Blog New Research from Cloud Security Alliance: Building a Foundation for Successful Cyber Threat Intelligence Exchange

New Research from Cloud Security Alliance: Building a Foundation for Successful Cyber Threat Intelligence Exchange

This week at the 2018 RSA Conference, the Cloud Security Alliance released a new framework for Building a Foundation for Successful Cyber Threat Intelligence.


Sophisticated organizations, particularly cloud providers, know that the difference between a minor incident and massive breach lies in their ability to quickly detect, contain, and mitigate an attack.

This framework will help corporations seeking to participate in cyber intelligence exchange programs to enrich their event data and improve their incident response speed and capabilities.

The paper is divided into three main sections.

1. Finding Your Fit - Evaluating Sharing Programs

How to find sharing partners and exchange platforms that best meet your needs.

2. Before You Join - Building a Foundation for Success

Identify the capabilities and business requirements that form the foundation of a cyber intelligence exchange program.

3. Getting Started - A Framework for Threat Intelligence Exchange

Understand the basics of the exchange process so they can efficiently share the event they see and more efficiently operationalize any intelligence they collect.

While this paper specifically looks at CSA’s threat intelligence exchange, the framework behind it relevant to any organization seeking to participate in a cyber threat intelligence exchange program, such ISACs/ISAOs like R-CISC and IT-ISAC.

This paper was authored by TruSTAR co-founder and CSA chairman Dave Cullinane, as well as members of the Cloud-CISC working group, which TruSTAR provides the exchange infrastructure for.

Download the framework

Customer Spotlight Webinar: PVH Corp. TruSTAR has a new webinar series, Customer Spotlight, where we invite security leaders and operators from across the TruSTAR community to share ... Read More
IBM & City of Los Angeles Select TruSTAR to Build Security Tool for Local Businesses On Tuesday, at the 2019 LA Cyber Lab Summit, The City of Los Angeles announced their business partnership with IBM Security and TruSTAR to help local ... Read More
Making Sense of Unstructured Intelligence Data Using NLP The push towards structuring threat intelligence data has gained new momentum with the proliferation of new intelligence sharing ontologies like ... Read More
TruSTAR’s Paul Kurtz Talks To Executive Director of IT-ISAC About the Benefits of Intelligence Fusion   In the past twenty years, companies have deployed more technology, processes, and people to defend its applications and systems than ever before… ... Read More