Modern field guide to security and privacy

Introduce intelligence to your security operations

Lockheed Martin is working to address cybersecurity threats by developing more robust security centers.

|
Lockheed Martin

Traditional security operations centers (SOCs) have done well protecting against traditional attacks. The problem is that in today’s threat landscape, characterized by advanced persistent threats (APTs), a traditional SOC misses the mark. We now require a heightened level of security that brings intelligence analysis and knowledge management to the forefront. A security intelligence center (SIC) empowers organizations to address these threats before they cause harm, rather than merely reacting to them. If the data has been taken, a reaction will only do so much.

The cornerstone of a successful SIC is an intelligence driven-defense framework. This presents organizations with a clear strategy for addressing rising threats head-on. Intelligence driven defense emphasizes solutions and tradecraft beyond individual incidents and leverages intelligence analysts rather than relying on vendors and reaction to security alerts. This allows analysts to stay ahead of the adversaries.

The Cyber Kill Chain, key to the intelligence driven defense, is also integral to the success of a SIC. It describes seven phases of intrusions and represents our approach for defeating advanced persistent threats. Although these threats represent a smaller percentage of network intrusions, they are the most difficult to detect and are potentially the most damaging. 

Lockheed Martin

There are many advantages to applying the Cyber Kill Chain and moving to intelligence-driven defense, such as: 

  • Prioritize Sensor Alerts – Focus on warnings further along the Cyber Kill Chain, as those are the most likely events that will lead to the worst breaches.
  • Determine Escalation – Not all breaches are equal: Delivery of a malicious email is not as critical as active command and control between an adversary and an infected enterprise machine. This aides in determining which events to to communicate to senior management.
  • Measure Effectiveness – An enterprise is more effective when it stops attacks earlier in the chain.
  • Determine Resiliency – Are you secure against an attacker against multiple steps of the Cyber Kill Chain, or if a previous attacker changes one aspect of their attack profile will they succeed the next time?
  • Maximize Investment – Be sure to compare tools or solutions against each other.  If they are both designed to stop at the same stage in the attack, do you view them in this light, or do you just see more tools as enabling “greater security” and fail to make the shrewdest investment decisions?
  • Measure Analytic Completeness – After an attack, rather than celebrating the success, play out the rest of the attack to see what would happen next and build resilient systems accordingly.
  • Identify and Track Campaigns – Do you understand discrete events and determine when the same adversary and tactics are involved?  While this is a higher-order of maturity in network operations, it is attainable when a team properly leverages the Cyber Kill Chain and intelligence-driven defense.

The good news is a SIC gives the defenders the ability to win. Despite countless attempts on strategically valuable assets (as encountered by Lockheed Martin every day), using intelligence analysis gives defenders the upper hand. But that advantage does not just come from using the best tools — it comes from skilled analysts who know how to employ those best tools and information that can be gleaned from intelligently defending the enterprise.

Greg Boison is the Director of Lockheed Martin’s Homeland & Cybersecurity line of business. This diverse portfolio includes capabilities in systems integration, software development, enterprise IT, credentialing, biometrics, and cybersecurity. Follow Greg on Twitter @gregboison.

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to Introduce intelligence to your security operations
Read this article in
https://www.csmonitor.com/World/Passcode/2015/0930/Introduce-intelligence-to-your-security-operations
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe