Unlocking the power of threat intelligence infused detections in the SOC

Tuesday
 
26
 
November
2:25 pm
 - 
3:05 pm

Speakers

Ray Huang

Ray Huang

Senior Security Solution Architect - APAC
Splunk Inc.

Synopsis

Threat Intelligence can be a valuable source of enrichment to enrich detections and use cases for SOC monitoring purposes. Not only do they provide external perspectives of threats happening in the wild, but they can also provide proactive early warnings to aid in pre-emptive responses before a threat evolves into a real incident within organizations. That is provided that the threat intelligence are properly optimised to fit with the detection planning process of the security operations.

From the bustling marketplace of vendor created premium threat intelligence to community-driven initiatives of open-source intelligence (OSINT), the array of available threat intelligence sources is vast and diverse.However, navigating this abundance presents a formidable challenge. It is impossible to integrate every threat intel feed into the SOC as this is not only commercially costly, but will also potentially generate volumes of false positives that can result in analyst fatigue.

The core traits of good threat intelligence are Completeness, Accuracy, Relevance and Timeliness. Although these are simple to understand terminologies, trying to achieve them can be quite challenging. These core traits could be achieved through proper planning, selection and integration of various external premium threat intel sources and OSINT through some sort of threat intelligence workflow, but for a higher level of achievement, some sort of internal threat source (e.g. threat-hunting outputs) should absolutely be considered.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country