Today’s enterprises receive a myriad of new threat intelligence from multiple feeds and sources. Most organizations highly value such threat intelligence as essential to a strong security posture and fulfilling their security mission. It can be challenging, however, to make threat intelligence actionable.
With the plethora of new threats added daily to the cyber ecosystem, security leaders need to determine which of new threats are relevant to their organization. Moreover, they also need to quantify what potential risk or impact the relevant threats may bring upon the organization if realized – which is why more than 80% of CISOs and other security executives actively read their organization’s threat intelligence feeds.[i] However, with the volume and complexity of such reports, the majority of threat intelligence recipients believe the feeds themselves cannot provide actionable intelligence.
Organizations turn to Pen Testing
Currently, organizations study the applicability of new threats through penetration testing. While pen testing does serve as a means by which organizations can objectively evaluate the relevance of new threats, there are several prominent drawbacks:
- Multiply the per-application pen testing cost by the number of critical and high-risk applications an enterprise may have and the cost of determining if new threats are relevant and what their potential impact may be could run as high as $600,000 or more.
- Due to the high cost of pen testing, organizations may choose not to pen test all the applications – it just would not be financially feasible. The downside to this, of course, is that organizations are unable to determine what their comprehensive attack surface is.
- Getting the results of pen testing can take between 1 – 5 weeks; in the meantime, the threat landscape is continuing to evolve.
- After receiving the results of the pen testing, organizations still need to develop and prioritize their response to the new threats.
Make Threat Intelligence Actionable with ThreatModelerTM
There is a better way to make threat intelligence actionable. Threat modeling with ThreatModelerTM can accomplish in minutes what it takes pen testers weeks to do.
External or internally generated threat intelligence can feed directly into the ThreatModelerTM central threat library. Then, with just a click of a button, all threat models across the entire threat model portfolio are automatically updated. In just minutes, the CISO and security team can determine the relevance of new threats as well as the potential impact and risk of relevant threats.
The CISO and other stakeholders will maintain a complete, real-time understanding of the organization’s comprehensive attack surface, even with the volume and complexity of newly added threats. It has never been easier or more efficient to make threat intelligence actionable. With ThreatModelerTM organizations can:
- Understand where relevant threats apply across their entire application portfolio;
- Quantify the impact of new threats to the organization; and
- Prioritize where to focus their mitigation resources – ThreatModelerTM even provides how to mitigate new and existing threats.
ThreatModelerTM is more Cost Effective than Pen Testing
ThreatModelerTM provides objective, consistent, and quantifiable outputs for all organizational stakeholders – including the ability for CISOs to analyze their comprehensive attack surface in real-time. Moreover, gaining superior real-time outputs using ThreatModelerTM is significantly more cost effective than pen testing.
Consider the annual cost difference between creating and maintaining 100 threat models in real-time with ThreatModelerTM versus pen testing the same applications quarterly:
Schedule a demo to learn how to make threat intelligence actionable in real-time and cost-effectively for your organization.
[i] “The Value of Threat Intelligence: A Study of North American & United Kingdom Companies.” Ponemon Institute: Tucson. November 1, 2016. https://www.anomali.com/news-events/press/ponemon-report-says-70-percent-of-organizations-swamped-by-cyberthreat-data
[ii] “Rate Card, Standard Pen Test.” HighBit Security, LLC: Port Sanilac. 2017.
[iii] Acharya, Srimant. “The Cost of Pen Testing a Web Application.” TATA Consultancy Services, LLC: Phoenix. December 2016. https://www.tcs.com/content/dam/tcs/pdf/technologies/Cyber-Security/Abstract/The-Cost-of-Pen-Testing-a-Web-Application.pdf