How cyberthreat intelligence strengthens defense against cyberattacks

A new briefing report advises government IT leaders on how to gain an upper hand against cyber threats by leaning on timely, accurate and relevant information.
illustration of code for cyberthreat intelligence
(FedScoop, CyberScoop, StateScoop)

For agency officials looking to build greater resiliency into their IT operations, security experts stress the growing importance of adopting sound cyberthreat intelligence practices to get out ahead of security risks, according to a new report.

Federal agencies face a wide range of challenges addressing cybersecurity concerns. However, utilizing advanced intelligence about the adversaries likely targeting your agency, and the tactics they’re inclined to use, can be instrumental in shrinking the time between incident and response, according to the report from FireEye.

FedScoop, CyberScoop, StateScoop report on cyber intelligence

Download the full report.

The new special report gives IT security teams and leaders recommendations on how to shift from a reactive posture to a proactive approach by incorporating cyber threat intelligence into daily IT operations.

“At the end of the day, organizations are not in business to defend themselves. They have a different mission. For cyber, every organization needs to mitigate the right amount of risk in the most effective and cost-efficient way. And that means they have a focus on the threats that matter the most,” said Tom Topping, FireEye’s senior director of federal strategic programs and initiatives.

Cyber threat intelligence is one resource that gives a high return on investment, by helping agencies focus on the threats that matter most, he said. But to achieve a higher return, agency officials need to ensure that their threat intelligence meets four criteria:

  • Is it relevant to your organization?
  • Is it timely?
  • Is it accurate?
  • Is it presented in a way that’s actionable?

Cyber threat intelligence helps agencies know if they are at risk to become a victim. The most valuable intelligence won’t only tell you “what has already happened elsewhere, but what may be happening today or tomorrow,” added Tom Guarente, senior director at FireEye.

By detecting specific types of attacks that adversaries are using on organizations similar to your own, IT security leaders can leverage their resources more effectively. Agencies won’t be able to protect everything all the time, but if their focus remains on the most critical data and systems, they can deter threat actors from doing serious damage.

“Today, the name of the game is effective and efficient use of time and resources to focus on the actual threats and threat actors targeting your organization,” the report states. When intelligence can instigate conversation with leadership on risk management, it can assist to shifting budget dollars to those on the front line of attacks.

Download the special report, “How agencies can leverage ‘cyber intelligence’ to transform cybersecurity operations” to read more about proactive measures to guard from cyberattacks.

This article was produced by FedScoop for, and sponsored by, FireEye.

Latest Podcasts