Article
Learn how to sift through the noise and focus on the threats likely to significantly impact your organization.
The ever-expanding threat landscape and data scattered across numerous locations present an increasingly daunting task for corporate security teams to discern meaningful signals amid the din. Striking a balance is crucial, as focusing on every threat signal equally is impractical on many levels. As the saying goes, When everything is a priority, nothing is.
But how can you avoid getting lost in the vast sea of unknown threats and confidently determine which pose a legitimate risk to your organization versus those that are unlikely to take shape? Between your team being deeply engrossed in investigative research, and stretched thin from monitoring a continuously growing list of existing Persons of Interest (POIs) and file management, how can you ensure that emerging threats are noticed?
Safeguarding your organization, its people, and valuable assets requires deliberate prioritization, a thorough workflow, and technology focused on synchronizing efforts.
Threats can surface in many places — by phone, email, or on one of the seemingly endless online forums or social media platforms. The sheer volume of threats combined with the complexity of the landscape has made prioritization incredibly difficult.
As the landscape becomes more convoluted, so does the research to determine where any issue falls on the risk matrix. Scouring through credentialed databases and poring over court records is labor-intensive and costs precious time that teams should be spending reacting to and mitigating potential issues. Yet, creating an effective action plan is only possible with a more complete understanding of the risk.
For example, suppose the security team at a large technology company receives a notification that someone threatened the CEO. The threat, made via a public post on a social media platform, is just one of the hundreds of threatening messages and posts that have surfaced across X, Facebook, Reddit, and more. And while it’s vital to take all threats seriously, they don’t all share the same risk. So, how can the security team determine where this latest threat falls on the priority list?
When it comes to prioritizing threat actors, the best way to streamline the process is by gathering information, conducting a thorough threat assessment, and determining risk.
Considering the current state of the world, making assumptions solely based on a threat is not viable. It’s essential to understand the threat actor. Threat profiles contribute to a more comprehensive understanding of the individual or organization behind the threat, enabling more informed judgment calls. Once you’ve assembled a profile through your investigative research process, it can be easier to assess subsequent threats from the same threat actor.
Some areas to consider when gathering information on a POI include:
Once you’ve adequately gathered information on your POI, conducting threat assessments can help ground your rationale with research. A threat assessment is a security team’s systematic process of evaluating all criteria gathered within a profile, determining where a threat falls on the threat matrix, and how the threat could impact the targeted principal or organization.
For example, you may discover that, although a threat actor lives in the same metro area as the principal, they have no criminal record or history of violent acts, no known ideological motivations, and a low capability of carrying out a threat. Given this information, you might determine that, while it’s still wise to monitor the individual, it’s unlikely there is any imminent danger.
On the other hand, if the investigative research shows a threat actor was recently fired from their job for violence in the workplace and actively engages with an extremist group that previously targeted members of your company’s C-suite, a security team would rank the threat as a high-priority risk.
After conducting threat assessments, consider a process for classifying threats by contextualizing the risks alongside the people and assets most valuable to your organization. For example, a security team would handle a credible violent threat toward the CEO differently than a POI who became heated over wait times with a customer service representative. While both threats should be acknowledged and mitigated, you likely wouldn’t deploy the same resources in both scenarios.
This process helps you quickly determine when to escalate, engage law enforcement, trigger active threat monitoring, or take other necessary actions to streamline your security response process. This way, you’ll have a protocol to reference when a similar threat emerges.
Building profiles, conducting threat assessments, and determining risks are all vital components for helping you find and focus on your most significant threats. However, while having a structured workflow is important, the research required for these efforts can take hours of work. Having all of this performed in one centralized platform allows you to easily look at all of the information you’ve gathered in relation to your assets.
Additionally, you still have to compile investigative findings into useful reports. Too often, security teams rely on a web of disparate systems, including spreadsheets and legacy collaboration tools, for creating reports and sharing data.
Moving information from one system to the next often means losing the fidelity of the message, which can impact security effectiveness.
Plus, reports must be manually updated each time new information surfaces.
Fortunately, leveraging technology with Connected Intelligence can help strengthen your defenses by streamlining and automating these efforts so you can hone in on the signals that matter most. Think of it this way: If identifying your top-level threats feels like searching for needles in a haystack, then a tool like Ontic Integrated Research is your metal detector. With a highly comprehensive suite of public records and legal case data research, including both real-time and historical data, an investigation that used to take a security team several hours can be reduced to a few minutes.
Using a centralized platform means you can easily log incidents, conduct investigative research, compile reports, track cases, access threat modeling, and monitor threats in real-time, all from one convenient location. By creating comprehensive workflows and leveraging the power of Connected Intelligence in a centralized platform, you can quickly find your riskiest threats and ensure you’re dedicating resources to the right places.
The post Prioritizing Threat Actors: 3 Steps to Uncovering and Concentrating on Your Most Significant Risks appeared first on Ontic.
*** This is a Security Bloggers Network syndicated blog from Article - Ontic authored by Ontic. Read the original post at: https://ontic.co/resources/article/prioritizing-threat-actors-3-steps-to-uncovering-and-concentrating-on-your-most-significant-risks/