Q1. Guy, how is the use of threat intelligence evolving and maturing within enterprises? What types of organizations are using it these days and why?
First, I'm happy to be able to say that the market is maturing. It was only a few years ago when threat intelligence as a topic in security conversations was all lumped into one generic category focused on security feeds, IOC data, and event management. Today, cybersecurity practitioners are more practical with their use of threat intelligence. They're scenario-driven today, meaning they look to integrate threat intelligence capabilities to augment or fully-achieve specific security initiatives (e.g., phishing monitoring, retail fraud, or VIP or executive protection).
The companies that are most successful take an integrated approach to threat intelligence; they operationalize intelligence embedding data and process automation into existing security systems and workflows. For instance, we can agree that all security teams have a mandate to protect their organizations from phishing attacks, but most focus on protection within their network perimeter. The mature, successful security programs that we see don't stop there; they look to extend security beyond the perimeter and establish proactive mitigation measures that prevent the phishing attack before it even starts. This is, of course, where threat intelligence comes in – neutralizing threats outside the wire.
To get the most out of threat intelligence, it's important that security leaders clearly define the ways in which it will support meaningful security objectives, tied to quantifiable metrics. This degree of specificity, however, is only possible if the threat intelligence itself is tuned to the company itself. We refer to this curated approach as "tailored" threat intelligence. We bring in business context to narrow our monitoring to key digital business assets and exposures, including associated strategic and sensitive data, assets, points of presence, and people.
We've seen most Fortune 1000 companies using threat intelligence this way, but more specifically, have seen strong adoption in the financial services, retail and healthcare verticals. Again, these organizations are using threat intelligence to identify threats as early as possible and augment existing security operations and defense strategies.
Q2. Nick, what's driving IntSights' strategy to deliver a tailored intelligence offering? What exactly are you customizing?
The easy answer is that our tailored intelligence provides wider visibility and drives faster response for our customers to more effectively detect and mitigate external threats and exposures. And while that's true, when you dive deeper into the real challenges of our customers and the variety of use-cases that our threat intelligence supports, the value we're delivering to our customers is even more fundamental than that.
At the core, IntSights equips cybersecurity and threat teams with the tools and capabilities they need to enhance and extend their existing SecOps functions beyond the firewall. Tailored intelligence equips security and threat teams with the knowledge and functionality they need to automatically and rapidly assess, prioritize, and take swift action against every external threat.
This approach to threat mitigation, however, requires a major shift to today's security mindset, primarily that: Threat detection and remediation now supersede prevention. We posit that security teams spend far too much time focused on one of the two primary ways to mitigate risk, reducing the chances of an attack rather than minimizing the impact if it does. Security leaders are starting to recognize the effectiveness of this strategy when it comes major events and breaches, but rarely apply it to more common cyberevents like phishing, data leakage, or retail or financial fraud.
When "detect" and "remediate" are the default actions for security and threat teams, external threats are defanged early in the cyber kill chain, well-before the exploit activates or weaponization can even be completed. This approach is effective because the tailoring component applies both to the analysis and the remediation of our threat intelligence. Swift remediation is possible because we've already mapped to the customers' existing internal security applications to automate blocking and blacklist updates, as well as to their external social, mobile, and web infrastructure that every digital business relies on.
Q3. Nick, what role do you see for AI and ML in the threat intelligence space over the next few years?
Over the next few years, I expect the cyber-arms race to continue on a fast and accelerating trajectory – by security technology vendors and the threat actors themselves. Starting with the latter, I expect to see attackers to use AI for evil, to coordinate bot attacks at unforeseen scale, and to increasingly target corporate brands for both geopolitical motives and financial gain. To effectively exploit these new corporate victims, I also expect attackers will develop more advanced influence operations and social engineering techniques to seed customer and public distrust.
In turn, I expect cybersecurity providers to finally make good on the promise of AI and machine learning. We've faced years of failed marketing promises with far more fiction than fact when it comes to meaningful security results and outcomes. Dub me an optimist, but I see too much untapped potential and continued computing performance improvements in line with Moore's law for me to dismiss them.
I believe we'll see real security innovation with AI and ML as developers retool and narrow the scope of training models to address more concentrated tasks based on clear, well-defined parameters. For example, IntSights already has robust analytics as part our brand security solution, but we're at a point in our product development where can start to push the boundaries further with our AI, beginning to develop real computer visioning techniques. As computer vision capabilities manifest in our products, we will be able to help our customer organizations identify and remediate brand attacks, impersonations, and stolen and counterfeit sales at efficiency rates that are orders of magnitude higher.
Q4. Guy, what do you want attendees at Black Hat USA 2019 to know about IntSights, its near-term product/service strategy and its long-term vision?
Our mission is to help organizations detect and mitigate threats externally. Threat intelligence can be incredibly useful, but it can also be incredibly overwhelming. We are helping organizations not just gain visibility into new, potential threats, but helping them understand how they are impacted and enabling them to integrate and orchestrate the mitigation process.
Throughout the year, we've significantly bolstered our phishing detection and brand protection capabilities by developing new sources, increasing automation, and incorporating additional machine-learning functionality. We're also extending intelligence to new areas of our customers' digital footprint, like new industry-specific assets and third-party organizations. Long term, we expect our external threat intelligence and protection platform to become even more extensible and interoperable, both between our internal solution offerings and within our customers' security systems and cloud infrastructure.