You are on page 1of 18

European Journal of Information Systems

ISSN: (Print) (Online) Journal homepage: https://www.tandfonline.com/loi/tjis20

Adopting and integrating cyber-threat intelligence


in a commercial organisation

James Kotsias, Atif Ahmad & Rens Scheepers

To cite this article: James Kotsias, Atif Ahmad & Rens Scheepers (2023) Adopting and
integrating cyber-threat intelligence in a commercial organisation, European Journal of
Information Systems, 32:1, 35-51, DOI: 10.1080/0960085X.2022.2088414

To link to this article: https://doi.org/10.1080/0960085X.2022.2088414

© 2022 The Author(s). Published by Informa


UK Limited, trading as Taylor & Francis
Group.

Published online: 11 Jul 2022.

Submit your article to this journal

Article views: 5204

View related articles

View Crossmark data

Citing articles: 3 View citing articles

Full Terms & Conditions of access and use can be found at


https://www.tandfonline.com/action/journalInformation?journalCode=tjis20
EUROPEAN JOURNAL OF INFORMATION SYSTEMS
2023, VOL. 32, NO. 1, 35–51
https://doi.org/10.1080/0960085X.2022.2088414

EMPIRICAL RESEARCH

Adopting and integrating cyber-threat intelligence in a commercial


organisation
James Kotsiasa, Atif Ahmad b
and Rens Scheepersc
a
Advantage Cyber, Melbourne, Victoria, Australia; bSchool of Computing & Information Systems, Faculty of Engineering and IT, University
of Melbourne, Parkville, Victoria, Australia; cDepartment of Information Systems and Business Analytics, Deakin Business School, Deakin
University, 221 Burwood Highway, Burwood, VIC 3125, Australia

ABSTRACT ARTICLE HISTORY


Cyber-attacks are increasingly perpetrated by organised, sophisticated and persistent entities Received 14 September 2020
such as crime syndicates and paramilitary forces. Even commercial firms that fully comply with Accepted 7 June 2022
industry “best practice” cyber security standards cannot cope with military-style cyber-attacks. KEYWORDS
We posit that the primary reason is the increasing asymmetry between the cyber-offensive Cybersecurity; information
capability of attackers and the cyber-defensive capability of commercial organisations. A key security management; cyber
avenue to resolve this asymmetry is for organisations to leverage cyber-threat intelligence (CTI) defence; incident response;
to direct their cyber-defence. How can commercial organisations adopt and integrate CTI to threat intelligence; clinical
routinely defend their information systems and resources from increasingly advanced cyber- information systems practice
attacks? There is limited know-how on how to package CTI to inform the practices of enter­
prise-wide stakeholders. This clinical research describes a practitioner-researcher’s experiences
in directing a large multinational finance corporation to adopt and integrate CTI to transform
cybersecurity-related practice and behaviour. The research contributes practical know-how on
the organisational adoption and integration of CTI, enacted through the transformation of
cybersecurity practice, and enterprise-wide implementation of a novel solution to package CTI
for commercial contexts. The study illustrates the inputs, processes, and outputs in clinical
research as a genre of action research.

1. Introduction they can bypass or overwhelm even the most sophis­


ticated cyber defences. High-value organisations have
Cybersecurity is a critical concern for organisations to defend against a massive volume of cyber-attacks on
globally. Cyber-attackers target organisational infor­ a daily basis. The same principles that have established
mation and systems resources for financial gain or organisations’ asymmetry vis-a-vis cyber attackers
geo-political imperatives. This includes theft of sensi­ may also hold the answer to resolving it. This would
tive customer data, intellectual property, confidential imply that commercial organisations adopt military-
plans relating to business strategy, and disruption of inspired principles to defend themselves, given the
mission-critical IT systems. The cyber-threat land­ nature of the emerging cyber threat landscape.
scape has shifted in recent years with the emergence Military organisations have long understood the
of organised crime syndicates and nation-state para­ invaluable role that threat intelligence plays in direct­
military cyber entities. Terminology such as advanced ing operations against hostile actors. In similar vein,
persistent threats (APTs) are now used to describe we argue that cyber-threat intelligence has a critical
such entities (Ahmad et al., 2019; Lemay et al., 2018). role to play in redressing the asymmetrical advantage
APTs are increasingly sophisticated, recruiting IT to cyber-attackers over cyber-defenders. Cyber threat
experts into purpose-built teams and deploying mili­ intelligence (CTI) is the process of “acquiring, proces­
tary-grade cyber weaponry in high-precision attacks sing, analyzing, and disseminating information that
against selected targets. identifies, tracks, and predicts threats, risks, and
In contrast, organisational cyber-defences have not opportunities inside the cyber domain to offer courses
evolved at the same rate. Many commercial organisa­ of action that enhance decision making” (Ettinger,
tions have institutionalised complex cybersecurity 2019). CTI thus has the potential to change organisa­
structures to comply with obligations imposed by tions’ cybersecurity behaviour from being reactive to
law, regulation, general “best practice” industry frame­ “proactive, anticipatory and dynamic” (Shin & Lowry,
works and standards. Consequently, organisations 2020, p. 6). CTI can play a critical role in directing
find themselves in an asymmetrical arms-race against organisational behaviour in prevention, detection and
cyber-threat actors that are so agile and aggressive that response to cyber-attacks. For example, CTI can

CONTACT Atif Ahmad atif@unimelb.edu.au School of Computing & Information Systems, Faculty of Engineering and IT, University of Melbourne,
Parkville, Victoria, Australia
© 2022 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group.
This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives License (http://creativecommons.org/licenses/by-
nc-nd/4.0/), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is properly cited, and is not altered, transformed, or
built upon in any way.
36 J. KOTSIAS ET AL.

support prevention by alerting organisations to vul­ 2. Literature review


nerabilities that can exploited by specific threat actors
with the means, motivation and capability to attack The increasing complexity of technology infrastruc­
the firm. CTI can assist in detection of cyber-attacks tures, hyperconnectivity in the modern era, and the
by tasking intrusion detection systems to patterns of targeted use of military-grade cyber weaponry poses
exploitation related to specific threat actors. And, CTI a significant and escalating risk to private enterprise
can direct cyber-response by providing a precise (Baskerville et al., 2014; Shin & Lowry, 2020). Recent
defence strategy to combat a cyber-threat actor’s industry reports highlight the increasing disparity
modus operandi (Shin & Lowry, 2020 p. 1; Ettinger, between the capability of “Advanced Persistent
2019). Therefore, organisations’ ability to assimilate Threats” (APTs) to penetrate organisations and the
and operationalise cyber threat intelligence on capability of commercial organisations to defend
a routine basis is central in this regard. themselves (Microsoft Corporation, 2020; Verizon
For commercial organisations, the adoption of CTI Corporation, 2018). An Advanced Persistent Threat
poses several challenges. The military mindset asso­ is defined as an “entity that engages in a malicious,
ciated with the use of threat intelligence is foreign to organized, and highly sophisticated long-term or reit­
the typical business culture that prevails in many of erated network intrusion and exploitation operation
these organisations. Given the emerging cyber- to obtain information from a target organization,
militarised threat environment, there is limited know- sabotage its operations, or both” (Ahmad et al., 2019,
how about the deployment and routinisation of CTI to p. 406).
inform actions of executives and business managers. The underlying reason for this disparity is that the
Moreover, many of these organisations would need to increasing sophistication and militarisation of the
transform their cybersecurity practice from cyber threat landscape has not been met by
a predominantly compliance-driven and reactive a commensurate re-orientation of cyber defence in
logic towards a proactive logic driven by CTI. private enterprise (Shin & Lowry, 2020). APTs invest
How can commercial organisations adopt and inte­ their time and resources studying the cyber defences
grate cyber threat intelligence to transform their cyber of their targets and experimenting with novel ways to
defence behaviour from being reactive and undirected penetrate and acquire their mission objectives (e.g.,
to being proactive and directed? The paper describes theft of IP and/or disruption of IT services; Ahmad
how a practitioner-researcher addressed this clinical et al., 2019). In contrast, private enterprise has long
problem in a large multinational corporation that adopted an inward perspective aimed at complying
transformed their cybersecurity practice towards with general industry cybersecurity standards while
a CTI-driven approach1. The practitioner-researcher remaining largely oblivious to the activities of cyber-
is the corporation’s Global Cyber Strategy Lead. The threat actors. Consequently, while many commercial
clinical research reported in this paper draws on the organisations invest in high levels of general cyber-
practitioner-researcher’s practical experience in cyber­ readiness, they lack sufficient situation awareness of
security management and on his research expertise the threat landscape and adversaries to develop the
developed in partnership with researcher- required defensive capabilities (Ahmad et al., 2021).
practitioners (in this case Information Systems and As Baskerville (2005) pointed out almost two dec­
Cybersecurity scholars; cf., Iversen et al., 2004; ades ago, the prevailing prevention paradigm assumes
Schön, 1983). risks can be anticipated, measured, and quantifiably
The paper is structured as follows. To situate the mitigated in advance using cybersecurity controls.
clinical research, we review literature pertinent to the This paradigm renders risk management a problem
emerging cybersecurity threat landscape and the use of of compliance, rooted in the probabilities of known
CTI in organisations. We then describe the research attacks. Instead, Baskerville (2005) advocates for pos­
approach followed by the practitioner-researcher in sibilistic thinking in cyber defence. Indeed, this mode
two phases. In phase 1, the case organisation adopted of thinking is applicable, given developments in the
CTI as innovation in its IT Operations Division. In cybersecurity threat landscape in recent times. In par­
phase 2 the innovation is translated into a novel solu­ ticular, the possibilistic paradigm seems more appro­
tion – CTI-as-a-service – as a means to package and priate in the light of novel and innovative means of
integrate CTI into the broader commercial context attack. Such cyber-attacks are dynamic and their risks
and for business users. We describe the enterprise- cannot be quantified in advance. Thus, organisations
wide integration of CTI-as-a-service, including con­ have to turn to threat intelligence as a means of
comitant interventions to influence managerial beha­ responding to highly unpredictable and insidious
viour and risk calculus. We reflect on the adoption and cyber threats. This is in line with Sun Tzu’s famous
integration of CTI, evaluating how the organisation metaphor in his Art of War (Giles, 1910): “If you know
has adapted its cybersecurity posture to better cope the enemy and know yourself, you need not fear the
with the evolving cyber-militarised threat landscape. result of a hundred battles. If you know yourself but not
EUROPEAN JOURNAL OF INFORMATION SYSTEMS 37

