Threat intelligence meets risk management for operational resilience
Teresa T. Walsh
Additional contact information
Teresa T. Walsh: FS-ISAC, Reston, Virginia, USA
Cyber Security: A Peer-Reviewed Journal, 2022, vol. 6, issue 2, 111-118
Abstract:
Threat intelligence, especially cyber threat intelligence, is often given limited value. Some treat it as mutually exclusive from resilience activities or decisions, while others may opine it is not valuable if it cannot be automated. In practice, applying a combination of threat data and intelligence analysis into a business risk management plan is an essential part of how cyber defence and risk management teams can effectively prioritise and focus their programmes. In order to manage cyber risks effectively, private sector companies need to branch out from intelligence-led security to intelligence-supported business resilience. This requires a holistic approach to establishing priority intelligence requirements (PIRs) and analytical products for specific stakeholders. Intelligence analysis is not created for other intelligence analysts but for those seeking to protect the company and its customers, such as risk and business continuity managers. Using the example of third-party and supply chain risks, this paper argues the merits of using advanced levels of intelligence analysis to support cyber defences, as well as risk management and operational resilience.
Keywords: cyber threat intelligence; risk intelligence; cyber security; priority intelligence requirements; governance and compliance; organisational resilience; third-party risk; supply chain risk; cyber intelligence analysis (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2022
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/7382/download/ (application/pdf)
https://hstalks.com/article/7382/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2022:v:6:i:2:p:111-118
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().