SHARE
Facebook X Pinterest WhatsApp

CISOs Need Real-Time Threat Analytics to Keep Up With Attackers

thumbnail
CISOs Need Real-Time Threat Analytics to Keep Up With Attackers

CISOs Need Real-Time Threat Analytics to Keep Up With Attackers

A survey of chief information security officers reveals that automation and sharing threat intelligence may be the missing link enterprises need to keep up with cyberattacks.

Written By
thumbnail
Frank Ohlhorst
Frank Ohlhorst
Sep 12, 2017

Security threats are too fast-changing and too numerous for companies to get ahead — and stay ahead — of attackers. In these uneasy times, threats are outpacing response capabilities.

The problem is manual processes, lack of quality data and a talent gap, according to a ServiceNow survey of chief information security officers (CISOs).  Nearly half of CISOs (47 percent) say insufficient data is a barrier to effective security, while 70 percent find it difficult to prioritize security threats based on business criticality.

RTInsights.com recently spoke with Sean Convery, vice president and general manager, Security Business Unit, ServiceNow, to better understand the impact that the results of the survey will have on the market.

CISOs should focus on when data breaches occur

CISOs keep spending on preventing and detecting data breaches, but response is where they should focus,” said Convery. “It’s not a question of if you’ll be breached, but when you are, how quickly and reliably can your security team respond?

What’s more, most security practitioners know that is a problem that can’t be simply resolved by increading head count; the security market is already at negative unemployment. Those security practicioners are wondering if threat intelligence sharing and automation bridge the gap and solve today’s security woes.

[ Related: IoT Security Vulnerabilities May Drive People Away ]

Automating security tasks — both routine and strategic — is becoming a necessity. Two-thirds of CISOs in the ServiceNow survey plan to automate more security tasks in the next three years. With automated security response, companies can investigate every alert, prioritize them based on impact to the organization and trigger requests for remediation without human intervention.

Advertisement

Security pros slow to share threat intelligence

Convery said there is also power in being able to collectively fight back. Sharing threat intelligence can help organizations to act more quickly and better defend against emerging threats. Yet companies have not been eager to raise their hands, admit to a security incident and exchange information, which puts attackers at an advantage.

Attackers are a step ahead because they share information. The dark web is built for just that —completely anonymous communication to trade and sell information. It’s time to take a page from the attackers’ handbook and start sharing information.

Convery says the focus cannot be solely on what to share, but rather how to share threat intelligence. “Controlling the way you share, including being fully anonymous, and whom you share with is mandatory.”

ServiceNow’s own Trusted Security Circles is built around this concept of anonymous threat intelligence sharing. The cloud-based application gives enterprises the capability to share and receive threat intelligence in near real-time.

[ Related: Why Putting the IoT Into Docker Containers Will Unlock It ]

Covery explained how Trusted Security Circles works. A security team may see suspicious activity in its network and will want to know if others in their defined community have also seen it. An anonymous query goes to other members of the chosen circle, and a sightings search is performed against the specified suspicious observables.

Customers now know if a security incident they’re investigating is happening to any peers, partners or suppliers. If the number of sightings exceeds a set threshold, a security incident can be automatically opened.

Advertisement

Security analysts don’t need go it alone

“We all need timely intelligence to sound the alarm as new attacks happen, but securely and anonymously sharing active threat data with trusted peers has simply not been possible,” said Convery. “Now, security analysts are no longer alone. ServiceNow enables enterprises to apply the power of collaboration to proactively avert and shorten the useful lives of attacks.”

One things is certain, security is an increasingly collaborative exercise that requires constant work. Automation and threat intelligence sharing may very well be the missing link enterprises need to ensure their response capabilities keep up.

thumbnail
Frank Ohlhorst

Frank J. Ohlhorst is an enterprise technology analyst and author. He is a frequent contributor to eWeek, PCMag and several other online publications.

Recommended for you...

U.S. Cyber Trust Mark: Evolving IoT from Smart to Secure
Matt Wyckhouse
Aug 24, 2024
80% Organizations Had A Cloud Security Incident in 2021
David Curry
Oct 10, 2022
Digital Twins Require Their Own Special Brand of Security
Joe McKendrick
Oct 10, 2022
New Report Highlights $14 Billion IoT IAM Market

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.