the enemy, for every victory gained you will also suffer demand for CTI by providing services that promise
a defeat. If you know neither the enemy nor yourself, stronger cyber defences, reduced incident response
you will succumb in every battle”. time, and improved strategic decision-making
Shin and Lowry (2020) interpret Sun Tzu’s advice (Crowdstrike, 2021).
to “know the enemy” as a call for CTI that ultimately The utility of CTI to decision-makers is contin­
requires organisations to shift their culture of risk gent on the quality of CTI. Quality of CTI can be
management from compliance with general industry measured against nine criteria, mirroring the qual­
standards towards threat intelligence collection and ity indicators of the US Army’s keystone manual
operationalisation. They further explain the fine dis­ for military intelligence (FM 2–0, 2010, pp. 1–17):
tinction between general readiness and readiness to (1) Accurate (presents objective reality), (2)
defend against specific adversaries as follows: “ . . . Relevant (supports the decision-makers conceptua­
imagine that a boxer trains to improve his/her defenses lisation of the problem) (3) Complete (contains
in advance of a match. First, the boxer can try to essential components required for decision-
improve his/her general defense skills without regard making), (4) Precise (provides the level of detail
to the upcoming opponent. Second, the boxer can also and complexity required for decision-making), (5)
train in a manner tailored to the opponent’s offensive Timely (is presented as early as possible for deci­
style. A boxer can thus increase his/her odds of success sion-making), (6) Usable (is easily understood and
by mastering both general defense and defense tailored meaningful to the decision-maker), (7) Reliable
to an opponent’s unique offensive strengths” (p. 3). (presents trustworthy content), (8) Predictive
A more detailed definition of CTI is “ . . . contex­ (anticipates future events significant to decision-
tualized output of a strategically-driven process of maker) and (9) Tailored (supports and satisfies
collection and analysis of information pertaining to decision-maker priorities).
the identities, goals, motivations, tools and tactics of Despite the existence and utility of vendor-supplied
malicious entities intending to harm or undermine CTI services and general industry guidelines on best
a targeted organization’s operations, ICT systems or practice in cybersecurity, there is very little practical
the information flowing through them” (Bank of guidance in the literature on how organisations can
England, 2016, p. 12). CTI thus encompasses evi­ adopt and integrate CTI. The literature on CTI adop­
dence-based knowledge that can include context, tion focuses on the technical aspects of CTI such as
mechanisms, indicators, implications and/or advice event aggregation and correlation, machine-based AI
(Holland, 2015; Samtani et al., 2020; Schlette et al., techniques for real-time threat hunting as well as post-
2021). In most cases CTI is aimed at cybersecurity incident forensic analysis of malware and intrusions
professionals as it enables them to proactively defend (Samtani et al., 2020). It remains unclear how CTI can
against attack, reactively detect and diagnose a breach be incorporated into routine organisational practices
and prioritise incidents based on risk exposure. to direct cybersecurity defence against APTs. More
CTI enables cybersecurity professionals to develop broadly, the literature is largely silent on how com­
situation awareness of the incident environment and mercial organisations’ culture and processes can be re-
the “attack surface” (the sum of all vectors of attack to oriented to a level of military-style “readiness” to
penetrate an organisation; Shin & Lowry, 2020). CTI is address sophisticated cyber-attacks.
also a key enabler for cyber defence, for example,
tracking and breaking the attacker’s kill-chain (recon­
3. Clinical case: adopting and integrating CTI
naissance, weaponisation, delivery, exploitation,
at greenback financial
installation, command & control, actions on objective;
Hutchins et al., 2011). However, CTI is also critical for Greenback Financial (pseudonym) is a large multina­
general managerial and executive stakeholders as it tional finance corporation with a market capitalisation
helps them to understand their risk exposure and the of over fifty billion US dollars, operating in 34 coun­
options they have to mitigate potential impacts. tries spanning North and South America, Central and
In organisational contexts, CTI functions have the Southern Asia, Europe, and Oceania. The corporation
responsibility to identify an organisation’s intelligence employs sixty thousand personnel world-wide. From
requirements, collect relevant information from a range a cybersecurity perspective, the firm’s primary strate­
of internal and external sources and develop insights gic-level objectives are (1) to maintain the continuity
that can be used to inform action and decision-making. of its global digital platforms and services and (2) to
This involves synthesising external and organisation- protect the confidentiality of sensitive organisational
specific sources to produce tailored intelligence that can and customer data. Greenback Financial experiences
be disseminated to specific internal users (Lawson et al., almost twenty billion cybersecurity-related data events
2019; Webb et al., 2014). Numerous vendors (e.g., every 24 hours. These events are generated from
Crowdstrike, FireEye/Mandiant, Kaspersky, Anomali, across the firm’s diverse global technology infrastruc­
RecordedFuture) have responded to the increasing ture. To protect the firm from cyber-attacks the firm’s
38 J. KOTSIAS ET AL.

IT Operations division features a dedicated 25-person practitioner would discover more about the nature
strong Security Operations Centre (SOC) that moni­ and magnitude of the unfolding problem, thus requir­
tors and responds to cybersecurity attacks. ing a return to the problem realisation step (as also
noted in other action research, e.g., Iversen et al., 2004;
McKay & Marshall, 2001). Similar iterations occurred
3.1. Clinical research processes and
during the second phase. The sections that follow
framework
describe the two phases, and actions of the research-
The clinical research process followed in this practitioner in each phase.
study is action research (Avison et al., 1999; This study provides a perspective on clinical
Baskerville & Wood-Harper,1998; Iversen et al., research as a genre of action research. As depicted
2004). As advocated in the action research meth­ in Figure 1, the clinical research processes in this
odology literature, this includes initial problem study were underpinned by four key inputs. First,
realisation/reconnaissance/fact-finding phases the practitioner-researcher not only understands,
leading to planning problem-solving activity, but is deeply immersed in the clinical context (as
implementation and evaluation, with non-linear an insider, not as outsider). Second, the practi­
iteration cycles between the phases (McKay & tioner draws on extensive lived personal experi­
Marshall, 2001). Some action research sources ence (several years responsible for cyber defence
portray a researcher(s) interacting with strategy, and being on the frontline response to
practitioner(s) in a particular research setting numerous cyber-attacks). Third, the practitioner
(Baskerville & Wood-Harper, 1998). In this clin­ draws on professional and industry practice (pro­
ical research, the practitioner-researcher is the fessional networks in the banking sector and
same individual (Schein, 1987). The research- information security industry). Fourth, the
practitioner in this study has a lived experience research is framed by practitioner-researcher’s
of the clinical situation in the organisation and is theoretical knowledge (of information security,
bringing education obtained through scholarly adoption and implementation of innovations in
research training to bear on the research problem. organisations, socio-technical change, and
The clinical research process occurred within research methodology). Wearing the hats of prac­
a broader framework of the adoption and imple­ titioner and researcher at the same time and lever­
mentation of innovations in organisations (e.g., aging both practical and theoretical perspectives
Cooper & Zmud, 1990; Rogers, 1995; Tornatzky on the research problem was instrumental to pro­
& Klein, 1982). In the initial adoption phase gress. Combined, these inputs informed the clin­
(Phase 1), the innovation (here CTI) was adopted ical action research processes: problem realisation
within the IT operations division. This was fol­ & exploration, solution development & implemen­
lowed by a subsequent integration phase (Phase 2) tation, and reflection & evaluation. In turn, the
whereby the innovation was adapted (in the form inputs map onto the key outputs of the clinical
of CTI-as-a-service) and implemented across the research processes: CTI-as-service as the clinical
enterprise. solution (Table 1) and its impact on the organisa­
While we present the clinical action research tion (refer Appendix), new personal experience
sequentially, there were non-linear elements to the gained by the practitioner, contribution to profes­
processes. For example, initial problem realisation sional industry practice (as articulated in this pub­
was followed by fact-finding and planning for pro­ lication), and a contribution to theory (refer
blem-solving. However, during these steps the Discussion).

