Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Cloud-Based, Intelligent Ecosystems
Cloud-Based, Intelligent Ecosystems

Cloud-Based, Intelligent Ecosystems

Release Date: 12/10/2020

Working Group: Data Security

Today’s enterprise security world revolves around endless tools and ingestion of data points that often become confusing and unrealistic to decipher. It is difficult to gain a grasp how they impact business or the critical potential they hold in order to respond timely. The Cloud-Based, Intelligent Ecosystems paper aims towards executives in businesses whose focus is within securing their environment. The five sections presented within this paper address key areas in understanding the meaning of intelligence, the concept of how threat gathering works, securing a cloud-based, intelligent ecosystem, security business analytics, and lastly, areas of further research. 


To understand your specific threat intelligence model, one must first understand the tools currently within use, whether it be endpoint protection or other security sensors on the network. Companies must normalize and automate their internal tools to transform and extract actionable intelligence, while using external sources to reduce detection and response times. This is not a call for more tools, but rather how to use what you currently have at an optimal level. With the growing use of AI and Machine Learning, these technologies can expand the reach of tools and assist in the precision and accuracy of false positive data sets. 


Threat intelligence can be expanded over time when addressing IoT devices throughout enterprise, and how “sense, understand, act” can enhance and understand complexities within enterprise ecosystems. By also understanding other emerging technologies, such as blockchain, we can assume that the size of data will continue to move upwards. The important aspect here is capturing how to align threat intelligence to emerging technology so you do not get left behind. 

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Cloud Threat Modeling
Cloud Threat Modeling
Cloud Incident Response Framework
Cloud Incident Response Framework
Top Threats to Cloud Computing: Egregious Eleven Deep Dive
Top Threats to Cloud Computing: Egregious Eleve...
Priorities Beyond Email: How SOC Analysts Spend Their Time
Priorities Beyond Email: How SOC Analysts Spend Their Time
Published: 05/21/2024
Exploring Syscall Evasion – Linux Shell Built-ins
Exploring Syscall Evasion – Linux Shell Built-ins
Published: 05/20/2024
Two Effective Strategies to Reduce Critical Vulnerabilities in Applications
Two Effective Strategies to Reduce Critical Vulnerabilities in Appl...
Published: 05/20/2024
Navigating Cloud Security Best Practices: A Strategic Guide
Navigating Cloud Security Best Practices: A Strategic Guide
Published: 05/15/2024

Acknowledgements

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

Jim Reavis
Jim Reavis
Co-founder and Chief Executive Officer, CSA

Jim Reavis

Co-founder and Chief Executive Officer, CSA

For many years, Jim Reavis has worked in the information security industry as an entrepreneur, writer, speaker, technologist and business strategist. Jim’s innovative thinking about emerging security trends have been published and presented widely throughout the industry and have influenced many. Jim is helping shape the future of information security and related technology industries as co-founder, CEO and driving force of the Cloud Secur...

Read more

Dave Cullinane
Dave Cullinane
TruSTAR Founder and CSA Chairman

Dave Cullinane

TruSTAR Founder and CSA Chairman

Dave Cullinane is the Founder of TruSTAR Technology. Prior to TruSTAR, Dave served for 5+ years as the Chief Information Security Officer and VP of Global Fraud, Risk and Security for eBay and its many global businesses (StubHub, InternetAuction.co, GSI Commerce). He has more than 30 years of professional security experience building and managing cyber security and incident response teams.

Dave is also the past President and Chair...

Read more

Ramses Gallego Headshot Missing
Ramses Gallego

Ramses Gallego

Jeff Huegel Headshot Missing
Jeff Huegel

Jeff Huegel

Ken Dunham Headshot Missing
Ken Dunham

Ken Dunham

Paul B. Kurtz
Paul B. Kurtz
Chief Cybersecurity Advisor, Splunk

Paul B. Kurtz

Chief Cybersecurity Advisor, Splunk

Paul Kurtz is the Chief Executive Officer of TruSTAR Technology. Prior to TruSTAR Paul Kurtz was the Chief Information Security Officer and Chief Strategy Officer for CyberPoint International LLC. While at CyberPoint, he helped grow the company from 10 to 200 employees in 5 years by building the US government and international business verticals. Prior to CyberPoint, Paul was the managing partner of Good Harbor Consulting where he oversaw ...

Read more

Ernie Hayden Headshot Missing
Ernie Hayden

Ernie Hayden

Brian Kelly Headshot Missing
Brian Kelly

Brian Kelly

Krishna Narayanaswamy Headshot Missing
Krishna Narayanaswamy

Krishna Narayanaswamy

Rich Phillips
Rich Phillips
Enterprise and Security Architect at Worldwide Technology

Rich Phillips

Enterprise and Security Architect at Worldwide Technology

Ed Amaroso Headshot Missing
Ed Amaroso

Ed Amaroso

Dave Dervy Headshot Missing
Dave Dervy

Dave Dervy

Robert Gourley Headshot Missing
Robert Gourley

Robert Gourley

Mat Henley Headshot Missing
Mat Henley

Mat Henley

Nico Kseib Headshot Missing
Nico Kseib

Nico Kseib

Mark Kraynak Headshot Missing
Mark Kraynak

Mark Kraynak

Anil Markose Headshot Missing
Anil Markose

Anil Markose

Danielle Meah Headshot Missing
Danielle Meah

Danielle Meah

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training