The overworked term indicators of compromise base intelligence findings on highly technical findings. The findings represent the archived pain of those who have suffered a breach serving to help others with their cyber hygiene. We created a whole new industry around indicators of compromise, growing this into another misused and overworked term, that being threat intelligence. Something we have always done but now something that requires a new name to sell iteratively improved products and services. But we genuinely miss the indicators of compromise that all CISOs and cyber security professionals should examine. Below is a listing of those indicators of compromise that must be addressed before any expectation of cyber hygiene can be achieved.
- You do not have a CISO.
- You do have a CISO, but he/she reports to the CIO.
- Your intelligence function reports to Incident Response or Security Operations or somewhere buried inside IT.
- You purchased a threat intelligence platform before forming a cyber intelligence function.
- You do not have a cyber intelligence function.
- You do not have a cyber intelligence strategic plan.
- Your intelligence training is from technology companies or from those who are experts overnight.
- You do not have an overall corporate intelligence sharing capability (physical, cyber, business, competitive).
- Your intelligence reports are overclassified and, therefore, not shared.
- You believe that indicators of compromise are intelligence.
- You use risk-based anytime a tough decision must be made.
- You have risk-based (acceptance and deferred) items on your list for over one year.
- You pay ransomware instead of funding your security program.
- Your leadership thinks anything security stinks of Fort Knox.
- You continue to purchase the technology and services from the companies continuing to fail to protect you.
- Your technology stack overlaps in functionality and features, yet only small percentages of their capabilities are actually in working order.
- You use information as currency.
- You use technology knowledge with arrogance and hubris.
- You operate in continual hero mode.
- You depend solely on technology to defend your environment.