Figure 1. Clinical research processes and framework in this study.


EUROPEAN JOURNAL OF INFORMATION SYSTEMS 39

3.2. Phase 1: CTI Adoption in the IT operations consists of three levels of security analysts that work
division around the clock in shifts. Level 1 analysts triage
incidents, collect raw data from individual IT systems
3.2.1. Problem realisation
to build context which they record in a ticket manage­
Greenback Financial’s market positioning, iconic sta­
ment system, analyse the incident to assess criticality,
tus in their base region, management of large funds
and either coordinate responses or escalate to more
transfers, and status as a national-level critical infra­
experienced analysts depending on the criticality of
structure organisation makes it a high-value target for
the incident. Level 2 analysts are more experienced
APTs. Nation-state backed APTs are interested in
personnel that assist with load management and pro­
disrupting national commerce and reducing trust in
vide more expert advice (e.g., on false positives). Level
national financial systems. As a result of being in the
3 analysts acquire situation awareness of global IT
cross-hairs of numerous cyber threat actors, the
operations through the use of specialised analytics
volume, sophistication, and level of aggression of
tools and engage in diagnosis, investigation and coor­
cyber-attacks experienced by Greenback has dramati­
dination of high criticality incidents that may involve
cally increased year-to-year.
coordinating a large-scale response with technology
Reflecting on the emerging cyber threat landscape,
operations teams.
the practitioner-researcher came to the following cri­
The practitioner-researcher observed that although
tical realisations. First, in the absence of appropriate
the SOC was expertly detecting, diagnosing and coor­
interventions, the unprecedented and escalating
dinating the management of incidents, the firm’s
volume and sophistication of cyber-attacks will even­
response to cyber incidents was reactive, inward-
tually overcome Greenback Financial’s defences.
looking and short sighted (i.e., Greenback Financial
Second, militarisation of the cyber threat landscape
was unable to identify risks in the immediate future by
has created a new adversarial reality that has rendered
extrapolating from previous cyber-related events).
obsolete the traditional model of compliance to con­
Further, the firm’s cybersecurity response to attacks
ventional industry security standards. Hence a new
was insular in the sense that it was not building on
model of cyber defence was needed: military-style
knowledge and insights from other firms that had
cyber-attacks demand a military-style response. The
experienced similar attacks. Cybersecurity operations
ability to adopt CTI in routine operations was instru­
was able to explain “what” incidents were taking place
mental in this regard. Third, commercial institutions
on the IT infrastructure or “how” cyber-attacks had
such as Greenback are not accustomed to operating
occurred, but was less able to answer strategic-level
with this military mindset. Greenback’s managers are
questions such as “why” they might be occurring or
more focused on their customers, financial competi­
“who” might be attacking the firm and “when” they
tors and regulators rather than cyber-adversaries.
might attack next.
Hence, the adoption of CTI as part of a new model
The practitioner-researcher concluded that
of cyber defence would require concomitant interven­
Greenback Financial must respond proactively to
tions to integrate and routinise CTI into the broader
cyber-attacks from sophisticated threat actors and
organisational culture, changed managerial beha­
adapt its prevention and response capability to the
viours and enterprise-wide processes to respond to
demands of an evolving threat landscape. In order to
this new adversarial reality (Bostrom et al., 2009;
do this, a CTI function must be created and fully
Mumford, 2006).
incorporated with existing cybersecurity operations.
3.2.2. Problem exploration
3.2.3. CTI as innovation within the IT operations
To prevent cybersecurity attacks from impacting the division
firm, Greenback Financial has a sophisticated multi- Greenback Financial retains a vast heterogenous technol­
layered system of defences consisting of best-of-breed ogy estate spanning thirty-four countries situated in
firewalls, intrusion detection systems, and anti-virus North and South America, Central and Southern Asia,
software augmented with specialised tools from mar­ Europe, and Oceania. To prevent and respond to cyber-
ket leading vendors (e.g., FireEye, Microsoft, attacks against the infrastructure, the firm’s SOC relies
Symantec). Greenback invests considerable resources very heavily on system activity logs generated by the
into testing and refining the cyber defensive layers firm’s IT networks and devices. As the number of cyber-
with bespoke code to ensure effectiveness against related log entries generated every 24 hours reaches
a broad spectrum of cyber-attacks. approximately 20 billion, the firm uses a security incident
For cyber monitoring and response, Greenback and event management (SIEM) system to store, cross-
Financial retains a 24 × 7 security operations centre correlate and analyse log entries to identify meaningful
(SOC) that detects, diagnoses and investigates cyber- attack patterns. A separate custom platform (Advanced
attacks and coordinates responses with technology Cyber Analytics) collects behavioural monitoring data
operations teams (refer Figure 1). Greenback’s SOC related to the activities of the firm’s sixty thousand staff.
40 J. KOTSIAS ET AL.

As depicted in Figure 2, the system activity logs are The threat intelligence team provides operational,
correlated and aggregated (arrows 1 and 2) before secur­ tactical and strategic level threat intelligence through
ity alerts are generated by real-time algorithms (arrows 3 reliable and routine feeds (e.g., general alerts, bulle­
and 4). Level 1 analysts triage security alerts and deter­ tins) to relevant stakeholders. At an operational level,
mine priority after which high priority incidents are the team proactively monitors the threat landscape
escalated (arrow 5 or 6) while low priority incidents are feeding actionable intelligence to SOC analysts (e.g.,
contained, eradicated and resolved. High severity inci­ blocking IP addresses, interpreting security alerts, sug­
dents trigger the formation of a Security Leadership gesting possible avenues of investigation) (arrow 8). At
Team (Security LT) (arrow 7) that assesses the situation, a tactical level the team predicts threat activity and
opens communication channels to relevant stakeholders validates that against the observations of the Level 3
up the chain of command (arrow 11) and across the SOC analysts (arrow 9). At a strategic-level, the team
breadth of the enterprise (arrow 12). The Security LT identifies new threat actors and their tactics, techni­
coordinates the broad enterprise response with the sup­ ques and procedures (TTPs) to identify and address
port of technology and business teams. gaps in the firm’s cyber defences that might be exposed
To adopt CTI the firm created a centralised team of (arrow 10).
4–6 specially-trained personnel that collects multi- Outside of the cybersecurity function, CTI was
source intelligence from national and international deemed to be critical to a range of executive, manage­
security and law enforcement agencies, threat intelli­ rial and operational stakeholders in the broader enter­
gence vendors such as FireEye, and a closed commu­ prise. Therefore, CTI was supplied to these
nity of intelligence specialists within the financial stakeholders to ensure relevant feeds, advisories and
sector. The team monitors the threat landscape, col­ bulletins produced by CTI analysts, penetration tes­
lects and analyzes threat intelligence from the above- ters, incident responders as well as specialised CTI
mentioned sources and applies adversarial thinking software was distributed for decision-support
and frameworks (e.g., the “kill-chain” process of purposes.
cyber-attacks). This enables the team to provide accu­ The practitioner-researcher observed that CTI
rate, timely and targeted advice in the form of action­ adoption within IT Operations had significantly
able and organisation-specific insights to security improved the cybersecurity posture by: (1) improving
analysts in the SOC as well as the enterprise cyberse­ alignment between the activities of cyber-defence and
curity leadership team. Further, the firm’s SOC pro­ cyber-attack, (2) reducing the success rate (and there­
cured specialised tools with embedded threat fore impact) of cyber-attacks as the firm halts attack
intelligence (e.g., indicators of compromise) to map operations earlier rather than later, and (3) improving
threat patterns and prioritise which detection and efficiency and focus of cyber defence operations
responses require the most attention. against cyber-attacks (Refer Appendix, Table A1).

