
Sign up to save your podcasts
Or
In episode 71 of The Cyber5, guest Nisos moderator and teammate Matt Brown is joined by security practitioner Matt Nelson.
They talk about a recent intelligence blog Matt Nelson wrote about how to operationalize intelligence for the SOC and some outcomes that an incident response team looks for from intelligence. They also talk about how to make intelligence more broadly used for investigations and discuss the intelligence market more holistically.
Three Key Takeaways:
1) Threat Intelligence Augments Threat Hunting in the Security Operations Center (SOC)
Intelligence requirements are critical throughout the business and not just limited to the SOC. Threat intelligence can be a significant help to the threat hunting and detection team. The outcomes that threat hunting teams generally look for are:
2) Evolving Threat Intelligence Beyond the SOC
Threat intelligence is not just cyber news or indicators of a compromise (IoC) feed. Threat intelligence is useful for insider threat, fraud, platform abuse, corporate intelligence, and supply chain risk.
3) Single Data Aggregators for Enterprises (SIEMs, TIPs, MISP) Aren’t the Panacea
5
2323 ratings
In episode 71 of The Cyber5, guest Nisos moderator and teammate Matt Brown is joined by security practitioner Matt Nelson.
They talk about a recent intelligence blog Matt Nelson wrote about how to operationalize intelligence for the SOC and some outcomes that an incident response team looks for from intelligence. They also talk about how to make intelligence more broadly used for investigations and discuss the intelligence market more holistically.
Three Key Takeaways:
1) Threat Intelligence Augments Threat Hunting in the Security Operations Center (SOC)
Intelligence requirements are critical throughout the business and not just limited to the SOC. Threat intelligence can be a significant help to the threat hunting and detection team. The outcomes that threat hunting teams generally look for are:
2) Evolving Threat Intelligence Beyond the SOC
Threat intelligence is not just cyber news or indicators of a compromise (IoC) feed. Threat intelligence is useful for insider threat, fraud, platform abuse, corporate intelligence, and supply chain risk.
3) Single Data Aggregators for Enterprises (SIEMs, TIPs, MISP) Aren’t the Panacea