dark reading threat intelligence survey research findings © 2014 property of ubm tech; all rights...

26
Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Upload: tyler-powell

Post on 17-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 2: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

You're likely swimming in security data, but what are the best tools and practices for analyzing it all? How can you use data to uncover compromises or targeted attacks? The answer is threat intelligence, which we define as the collection and analysis of information about existing and emerging threats to information assets -- it's used to inform decisions on how best to respond to and mitigate these threats.

Among the 397 respondents to our InformationWeek and Dark Reading Threat Intelligence Survey, 85% say this intel plays some role in their IT security strategies. Among the 337 respondents using threat intelligence:

>> 75% cite vulnerabilities exploited when asked what they attempt to identify through data analysis; 58% try to pinpoint the source of attacks.

>> 61% consider their programs a good value for the money; 12% say their program is "worth its weight in gold."

>> 51% subscribe to two or more third-party security intelligence feeds; 10% leverage five or more.

>> 22% run ad hoc queries against their data on a daily basis vs. 14% who check in only monthly. That's a long time in this age of fast-moving events.

Want more? Visit InformationWeek Reports

Executive Summary

v© 2014 Property of UBM Tech; All Rights Reserved

Page 3: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Threat intelligence plays role for 85% of respondents

© 2014 Property of UBM Tech; All Rights Reserved

Page 4: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Most use log management and SIEM for threat intelligence

© 2014 Property of UBM Tech; All Rights Reserved

Page 5: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Cloud: not a popular place for log management/SIEM

© 2014 Property of UBM Tech; All Rights Reserved

Page 6: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Data-feed configuration simplicity: split decision

© 2014 Property of UBM Tech; All Rights Reserved

Page 7: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Rule-set configuration: a little easier

© 2014 Property of UBM Tech; All Rights Reserved

Page 8: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Too few realize benefits of threat intelligence analysis

© 2014 Property of UBM Tech; All Rights Reserved

Page 9: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Network traffic logs commonly used

© 2014 Property of UBM Tech; All Rights Reserved

Page 10: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

One-third aren’t using third-party feeds

© 2014 Property of UBM Tech; All Rights Reserved

Page 11: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

About half run ad hoc queries at least weekly

© 2014 Property of UBM Tech; All Rights Reserved

Page 12: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

How threat level affects data query frequency

© 2014 Property of UBM Tech; All Rights Reserved

Page 13: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Most looking for exploited vulnerabilities, attacked assets

© 2014 Property of UBM Tech; All Rights Reserved

Page 14: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Few say analysis doesn’t improve risk assessments

© 2014 Property of UBM Tech; All Rights Reserved

Page 15: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Defenses change based on threat intelligence

© 2014 Property of UBM Tech; All Rights Reserved

Page 16: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Threat intelligence analysis speeds breach discovery

© 2014 Property of UBM Tech; All Rights Reserved

Page 17: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Half say threat intelligence uncovered an APT

© 2014 Property of UBM Tech; All Rights Reserved

Page 18: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Threat intelligence is a smart investment, say 73%

© 2014 Property of UBM Tech; All Rights Reserved

Page 19: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Only one-quarter built their own security analytics

© 2014 Property of UBM Tech; All Rights Reserved

Page 20: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Specialized training: not yet the norm

© 2014 Property of UBM Tech; All Rights Reserved

Page 21: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

IT staff highly represented in survey respondents

© 2014 Property of UBM Tech; All Rights Reserved

Page 22: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Surveyed companies revenue spread

© 2014 Property of UBM Tech; All Rights Reserved

Page 23: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Surveyed companies industry spread

© 2014 Property of UBM Tech; All Rights Reserved

Page 24: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Surveyed companies lean toward midsize businesses

© 2014 Property of UBM Tech; All Rights Reserved

Page 25: Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Survey Name Dark Reading Threat Intelligence Survey

Survey Date June 2014

Region North America

Number of Respondents 397

Purpose To examine the impact threat intelligence has on IT security strategy.

Methodology Dark Reading, in partnership with InformationWeek, surveyed business technology decision-makers at North American companies. The survey was conducted online, and respondents were recruited via an email invitation containing an embedded link to the survey. The email invitation was sent to qualified Dark Reading and InformationWeek subscribers.

Want more? Visit InformationWeek Reports

Research Synopsis

© 2014 Property of UBM Tech; All Rights Reserved