Figure 2. Adoption of CTI in the cybersecurity function of greenback financial.


EUROPEAN JOURNAL OF INFORMATION SYSTEMS 41

3.3. Phase 2: enterprise-wide CTI integration personnel were then perceived to be “crying wolf”
which resulted in the erosion of trust between business
3.3.1. Problem realisation
and IT parties.
Although CTI was successfully adopted, the practi­
If Greenback Financial were to develop cybersecur­
tioner-researcher realised that the transformation of
ity risk management practices to enable it to survive in
cyber security practice was largely localised in the IT
the new hostile environment, then stakeholders would
Operations unit. The cybersecurity behaviour of sta­
have to fully commit to operationalising CTI into
keholders across the rest of enterprise, particularly
routine processes. The deeply embedded compliance
business unit managers, remained largely unaffected.
culture presented a challenge to the acceptance of CTI
For instance, given that IT systems tend to have
as an essential element of business operations in the
or develop vulnerabilities, business owners are
cyber-militarised era. The practitioner-researcher
expected to “patch” systems with the latest vendor-
recognised that although CTI had been successfully
issued security updates. A culture of compliance
adopted in its IT Operations Division, CTI had to be
holds that the higher the percentage of patches
fully integrated into enterprise-wide processes in
applied to vulnerable systems, the more compliant
order to transform the firm’s cyber defence behaviour.
the systems are. In this context, compliance is con­
sidered to be synonymous with the level of cyber­
security. The practitioner-researcher observed a risk 3.3.2. Internal survey: enterprise CTI requirements
calculus is undertaken by asset owners in balancing and business culture
the competing priorities to maintain high levels of The practitioner-researcher commissioned an internal
asset uptime on the one hand and vulnerability survey. The purpose of the survey was firstly to expand
management on the other. Vulnerability manage­ on particular needs relating to CTI driven solutions
ment requires systems to be taken down to apply and secondly, to assess the magnitude of the challenge
patches which reduces uptime. Asset owners are related to the integration of CTI across the enterprise.
under no obligation to resolve a vulnerability or Thus a survey instrument was designed to (1) identify
act on threat intelligence, but instead are only CTI needs across different areas of the enterprise, (2)
expected to consider thresholds of acceptable risk. assess the applicability of CTI to various roles (execu­
The practitioner-researcher observed the tendency tives, business managers, operational managers) and
of asset owners to simply accept the cybersecurity the extent to which these stakeholders were confident
risk rather than allow the asset to be taken down in the utility of CTI in their routine activities, (3)
for patching purposes. As a result, the number of measure the extent to which stakeholders cared
fully patched systems across Greenback Financial about particular cybersecurity outcomes, and (4)
fell to less than 40% (i.e., a randomly directed assess the level of satisfaction with the existing CTI
attack at an IT asset was more likely than not to and the value it provided to them.
hit a non-compliant system). The survey instrument was administered to 231
The practitioner-researcher also noted that when consumers of internal cybersecurity services. The sam­
provided with specific threat intelligence of attack, ple was not random, nor blindly selected; instead it
some owners were more likely to instal patches on was directed at stakeholders who engaged with secur­
vulnerable IT systems. Although this was promising, ity teams on CTI in the recent past. Of the 231 surveys
large-scale acceptance of CTI across global operations sent out, 93 responses were received (Executives: 2;
still presented a challenge. The practitioner-researcher Senior Management: 9; Management: 17: Operational
observed from experience that CTI is only useful in roles: 65). The practitioner-researcher recognised the
environments that accept the need for it and under­ risk of potential bias, should he conduct the analysis
stand how to leverage it. The challenge of getting himself (cf., Iversen et al., 2004 on separating different
stakeholders in Greenback Financial to use CTI was roles of an action researcher to address impartiality).
twofold. CTI relates to adversaries that are resourceful As such, the analysis of the survey data was done by an
(e.g., nation-state backed APTs, organised criminals) independent team in the organisation.
and simultaneously invisible. As a result, stakeholders The survey results revealed a number of new
perceive threat intelligence to be of a largely specula­ insights. On average, the more senior a respondent
tive nature that is often unable to provide attribution was, the lower their confidence expressed in CTI.
to an attack. Hence when faced with a choice between Further, stakeholders reported spending considerable
acting on a speculative piece of intelligence that will time and effort interpreting or making sense of CTI
incur a cost (reduction of uptime) or not acting on the rather than using it. This finding was consistent with
threat intelligence (i.e., preserving the bottom line), stakeholders at all levels expressing concerns with
most stakeholders chose the latter. This situation was conflicting, fragmented and/or incomprehensible
further exacerbated when threat intelligence appears CTI leading to poor utilisation in the important prac­
to be sounding a false alarm. Cybersecurity operations tices of prioritisation and planning.
42 J. KOTSIAS ET AL.

The findings also suggested that executives were Reliability), and consolidated (to achieve
largely unaffected by CTI primarily because the content Completeness) prior to release; this approach must be
rarely reached them. Managerial roles were more likely systematic and consistent (to address Problem 1).
to report higher levels of confidence in CTI, more likely
to use it in their planning, and less likely to report 3.3.3.2. Centralised and unified. Threat Intelligence
major conflicts in work expectations because they functions must be centralised and standardised (to
received tailored intelligence products with a close fit achieve Accuracy and Precision) to reduce conflicting
to their deliverables. In fact, managerial roles were also accounts of threats (to address Problem 1).
more likely to report favourable experiences with CTI if
their work was short term/tactical in nature and 3.3.3.3. Responsive, timely and targeted. Threat
required information that can be actioned immediately, Intelligence and responsive actions must have clear
for example, incident response. Managerial roles were points of distribution (to achieve Relevance) and deliv­
less likely to report favourable experiences with CTI if ered prior to contingent decisions (to achieve
their work was long term/strategic in nature and Timeliness) (to address Problem 2).
required information in need of extrapolation, or con­
textualisation such as strategic forecasting. 3.3.3.4. Accessible and pre-analysed. Threat
Operational roles expressed the most confidence in Intelligence must be presented as a consumable deli­
CTI, but their level of confidence varied depending on verable that is Usable, Tailored and Predictive (to
the source of the CTI. Operational personnel reported address Problem 3 and to some extent Problem 4).
higher confidence in structured intelligence-sources Based on the survey, the practitioner-researcher
(e.g., vulnerability scanning), which was presented in realised that if the enterprise were to leverage CTI
a consistent format month-on-month, and lower con­ to best advantage, it had to be provisioned in such
fidence in unstructured data (e.g., CTI advisories). a way that stakeholders would be motivated to use
Aligning with this, operational roles were more likely it by a business imperative linked to their self-
to use this data in their day-to-day operations because interest. Thus, the practitioner-researcher decided
of the available detail. This, however, did not translate that stakeholders had to be acclimated to adversar­
into any strategic or planning activities, as these typi­ ial environments where they would be compelled to
cally did not apply given the scope of their operational consume CTI to ensure their cybersecurity.
responsibilities. Further, the ramifications of ignoring CTI had to
The analysis revealed that many stakeholders reluc­ be felt. Hence the existing provision of CTI aimed
tantly engaged with CTI staff and processes out of at fulfiling general compliance obligations was ter­
obligation. This was at odds with the emerging cyber minated. Instead, cybersecurity began to conceptua­
threat landscape that demands an engaged “comba­ lise CTI-as-a-service to the enterprise, built to meet
tant” rather than a bureaucratic “compliant” mindset. the needs of its stakeholders – the reluctant com­
Clearly, any CTI solution would require a parallel batants – while also advancing cybersecurity’s
behavioural change process to enlist these “reluctant objectives.
combatants”. This socio-cultural insight became the CTI-as-a-service encompasses the original mili­
basis for both solution development and enterprise- tary intelligence principles of what makes intelli­
wide integration. gence valuable and actionable to an organisation
(Figure 3). CTI-as-a-service represents a novel
3.3.3. CTI solution development & integration practical approach to embodying both CTI as an
To summarise, the survey revealed that CTI was diffi­ innovation and incorporating a socio-cultural
cult to consume from the recipients’ perspective change element across the enterprise. Internal ser­
(Problem 1); CTI did not reach all recipients e.g., vices are already well understood by commercial
executive consumers (Problem 2); CTI had opera­ managers (as consumers of such services). The
tional utility, but lacked strategic utility (Problem 3); concept of CTI-as-a-service draws on prior infor­
and, CTI consumption was driven by obligation, not mation systems research that have approached the
as a business imperative (Problem 4). delivery and support of complex technical phenom­
In response, the practitioner-researcher developed ena for business users in the form of a service
and formalised four design principles to guide integra­ (Scheepers, 2006; Weill & Broadbent, 1998). For
tion of CTI across the enterprise. These four design example, Weill and Broadbent (1998) illustrate
principles map to the nine quality attributes of threat how enterprise-wide IT infrastructure can be con­
intelligence (refer Literature review, and Figure 3): sidered as a suite of services encompassing people,
processes, and technology. The benefits of a service
3.3.3.1. Consolidated and consistent. Threat approach include broader engagement with busi­
Intelligence must be multi-source (to achieve ness and understanding of technology phenomena
Accuracy and Precision), vetted (to achieve delivered as services.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS 43

