In today’s digital age, cybersecurity has become a top concern for organisations of all sizes and industries. The rise of cyber threats has created a need for professionals who specialise in the collection, analysis, and dissemination of intelligence related to cyber threats. This is the role of a Cyber Threat Intelligence Specialist – one of the 12 key cybersecurity roles defined by ENISA in its European Cybersecurity Skills Framework.
A Cyber Threat Intelligence Specialist is an expert in gathering, analysing, and sharing information about potential cyber threats. They specialise in identifying and understanding the tactics, techniques, and procedures (TTPs) used by threat actors to target businesses, leveraging a variety of sources to collect the information, including open source intelligence.
Offering strategic and operational intelligence to support decision-making processes within the organisation, they collaborate with internal and external stakeholders to share their insights and intelligence and facilitate responses to threats.
Some of the main use case scenarios for this role include:
The Cyber Threat Intelligence Specialist plays a key role in protecting corporate assets and reputation, being essential for strengthening the security and resilience of the cybersecurity posture. His support allows withstanding various cyberattacks, including the most sophisticated ones.
Advanced Persistent Threats (APT): In an APT attack, threat actors gain unauthorized access to an organization’s network and remain undetected for an extended period, stealing sensitive information. When in 2017, the Italian Leonardo S.p.A, was targeted by an APT and had sensitive data – some of which were strategic to Italy’s defence – stolen, a Cyber Threat Intelligence Specialist may have been key in detecting and responding to this attack by analyzing network traffic and threat intelligence data to identify the APT group behind the attack.
Ransomware attack: In a ransomware attack, threat actors encrypt an organization’s files and demand payment in exchange for the decryption key. In 2021, Region Lazio’s IT systems were hit by a ransomware attack that caused widespread disruption to daily operations. The ransomware variant used in the attack was identified as Egregor, which is known for targeting healthcare organizations. In this situation, a Cyber Threat Intelligence Specialist may have been critical in identifying the ransomware variant used in the attack and the threat actors behind it, by analyzing ransomware samples and monitoring the dark web for any signs of the decryption key being sold.
Supply chain attack: In a supply chain attack, threat actors compromise a trusted vendor’s software or hardware to gain access to an organization’s network. In 2020, the Italian multinational energy company Enel was targeted by a supply chain attack that originated from a third-party contractor. The contractor’s software was compromised, allowing threat actors to gain unauthorized access to Enel’s network. A Cyber Threat Intelligence Specialist may have been helpful in identifying the source of the attack, analysing the vendor’s software and hardware for vulnerabilities, as well as recommending security controls to mitigate the risk of similar attacks in the future.
Phishing attack: In a phishing attack, threat actors send fraudulent emails that appear to be from a legitimate source to trick recipients into disclosing sensitive information or clicking on a malicious link. In 2021, the Italian postal service, Poste Italiane, was hit by a phishing attack that targeted its customers. The attack involved fraudulent emails that appeared to be from Poste Italiane and asked customers to click on a link to verify their account information. A Cyber Threat Intelligence Specialist may have been instrumental in identifying the source of the attack and analyzing the email headers and content to recommend security controls to prevent similar attacks in the future.
DDoS attack: In a DDoS attack, threat actors flood an organization’s network with traffic to disrupt its operations. In 2017, the Italian bank UniCredit was hit by a DDoS attack that disrupted its online banking services for several hours. The attack was believed to have been launched by a cybercriminal gang operating out of Russia. A Cyber Threat Intelligence Specialist may have been useful in identifying the source of the attack and working with Internet Service Providers ISPs to block the malicious traffic, as well as recommending security controls to prevent future attacks.
Bringing a specialised skill set and expertise, a Cyber Threat Intelligence Specialist carries with it several advantages for a company, including:
Taking everything into consideration, the role of a Cyber Threat Intelligence Specialist is critical in today’s cybersecurity landscape. While this role comes with unique challenges, effective navigation of these obstacles is essential to safeguard organisations from potential cyber threats.
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_gat_gtag_UA_150416163_1 | 1 minute | Set by Google to distinguish users. |
_gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |
pardot | past | The pardot cookie is set while the visitor is logged in as a Pardot user. The cookie indicates an active session and is not used for tracking. |
visitor_id909942-hash | 10 years | No description |
Cookie | Duration | Description |
---|---|---|
lpv909942 | 30 minutes | No description |
visitor_id909942 | 10 years | No description |