to filter out the noise and find the areas that are actionable. As one CISO put it, “What kind of filters can I put into place to get rid of the noise on the internet?”

They noted that if their teams are looking for a needle in the haystack, they need to “filter out the hay” so that their efficacy is increased, and they are enabling their teams to look only at legitimate issues. As another security leader said, “We don’t need to see every single alert unless it is deemed important.”
 

  • Understand your organization’s risks and vulnerabilities.
    CISOs discussed how critical it is to know your unique risks so that you prioritize the right security controls. They agreed that it was important to focus on the basics and the biggest risks and not to “lose the context and focus on the wrong controls.” Another executive added, “Before you start searching for more threats, understand your risks and vulnerabilities.”

CISOs also said that as you are building out your threat intelligence capability, there comes a point at which you have to test and evaluate how you are doing. Another security leader added that it’s necessary to conduct continuous assessments of your security posture.
 

CISOs in the group recommended having champions around your organization – such as your senior counsel or risk management leaders – who will back you up when it comes to reporting on risks. Automation was also a topic that came up, as security leaders are looking to automate certain tasks that will free their team up to focus on more important areas.

To continue the discussion on cybersecurity, threat intelligence and communicating risk, join a CISO community near you, or check out our calendar for opportunities to get together in person and virtually with your CISO peers.
 


by CISOs, for CISOs
 


Join the conversation with peers in your local CISO community.

LEARN MORE