Figure 3. Design principles and impact assessment of CTI-as-a-service.

3.3.3.5. People. From the survey, it was clear that actors). Intentionality was measured in terms of the
business users would need support to effectively capability of a particular threat actor, the perceived
engage with CTI-as-a-service. Greenback introduced attractiveness of the asset to the actor, and the level of
a number of specialist CTI managers (or “handlers”) exposure of the asset to the actor. This called for novel
recruited from the defence industry whose primary enterprise-wide risk modelling across organisational
task was to support the needs, context and priorities systems and assets, including the creation of new risk
of CTI business users and direct the existing collection dashboards for managers and development of appro­
and analysis of CTI to ensure the outcome was acces­ priate metrics. Importantly, in this process CTI end-
sible and pre-analysed to meet their operational and users (both operational and managerial staff) were
strategic needs. trained in using these resources to support their
threat-based decision making. By integrating threat
3.3.3.6. Processes. Re-configuration and re- intelligence with routine business risk reporting, the
engineering of processes were needed to: (1) transfer ramifications of ignoring this intelligence was realised
cyber-risk affecting business areas to the responsible by business stakeholders. Effectively, CTI-as-a-service
business managers, (2) re-task criticality ratings in became the vehicle for transferring cybersecurity risks
enterprise risk management processes to incorporate previously owned by the cybersecurity function, to
intentionality of threat actors, (3) scale up internal managers responsible for areas affected by these
CTI processes to include distribution beyond IT threats. The combination of new risk modelling and
operations, and (4) integrate with business risk teams dashboards as well as training for designated enter­
so consumers would receive CTI that was consolidated prise stakeholders addressed the need for CTI to be
and consistent with routine business risk reporting. responsive, timely and targeted in the form of CTI-as
-a-service. Table 1 summarises details of the service,
3.3.3.7. Technology. A new digital platform was service level agreements, support and resourcing.
needed to centralise and unify all CTI. This single
platform would replace a number of standalone sys­ 3.3.4. Implementing CTI-as-a-service across the
tems that previously generated CTI reporting largely enterprise
on an ad hoc basis from various teams (e.g., penetra­ The practitioner-researcher observed that although the
tion testers, incident responders, threat intelligence alerts and advice from the threat intelligence team
analysts). played a critical role in the IT operations unit’s situation
CTI-as-a-service was developed as follows. awareness of the threat landscape and response to orga­
Criticality ratings used to identify and prioritise the nised, persistent and sophisticated cyber-attacks (refer
severity of risks to specific environments were re- Figure 2), true cyber resilience requires agile cyber
tasked to include intentionality (of cyber threat defence across the enterprise. Hence enterprise-wide
44 J. KOTSIAS ET AL.

Table 1. CTI-as-a-service (Outputs, service level agreements, support and resourcing).


Output Service Level Agreements Support Service Resourcing
Situation Awareness ● Timing: Issued once per week Defence Handler Consumed by business
Report (via digital ● Evaluation of reliability of source: (e.g., completely reliable, fairly as interpreter/ managers, paid for by
platform) reliable, unreliable, reliability can’t be judged) advisor Cyber security
● Level of Confidence in intelligence report: (e.g., confirmed by multi­
ple sources, probably true given other contextual reports, truth
cannot be judged)
Flash report (via digital ● Issued no more than 4 hours after a significant event; accompanied
platform)2 by internal evaluation of the reliability of the source and level of
confidence in the intelligence
● Evaluation of reliability of source: (e.g., completely reliable, fairly
reliable, unreliable, reliability can’t be judged)
● Level of Confidence in intelligence report: (e.g., confirmed by multi­
ple sources, probably true given other contextual reports, truth
cannot be judged)
Personalised Briefing to ● Timing: On demand CTI team, Private
elaborate on client’s risk Intelligence
exposure Consultan

business operations must be reconfigured and re- 3.3.4.3. Executive groups. Executives and senior
engineered to integrate or “bake” CTI into routine management were provided with demonstrable proofs
processes (Davenport & Prusak, 1998; Grover et al., of value of the intelligence-driven approach. Following
1995; refer “Processes” in Figure 3). the socialisation work between business and technol­
As part of implementing CTI-as-a-service, specific ogy risk teams and business unit managers, executive
enterprise stakeholders were targeted (refer “People” groups were introduced to the enhanced visibility
in Figure 3), given the need to better engage business presented by CTI-as-a-service.
users (as highlighted by the survey):

3.3.4.1. Business technology risk teams. Business 3.4. Reflection and evaluation
technology risk teams were equipped with intelligence, An important aspect of the action research cycle, with
risk dashboards and were familiarised with CTI ter­ particular relevance to clinical research, is to “reflect
minology (refer “Technology”, in Figure 3). These on the experience and record learning” (Iversen et al.,
teams were given a detailed walkthrough of the pro­ 2004). At the time of writing this study, there was no
posed development of CTI-as-a-service. Risk teams single inclusive framework in the formal literature that
were introduced to the threat-intelligence driven could be used to benchmark and reflect upon the
view of risk management and review. Given the new organisational adoption and integration of CTI-as
modelling, risk teams were required to conduct an -a-service as described in this clinical study.
immediate review of all previous risk exemptions for In considering how to measure the impact of CTI
cyber-related vulnerabilities if the vulnerability in implementation on cybersecurity performance, it is
question was being targeted by a known cyber-threat useful to revisit the role and function of CTI in
actor. organisations. CTI is fundamentally information
that has been subjected to a formal process of collec­
3.3.4.2. Business unit managers. The introduction of tion and analysis with the precise objective to inform
dedicated defence-trained “handlers” assigned to sup­ decision-makers about specific threats, risks and
port business unit managers (refer Table 1) was opportunities. Given the role of CTI is to make the
a critical part of the necessary transformation of the cybersecurity behaviour of the firm “proactive,
commercial culture. In addition to understanding the anticipatory and dynamic” (Shin & Lowry, 2020,
needs, context and priorities of these managers, the p. 6), without CTI, the firm is unaware of the who,
handlers provided much needed education about the what, when, how and why of the attack and the
nature of CTI, how it is generated and how to use CTI- threat actors. As a result, their response can only
as-a-service (and associated digital platform). The be reactive, and they must assume the worst-case
development of the relationship between CTI provi­ scenario. With CTI, the firm is able to “engineer
ders and users occurred iteratively. Users could more precise defense strategies” (Shin & Lowry,
express unmet requirements and areas for improve­ 2020, p. 1).
ment in the service. As this practice was routinised, Therefore, given the role and function of CTI in
additional alerts and reporting were added to the organisations, our study reflects the following logic.
service. Effectively, various business operations were Cybersecurity performance is lowered by reactive and
being reconfigured to better leverage CTI. undirected defensive behaviours. This clinical study
EUROPEAN JOURNAL OF INFORMATION SYSTEMS 45

