Unleashing the Power of Industry Threat Intelligence

An Ongoing Blog Series Highlighting Threater’s Best-In-Class Threat Intelligence
In our previous blog, we talked about the importance of Using Multi-Source Threat Intelligence to Strengthen Network Security. One critical source is industry-specific threat intelligence. With attackers commonly launching industry-specific attacks, having visibility into threats targeting your industry is critical to cyber defense. In this blog, we will take a look at industry sharing and how the Threater platform makes it simple for you to deploy industry-specific threat intelligence to protect your network.
First established in 1999 by presidential directive, Information Sharing and Analysis Centers (ISACs) and Information Sharing and Analysis Organizations (ISAOs) represent industry-specific communities of interest whose members voluntarily share cyber threat intelligence with each other. A good analogy for an ISAC/ISAO is the neighborhood watch model. In a neighborhood watch group, communities build trust, and share information and best practices with each other to increase their individual and collective security. All neighborhood watches share a foundational idea that bringing communities together promotes an increased quality of life and reduces crime.
An ISAC/ISAO serves the same purpose, connecting your business to a larger community, which may be in the same industry or region, to proactively share information on cyber threats and incidents, as well as best practices. ISACs/ISAOs collect, analyze, and disseminate actionable threat information to their members and provide tools, such as threat feeds, to mitigate risks and enhance resiliency.
With threat actors commonly launching industry-focused campaigns, industry sharing communities provide a collective approach to cyber defense allowing members to increase their visibility into industry-specific threats and improve their ability to prevent, detect, and respond to threats. The overall effect shares a foundational idea neighborhood watch group – that through these community efforts the quality of each member’s condition improves, and cybercrimes can be prevented.
Today, there are a plethora of ISACs/ISAOs that span industry, state, national, and international communities. While they operate individually, most work together under the same directive, providing cross-sharing of information for the greater good of cybersecurity. There are also efforts by organizations like Global Resilience Federation to facilitate the sharing of threat intelligence between ISACs/ISAOs.
With the list of ISAC/ISAOs long and growing, we wanted to highlight a few of the most common ones we run into among our customers.
While these are some of the more well established industry and community sharing organizations, there are also some newer efforts, we wanted to highlight. These include:
Since we know you’ve been reading our other blogs, you probably are already aware that one of the core focus areas at Threater is to provide an open platform that allows you to deploy threat intelligence from multiple sources to protect your network. Clearly, industry threat intelligence is a critical source.
The Threater platform makes it simple for users that are members of ISACs/ISAOs to integrate and take action with industry threat intelligence in real-time. As you can see in the below example, it just takes a few clicks to create an automated denied list based on industry-specific threat intelligence.
At Threater, we are constantly expanding our integrations with ISACs/ISAOs and other sources of industry-specific threat intelligence. If there is a source we don’t currently integrate with that you would like to see just let us know!
When it comes to threat intelligence Threater is all about allowing you to use best-in-class threat intelligence to secure your networks, data and users in real-time – wherever they are – on-prem, cloud, remote, or all of the above. This best-in-class comes from multiple sources including the threat intelligence data we provide “out of the box” as well as the many ways we make it easy for you to integrate threat intelligence from any source in real time.
Stay Tuned!
In our coming blogs, we will take a closer look at partner integrations with a specific focus on Threat Intelligence Platforms.
If you are interested in learning more about how organizations are using Threater to make threat intelligence actionable in a simple and scalable way join us for our upcoming webinar – Making Threat Actionable for Financial Services. We promise you don’t have to be a financial services organization to get value out of this webinar!
As always: