Download our step by step ISO Standards Blueprint Guide

Follow a clear path towards creating, maintaining and improving your ISO management system

#112 What is threat Intelligence?

112 What is threat Intelligence

ISO 27002 was recently updated this year – along with a reduction of overall controls, 11 completely news ones were added to keep up with new and emerging technology.

One of the new controls added under the organisational category, is something called threat intelligence. But what does this mean exactly?

Steve Mason joins us again today to delve deeper into threat intelligence to explain what it is, gives examples of the different types and shares some tools and activities that will help you develop threat intelligence  

You’ll learn

  • What is threat intelligence?
  • What does threat intelligence actually do?
  • The different types of threat intelligence
  • What tools can you implement to help with threat intelligence?
  • What activities can you do to help develop threat intelligence?

Resources

In this episode, we talk about:

[01:19] The definition and purpose of threat intelligence

[03:01] Threat intelligence doesn’t have to factor into your scope and context – you can integrate findings in later

[03:50] Threat intelligence is about being aware of not only internal threats, but global threats that could impact your business

[04:50] Threat intelligence is not only about IT (i.e. viruses)

[05:19] That being said – cyber threats are still a big factor. So ensure you have tools, training and measures in place to reduce cyber attacks and breaches.

[06:30] Types of Threat intelligence, including: Cyber, Strategic and Tactical  

[07:58] What threat intelligence actually does – Firstly ensure that you are collecting relevant data. That data can be analysed and used to reduce risk, to help you be proactive instead of reactive to threats.

[09:51] Threat intelligence is very appliable to Business Continuity (ISO 22301)

[10:35] The different types of tools you could consider, including: Security information and event management (SIEM) and CSOC – Cyber Security Operation Centres

[12:30] Types of threat intelligence activities you can do. This includes: Establishing objectives, collection of information from selected sources, analysing information to understand how it relates and is meaningful to the business and communicating information to relevant individuals.

[15:10] Ensure your threat intelligence is dynamic – and use it to inform and update your Risk Assessments at regular intervals

[16:30] Threat intelligence works with the Plan-Do-Act-Check cycle that is commonly seen in most ISO’s

[17:10] Threat intelligence can be used by any business regardless of any ISO certification you may or may not have.   

[18:05] Keep an eye out for our ISO 27001:2022 migration support offering!

Just a reminder, we’re offering 6 months free access to the isologyhub for anyone who signs up to an ISO Support Plan!

We’d love to hear your views and comments about the ISO Show, here’s how:

Subscribe to keep up-to-date with our latest episodes:

Stitcher | Spotify | YouTube |iTunes | Soundcloud

We’d love to hear your views and comments about the ISO Show, here’s how:

Share on linkedin
Share on Linkedin
Share on twitter
Share on twitter

Leave an honest review on iTunes or Soundcloud. Your ratings and reviews really help and we read each one.

Let's Connect

Step-by-step guide

Achieving ISO Standards Blueprint

A comprehensive step-by-step guide to help you pan and achieve ISO certification

Useful
Resources

Download our

Net Carbon Zero eBook

Our Recommended

Join Our

Free LinkedIn Group

Join the

Isology Hub

FREE DOWNLOAD

Discover Our Step by Step
ISO Blueprint

  • This field is for validation purposes and should be left unchanged.