demonstrates how CTI can be successfully adopted contexts. Importantly, this study provides
and integrated as a means to transform the organisa­ a comprehensive description of the clinical practice
tion’s defensive behaviour from being reactive and to transition from a reactive and undirected response
undirected to being proactive and directed (refer rooted in compliance towards precise defensive stra­
Appendix A). As a result of the behavioural transfor­ tegies driven by threat intelligence. A transition of this
mation, we found evidence that cybersecurity posture magnitude is inherently socio-technical in nature,
becomes stronger (refer Appendix B). encompassing not only CTI as technical innovation,
We provide evidence of behavioural transformation but its ripple effect on the rest of the business, opera­
driven by CTI implementation. This shows that the tional processes, functional relationships, and beha­
organisation has successfully transitioned its beha­ vioural change and ultimately manifests in improved
viour from being reactive and undirected to being cybersecurity posture. As illustrated in this clinical
proactive and directed (refer Appendix A, Tables A1, case, progress on this journey should be assessed on
A2). For example, a strong indicator is a distinct shift a number of measures, reflective of this social-
in the amount of time invested by incident responders technical change (refer Appendix).
from the late phases of the kill chain (“putting out the The study makes the following specific contribu­
fire”) to the early phases of the kill chain (“preventing tions to clinical practice. First, the approach whereby
the fire from starting”). A second strong indicator is CTI as innovation is initially adopted and implemen­
the change in incident response behaviour, from being ted within cyber security operations (Phase 1), and is
undirected to directed. A third indicator is discovery subsequently integrated across the organisation
of previously unknown vulnerabilities or attack sur­ (Phase 2) denotes a useful stage-based roadmap for
face that is exposed to cyber-attack. the deployment CTI in commercial organisations.
While we argue that there is no direct causal link Second, CTI-as-a-service represents a novel solu­
between CTI implementation and cybersecurity per­ tion to package and customise generically sourced
formance, changes in the indicators (refer Appendix cyber threat intelligence in a form that can be disse­
B, Tables B1, B2) suggest a significant impact which minated and acted upon by specific business units.
could not be realised in the absence of effective CTI This allows for customisation of the service for parti­
implementation. Table B1 provides qualitative mea­ cular business areas, even for specific managers,
sures for the positive impact of CTI implementation enabling and training them to prioritise and act
on the firm’s response to purposive and malicious upon specific threat intelligence more effectively, com­
cyber-threat actors using five operational indicators. pared to the former compliance-driven model.
Table B2 describes comparable actual scenarios, pre- Moreover, accompanying service support (defence-
CTI implementation and post-CTI implementation. trained handlers, centralised digital platform), adds
Taken together these scenarios demonstrate that the efficiency in delivering the service that is part of rou­
firm has indeed transformed its response from being tine business operations.
reactive (and acting on the worst-case scenario) to Third, as cyber security is increasingly pertinent
being proactive and pre-empting the attack. These to many organisational processes and activities,
scenarios are reflective of the organisation’s improved CTI-as-a-service can be further scaled up and
response against purposive and malicious threat extended in line with organisational strategies,
actors. geographic expansion and emerging cyber threats.
Based on the evidence of behavioural and opera­ CTI-as-a-service is a mechanism to integrate the
tional impact (as summarised in Table 2), our overall cybersecurity function (as providers) and business
evaluation of the adoption and integration of CTI at users (as customers). Given the inherently specu­
Greenback Financial is that it has significantly and lative nature of threat intelligence, on occasion,
measurably improved the organisations cyber security business managers will be called to act upon
posture. false alarms. Mutual understanding, trust, and
respect is central to this increasingly important
organisational relationship (thus the inclusion of
4. Discussion and conclusion
personalised briefings as part of CTI-as-a-service,
This clinical study illustrates how military intelligence refer Table 1). In turn, this implies that organisa­
principles can be adapted and packaged in a form that tions’ cybersecurity functions must also trans­
is suitable and applicable to the commercial context. form – becoming central to business operations
We believe the essence of Greenback’s journey, nota­ and strategic planning, as opposed to a back-
bly the way that CTI was initially adopted in their office function.
cyber security function (Figure 2), then subsequently Last, the study also contributes to information
adapted as an innovation in the form of CTI-as-a-ser­ security risk management theory. The traditional
vice for enterprise-wide implementation (Figure 3), is compliance-driven view of cyber security is rooted in
transferable to similar commercial organisational probabilistic thinking that focuses on likelihood and
46 J. KOTSIAS ET AL.

Table 2. Evidence of the impact of CTI adoption and integration on cybersecurity defence behaviour (Refer appendix for details).
Adoption of CTI as Innovation Integration of CTI-as-a-Service
Summary of Behavioural Impact (refer to details in ● Shift in distribution of time spent by ● Increased speed and prioritisation of vulnerabil­
Tables A1 & A2) cyber defence from end stages to early ity resolution across business assets
stages of kill chain ● Improved knowledge of the vulnerability of cri­
● Increase in incident response resolution tical business assets through the breakdown of
rates CTI-business silos
● Reduced dwell time of threat actors ● Improved fusion of CTI and business intelligence
● Improved consistency in response to leading to improved cyber risk management of
cyber attacks business assets
● Improved coherence of response activ­ ● Improved strategic assessment of business
ities against cyber attacks opportunities through CTI insights into APT
behaviour
● Improved effectiveness of routine CTI workflows
through incorporation of business stakeholders
Summary of Operational Impact (Pre-CTI ● Disruption to IT Infrastructure Services (Medium-High to Low-Medium)
Implementation to Post-CTI Implementation) ● Attack Surface defended (Unknown to High)
(refer to details in Table B1) ● Number of Previously Unaddressed Critical Incidents (Very High to Low)
● Effectiveness of Incident Response (Cost/Performance) (High to Low)
● Speed of Response (Low to High)

impact as means of prioritising interventions and approach and solution presented here are relevant
quantifying risk reductions. We argue that in the to organisations that seek to deploy CTI to defend
case of purposive threat actors, cyber-security risk is against cyber military entities.
not probabilistic but possibilistic. Organisations
should realise that possibilistic cyber-risks are inher­
ently unpredictable and there is no determinate rela­ Notes
tionship between investment in security safeguards
1. The organisational context referenced in this paper is
and reduction in risk exposure. To address possibilis­ the first author’s personal reflections on his lived
tic cyber-risks, organisations must introduce two new experience in his professional role spanning
externally focused constructs, i.e., cyber-threat actors’ a number of organisations and does not reflect in
intentionality and capability into their risk calculus. any way the posture or position of any of the organi­
An externally-focused risk calculus is better sations involved.
2. A threat intelligence alert triggered by an external
suited to the emerging cyber-threat landscape event (e.g., an attack on another financial
typified by high volume, sophisticated and tar­ organisation).
geted attacks. The clinical study describes the
experience of an organisation that designed and
implemented an enterprise-wide solution, founded Acknowledgments
on this externally focused risk calculus. CTI We would like to acknowledge the thoughtful inputs and
redresses the information asymmetry that sophis­ suggestions received from the reviewers and editorial team
ticated cyber threat actors have over organisations. on this paper.
The practical reality is no longer if an attack will
take place, but when (timing), by whom (attacker),
why (motive), how (tactics), and where (targets). Disclosure statement
CTI-as-a-service provides managers with critical No potential conflict of interest was reported by the author(s).
operational, tactical and strategic information
about these questions, enabling them to direct
their cyber-defence function against purposive Notes on contributors
and malicious attacks.
James Kotsias is the Director of Advantage Cyber. He holds
To the best of our knowledge, this clinical a Master’s Degree in Information Systems from The
study is the first of its kind that demonstrates University of Melbourne. He leads an offensive security
how a large commercial organisation has adopted and operations function, and advises long-term cyber secur­
and integrated CTI as a means to successfully ity and threat strategy for a number of organizations. James
transform its cybersecurity defence behaviour. also sits on the Cyber Executive Advisory Board at Deakin
University; providing input to the Cyber Security Research
In terms of limitations, for reasons of confiden­ and Innovation Center (CSRI) and its extended intelligent
tiality, we were limited in the amount of detail we systems research. His current research interests are the
could provide in this paper. However, the broad expanding theater of cyber warfare, the evolution of
EUROPEAN JOURNAL OF INFORMATION SYSTEMS 47

