Expert Insights speaks to Chris Jacob, Vice President of Threat Intelligence Engineering at ThreatQuotient, to discover how organizations can leverage actionable threat intelligence to inform their threat detection, prevention and response processes.
Threat intelligence is data that security teams collect, process and analyze to prevent and remediate cyberattacks. Based on evidence—such as attack context, indicators and behaviors—of existing or emerging threats, threat intelligence helps security teams to make more effective, informed decisions that transform their security processes from reactive to proactive.
But collecting this information can be challenging, particularly when an organization’s security stack comprises solutions from numerous vendors, so security teams have to aggregate data from various sources. And turning threat intelligence into actionable insights is harder still.
To find out how organizations can improve their threat intelligence processes to better respond to cyberthreats, we spoke to Chris Jacob, Vice President of Threat Intelligence Engineering at ThreatQuotient. After serving in the US military, Jacob pursued a career in IT, working as a developer and architect before moving into the world of InfoSec, where he held leadership positions at Sourcefire (acquired by Cisco in 2013), Fidelis Cybersecurity and Webroot. He now leads ThreatQuotient’s global team of engineers to help businesses understand their threat intelligence challenges, providing them with actionable recommendations and product-driven solutions.