corporate espionage, the weaponisation of defensive sys­ Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-
tems, and kinetic incident response structures. James blue­ centered information security: Managing a strategic bal­
screened his first PC at the age of 7. ance between prevention and response. Information &
Management, 51(1), 138–151. https://doi.org/10.1016/j.
Atif Ahmad is an Associate Professor at the University of
im.2013.11.004
Melbourne’s School of Computing & Information Systems
Bostrom, R. P., Gupta, S., & Thomas, D. (2009). A
where he serves as Deputy Director of the Academic Centre
meta-theory for understanding information systems
of Cyber Security Excellence. Atif leads a unique team of
within sociotechnical systems. Journal of Management
Cybersecurity Management researchers drawn from infor­
Information Systems, 26(1), 17–48. https://doi.org/10.
mation systems, business administration, security intelli­
2753/MIS0742-1222260102
gence, and information warfare. He has authored over 100
Cooper, R. B., & Zmud, R. W. (1990). Information technol­
scholarly articles in cybersecurity management and received
ogy implementation research: A technological diffusion
over AUD$5M in grant funding. Atif is an Associate Editor
approach. Management Science, 36(2), 123–139. https://
for the leading IT security journal, Computers & Security.
doi.org/10.1287/mnsc.36.2.123
He has previously served as a cybersecurity consultant for
Crowdstrike. (2021). Threat intelligence: Cybersecurity’s
WorleyParsons, Pinkerton and SinclairKnightMerz. Atif is a
best kept secret. https://go.crowdstrike.com/rs/281-OBQ
Certified Protection Professional with the American Society
-266/images/WhitepaperThreatIntelligence.pdf
for Industrial Security. For more information, please visit
Davenport, T. H., & Prusak, L. (1998). Working knowledge:
https://www.atifahmad.me/
How organizations manage what they know. Harvard
Rens Scheepers is a Professor in the Department of Business Press.
Information Systems and Business Analytics at Deakin Ettinger, J. (2019). Cyber intelligence tradecraft report: The
University. He also serves as Director of the Business & state of cyber intelligence practices in the United States.
Technology research theme at the Deakin Business School. Retrieved from Carnegie Mellon University: https://
His research focuses on how organisations can achieve and resources.sei.cmu.edu/library/asset-view.cfm?assetid=
protect competitive advantages from the application of con­ 546686
temporary information and communication technologies FM 2-0. (2010). Field manual 2-0: Intelligence.
and systems. Headquarters, Department of the Army.
Giles, L. (1910). Sun Tzu on the art of war the oldest military
treatise in the world translated from the Chinese is that is
fixed. Sun Tzu On The Art Of War. Abingdon, Oxon:
ORCID Routledge.
Atif Ahmad http://orcid.org/0000-0002-8862-5755 Grover, V., Jeong, S. R., Kettinger, W. J., & Teng, J. T.
(1995). The implementation of business process
reengineering. Journal of Management Information
Systems, 12(1), 109–144. https://doi.org/10.1080/
References 07421222.1995.11518072
Holland, R. (2015). Forrester.https://www.forrester.com/
Ahmad, A., Webb, J., Desouza, K. C., & Boorman, J. report/Vendor+Landscape+SR+Pros+Turn+To
(2019). Strategically-motivated advanced persistent +Cyberthreat+Intelligence+Providers+For+Help/-/
threat: Definition, process, tactics and E-RES113066
a disinformation model of counterattack. Computers Hutchins, E. M., Cloppert, M. J., & Amin, R. M. (2011).
& Security, 86, 402–418. https://doi.org/10.1016/j.cose. Intelligence-Driven Computer Network Defense
2019.07.001 Informed by Analysis of Adversary Campaigns and
Ahmad, A., Maynard, S. B., Desouza, K. C., Kotsias, J., Intrusion Kill Chains. Paper presented at the
Whitty, M. T., & Baskerville, R. L. (2021). How can International Conference on Information Warfare and
organizations develop situation awareness for incident Security, Washington, DC, USA. Lockheed Martin
response: A case study of management practice. Corporation.
Computers & Security, 101, 1–15. https://doi.org/10. Iversen, J. H., Mathiassen, L., & Nielsen, P. A. (2004).
1016/j.cose.2020.102122 Managing risk in software process improvement: An
Avison, D. E., Lau, F., Myers, M. D., & Nielsen, P. A. action research approach. MIS Quarterly, 28(3),
(1999). Action research. Communications of the 395–433. https://doi.org/10.2307/25148645
ACM, 42(1), 94–97. https://doi.org/10.1145/291469. Lawson, C., Contu, R., & Benson, R. (2019). Market guide for
291479 security threat intelligence products and services. Gartner.
Bank of England. (2016). Understanding cyber threat intelli­ https://www.gartner.com/en/documents/3902168
gence operations. https://www.bankofengland.co.uk/-/ Lemay, A., Calvet, J., Menet, F., & Fernandez, J. M. (2018).
media/boe/files/financial-stability/financial-sector- Survey of publicly available reports on advanced persis­
continuity/understanding-cyber-threat-intelligence- tent threat actors. Computers & Security, 72, 26–59.
operations.pdf https://doi.org/10.1016/j.cose.2017.08.005
Baskerville, R., & Wood-Harper, A. T. (1998). Diversity in McKay, J., & Marshall, P. (2001). The dual imperatives of
information systems action research methods. European action research. Information Technology & People.
Journal of Information Systems, 7(2), 90–107. https://doi. Microsoft Corporation. (2020). Microsoft digital defense
org/10.1057/palgrave.ejis.3000298 report. https://www.microsoft.com/en-us/download/
Baskerville, R. (2005). Information warfare: details.aspx?id=101738
A comparative framework for business information Mumford, E. (2006). The story of socio-technical design:
security. Journal of Information System Security, 1(1), Reflections on its successes, failures and potential.
23–50. https://www.jissec.org/Contents/V1/N1/V1N1- Information Systems Journal, 16(4), 317–342. https://doi.
Baskerville.html org/10.1111/j.1365-2575.2006.00221.x
48 J. KOTSIAS ET AL.

Rogers, E. M. (1995). Diffusion of innovations (4th ed.). Free Shin, B., & Lowry, P. B. (2020). A review and theoretical
Press. explanation of the ‘cyberthreat-intelligence (cti) capabil­
Samtani, S., Abate, M., Benjamin, V., & Li, W. (2020). ity’that needs to be fostered in information security
Cybersecurity as an Industry: A Cyber Threat Intelligence practitioners and how this can be accomplished.
Perspective. In: Holt T., Bossler A. (Eds.),The Palgrave Computers & Security, 92, 101761. https://doi.org/10.
Handbook of International Cybercrime and 1016/j.cose.2020.101761
Cyberdeviance. Palgrave Macmillan, Cham.135–154. Tornatzky, L. G., & Klein, K. J. (1982). Innovation char­
https://doi.org/10.1007/978-3-319-78440-3_8 acteristics and innovation adoption–implementation:
Scheepers, R. (2006). A conceptual framework for the A meta-analysis of findings. IEEE Transactions on
implementation of enterprise information portals in Engineering Management, 29(1), 28–45. https://doi.
large organizations. European Journal of Information org/10.1109/TEM.1982.6447463
Systems, 15(6), 635–647. https://doi.org/10.1057/pal Verizon Corporation. (2018). Data breach investigations
grave.ejis.3000646 report. https://www.verizonenterprise.com/verizon-
Schein, E. (1987). The clinical perspective in fieldwork. Sage. insights-lab/dbir/
Schlette, D., Böhm, F., Caselli, M., & Pernul, G. (2021). Webb, J., Ahmad, A., Maynard, S. B., & Shanks, G. (2014).
Measuring and visualizing cyber threat intelligence A situation awareness model for information security
quality. International Journal of Information risk management. Computers & Security, 44(July 2014),
Security, 20, 21–38. https://doi.org/10.1007/s10207- 1–15. https://doi.org/10.1016/j.cose.2014.04.005
020-00490-y Weill, P., & Broadbent, M. (1998). Leveraging the new
Schön, D. A. (1983). The reflective practitioner: How infrastructure: How market leaders capitalize on infor­
professionals think in action. Basic Books. mation technology. Harvard Business Press.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS 49

Appendix A. Evidence for Improvement in 32 US organisations (Ettinger, 2019)). Table B1 provides an


Greenback’s Cybersecurity Behaviour operational impact assessment of CTI Impact against five
indicators (pre and post Implementation). Table B2 com­
We provide evidence of measurable indicators of impact of pares actual cyber-attack scenarios on Greenback, demon­
both the adoption of CTI (Phase 1, Table A1) and integra­ strating the impact of CTI (pre- versus post
tion of CTI-as-a-service (Phase 2, Table A2), utilising the Implementation) on the organisation’s cybersecurity pos­
relevant tradecraft indicators (adapted from a report that ture. Where relevant we have provided the sources of evi­
contains indicators of CTI use drawn from the practices of dence used to construct our measures.

Table A1. Behavioural transformation due to CTI adoption: dealing with new and emerging hostile threats as reality (Phase 1).
Post CTI Adoption:
Indicative evidence that
CTI adoption is
a measurable success in Relationship between CTI
State of Greenback Pre CTI State of Greenback Post CTI terms of cybersecurity adoption and organisational
Adoption Adoption posture cybersecurity posture Sources of Evidence
Pre-CTI Adoption Incident Firm’s cyber defence of ● Increased effective­ Adoption of CTI leads to ● Incident Management
Response Behaviour: business assets is directed by ness of response improved alignment Records
Firm’s cyber defence of a combination of an inward mitigations leading between the activities of ● Risk and Problem
business assets was view of asset criticality as well to fewer future inci­ cyber defence and cyber Ticketing Records
directed by inward views as an outward view of threat dents downstream attack ● Risk Registries
of asset criticality actor intent and capability ● Increase in incident ● Asset Registries
response resolution ● Network
rates Taxonomy Reporting
The firm invested Adoption of CTI introduced the
disproportionate resources attacker’s perspective of the firm
securing top tier assets over which changed how the firm
less critical assets as it defended its attack surface. For
assumed attackers shared example, significant security
the same priorities. As resources were invested in
a result, attackers were surveillance to combat attacker
exploiting vulnerable entry reconnaissance and guard entry
points in less critical assets points to prevent penetration.
such as mail servers as they
were not actively defended.

Majority of time spent in Majority of time spent in cyber ● Shift in distribution Adoption of CTI leads to ● Incident Management
cyber defence was in the defence is in the early stages of time spent by reduced success rate (and Records
late stages of attack of the attack operations (e.g., cyber defence from therefore impact) of cyber- ● Risk and Problem
operations (e.g., reconnaissance) preventing end stages to early attacks as firm halts attack Ticketing Records
exploitation) mitigating the attacker from reaching stages of kill chain operations earlier rather than ● SLA Tracking via
the impact of the attack their objectives ● Reduced mean time later Response Tickets
to incident response
Integration of CTI enabled ● Reduced dwell time
Prior to CTI, incident response to understand threat- of threat actors
response teams were actor objectives and patterns of
unable to anticipate behaviour leading to detection of
attacker behaviour. Hence attacks in the early phase of the
attacks were detected late kill-chain.
in the kill-chain.

Majority of the firm’s Majority of the firm’s response ● Improved speed to Adoption of CTI leads to ● Risk Registries
response to cyber-attack to cyber-attack consists of deployment of improved efficiency and ● Core Process
consisted of activities activities that are planned, resources focus of cyber defence Documentation
that were ad hoc, directed and structured ● Improved consis­ operations against cyber
undirected and tency in response to attacks
unstructured. CTI enabled the firm to plan cyber attacks
a structured and directed ● Improved coherence
Without profiles of threat response process with clear of response activities
actors and background inputs and decision points. This against cyber attacks
knowledge on intent, allowed downstream functions ● Increased directed­
capability and objectives, to perform their role with more ness in response to
incident responders wasted focus (rather than individually activities of cyber-
time inspecting unrelated finding and filling in missing threat actors
logs, misattributing context), resulting in better
patterns of activity, and outcomes along the response
making uninformed chain.
decisions.
50 J. KOTSIAS ET AL.

Table A2. Behavioural transformation due to CTI integration into the broader enterprise: CTI-as-a-service (Phase 2).
Early indicative evidence that
CTI-as-a-service is being utilised Indicative evidence that CTI
Initiatives to integrate CTI across (measures adapted from Ettinger Sources of integration is a measurable success Sources of
broader enterprise (2019)) Evidence in terms of cybersecurity posture Evidence
People: Introduction of specialist CTI ● Increased speed and prioriti­ ● Incident ● Integration of CTI leads to ● Incident
managers (or “handlers”) recruited sation of vulnerability resolu­ Management reduced enterprise-wide attack Management
from the defence industry whose tion across enterprise Records surface through increased Records
primary task was to understand the business assets ● Risk and speed and prioritisation of vul­ ● Core
needs, context and priorities of CTI ● Improved effectiveness in the Problem nerability resolution Hardware
users and direct the existing utilisation of CTI in business Ticketing ● Integration of CTI leads to Asset
collection and analysis of CTI to operations Records reduced cyber-risk exposure Registries
ensure the outcome was tailored to ● Sustained utilisation of CTI ● Risk due to improved utilisation of ● Availability
their operational and strategic amongst all stakeholders as Registries CTI across enterprise operations Metrics
needs. evidenced by CTI-related ● Investment ● Integration of CTI leads to ● Network
Process: Re-configuration and re- activity on digital platform Slate increased effectiveness of busi­ Taxonomy
engineering of processes to enable: ● Improved strategic assess­ Assessment ness strategy due to incorpora­ Reporting
(1) transfer of cyber-risk affecting ment of business opportu­ ● ROI tion of CTI into business risk
business areas to the responsible nities through incorporating Differential assessment
business managers, (2) re-tasking cyber-threat intelligence Analysis ● Integration of CTI leads to swif­
criticality ratings in enterprise risk ● Improved knowledge of the ter enterprise-wide adaptation
management processes to vulnerability of critical busi­ to changes in the cyber threat
incorporate intentionality of threat ness assets through the environment
actors, (3) scaling up of internal CTI breakdown of CTI-business
intelligence processes to include silos
wider distribution points outside of ● Improved fusion of CTI and
IT operations, and (4) integration business intelligence leading
with business risk teams so to improved cyber risk man­
consumers would receive CTI that agement of business assets
was coherent and consistent with ● Improved cross-functional
routine business risk reporting. collaboration among CTI and
Technology: A new digital platform to business stakeholders
centralise and consolidate all CTI. enabling improved knowl­
This single platform replaces edge of attack surface
a number of standalone ● Improved effectiveness of
communication systems that routine CTI workflows
previously generated CTI reporting through incorporation of
largely on an ad hoc basis from business stakeholders
various teams (e.g., penetration ● Improved identification and
testers, incident responders, threat tracking of sensitive business
intelligence analysts). data attractive to threat
actors (previously not
considered)

Appendix B. Evidence for Improvement in Greenback’s Cybersecurity Posture

Table B1. Operational impact assessment (Pre and post CTI implementation).
Operational Impact Indicator Pre-CTI Implementation Post-CTI Implementation
Disruption to IT infrastructure services Medium-High Low-Medium
Extent of attack surface defended Unknown High
Number of previously unaddressed critical incidents Very High Low
Effectiveness of incident response (performance/cost) Low High
Speed of response Low High
EUROPEAN JOURNAL OF INFORMATION SYSTEMS 51

Table B2. Actual cyber attack scenarios on greenback demonstrating impact of CTI (Pre and post implementation).
The impact of CTI implementation can be seen in a comparison of two near-identical threat responses to two similar vulnerabilities (Vuln-20 and Vuln-
21) in an enterprise messaging platform. The responses to each of these vulnerabilities occurred pre- and post-CTI implementation respectively. Both
vulnerabilities were assessed at the highest level of criticality.

Pre-CTI Implementation Post-CTI Implementation


Greenback became aware of active threats exploiting Vuln-20, but was Greenback was targeted by a similar threat actor, exploiting a similar
unable to form a consistent view of likely attack surfaces, or points of vulnerability, Vuln-21. Through established channels with peer
entry. The eventual direction of the response was informed by organisations and private vendors, CTI was able to obtain indicators of
a detection of malicious activity in an adjacent environment, which was compromise (IoCs), logs, IP addresses, signatures, and other technical
traced back to use of the exploitation of this vulnerability. The response, indicators observed and confirmed as “signals” before a threat actor
therefore, was consistently behind the threat actor – having little attempted a full-scale compromise. Having established a credible threat,
reliable knowledge of their modus operandi, or objectives. Unable to the cybersecurity function reached out to business teams and asset
pre-empt or keep pace with attackers, Greenback was forced to isolate owners to arrange downtime for mitigations to be put in place. Teams
the affected environments from the broader network; stemming the were deployed specifically to defend the assets at risk, and a high-
spread of the threat at the cost of material disruption to enterprise priority response process was used to expedite patching – mitigating
systems and operations. the vulnerability entirely. There was no meaningful disruption to
business operations, and the attack never proceeded, the attacker
having lost the opportunity to establish a meaningful foothold.

You might also like