Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Cloud-Based, Intelligent Ecosystems
Cloud-Based, Intelligent Ecosystems

Cloud-Based, Intelligent Ecosystems

Release Date: 12/10/2020

Working Group: Data Security

Today’s enterprise security world revolves around endless tools and ingestion of data points that often become confusing and unrealistic to decipher. It is difficult to gain a grasp how they impact business or the critical potential they hold in order to respond timely. The Cloud-Based, Intelligent Ecosystems paper aims towards executives in businesses whose focus is within securing their environment. The five sections presented within this paper address key areas in understanding the meaning of intelligence, the concept of how threat gathering works, securing a cloud-based, intelligent ecosystem, security business analytics, and lastly, areas of further research. 


To understand your specific threat intelligence model, one must first understand the tools currently within use, whether it be endpoint protection or other security sensors on the network. Companies must normalize and automate their internal tools to transform and extract actionable intelligence, while using external sources to reduce detection and response times. This is not a call for more tools, but rather how to use what you currently have at an optimal level. With the growing use of AI and Machine Learning, these technologies can expand the reach of tools and assist in the precision and accuracy of false positive data sets. 


Threat intelligence can be expanded over time when addressing IoT devices throughout enterprise, and how “sense, understand, act” can enhance and understand complexities within enterprise ecosystems. By also understanding other emerging technologies, such as blockchain, we can assume that the size of data will continue to move upwards. The important aspect here is capturing how to align threat intelligence to emerging technology so you do not get left behind. 

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Cloud Threat Modeling
Cloud Threat Modeling
Cloud Incident Response Framework
Cloud Incident Response Framework
Top Threats to Cloud Computing: Egregious Eleven Deep Dive
Top Threats to Cloud Computing: Egregious Eleve...
Breach Debrief: The Fake Slackbot
Breach Debrief: The Fake Slackbot
Published: 04/22/2024
What’s in a Name? Defining Zero Trust for Leaders
What’s in a Name? Defining Zero Trust for Leaders
Published: 04/22/2024
Are You Ready for Microsoft Copilot?
Are You Ready for Microsoft Copilot?
Published: 04/19/2024
Implementing a Data-Centric Approach to Security
Implementing a Data-Centric Approach to Security
Published: 04/19/2024

Acknowledgements

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

This person does not have a biography listed with CSA.

Jim Reavis
Jim Reavis
Co-founder and Chief Executive Officer, CSA

Jim Reavis

Co-founder and Chief Executive Officer, CSA

For many years, Jim Reavis has worked in the information security industry as an entrepreneur, writer, speaker, technologist and business strategist. Jim’s innovative thinking about emerging security trends have been published and presented widely throughout the industry and have influenced many. Jim is helping shape the future of information security and related technology industries as co-founder, CEO and driving force of the Cloud Secur...

Read more

Dave Cullinane
Dave Cullinane
TruSTAR Founder and CSA Chairman

Dave Cullinane

TruSTAR Founder and CSA Chairman

Dave Cullinane is the Founder of TruSTAR Technology. Prior to TruSTAR, Dave served for 5+ years as the Chief Information Security Officer and VP of Global Fraud, Risk and Security for eBay and its many global businesses (StubHub, InternetAuction.co, GSI Commerce). He has more than 30 years of professional security experience building and managing cyber security and incident response teams.

Dave is also the past President and Chair...

Read more

Ramses Gallego Headshot Missing
Ramses Gallego

Ramses Gallego

This person does not have a biography listed with CSA.

Jeff Huegel Headshot Missing
Jeff Huegel

Jeff Huegel

This person does not have a biography listed with CSA.

Ken Dunham Headshot Missing
Ken Dunham

Ken Dunham

This person does not have a biography listed with CSA.

Paul B. Kurtz
Paul B. Kurtz
Chief Cybersecurity Advisor, Splunk

Paul B. Kurtz

Chief Cybersecurity Advisor, Splunk

Paul Kurtz is the Chief Executive Officer of TruSTAR Technology. Prior to TruSTAR Paul Kurtz was the Chief Information Security Officer and Chief Strategy Officer for CyberPoint International LLC. While at CyberPoint, he helped grow the company from 10 to 200 employees in 5 years by building the US government and international business verticals. Prior to CyberPoint, Paul was the managing partner of Good Harbor Consulting where he oversaw ...

Read more

Ernie Hayden Headshot Missing
Ernie Hayden

Ernie Hayden

This person does not have a biography listed with CSA.

Brian Kelly Headshot Missing
Brian Kelly

Brian Kelly

This person does not have a biography listed with CSA.

Krishna Narayanaswamy Headshot Missing
Krishna Narayanaswamy

Krishna Narayanaswamy

This person does not have a biography listed with CSA.

Rich Phillips
Rich Phillips
Enterprise and Security Architect at Worldwide Technology

Rich Phillips

Enterprise and Security Architect at Worldwide Technology

This person does not have a biography listed with CSA.

Ed Amaroso Headshot Missing
Ed Amaroso

Ed Amaroso

This person does not have a biography listed with CSA.

Dave Dervy Headshot Missing
Dave Dervy

Dave Dervy

This person does not have a biography listed with CSA.

Robert Gourley Headshot Missing
Robert Gourley

Robert Gourley

This person does not have a biography listed with CSA.

Mat Henley Headshot Missing
Mat Henley

Mat Henley

This person does not have a biography listed with CSA.

Nico Kseib Headshot Missing
Nico Kseib

Nico Kseib

This person does not have a biography listed with CSA.

Mark Kraynak Headshot Missing
Mark Kraynak

Mark Kraynak

This person does not have a biography listed with CSA.

Anil Markose Headshot Missing
Anil Markose

Anil Markose

This person does not have a biography listed with CSA.

Danielle Meah Headshot Missing
Danielle Meah

Danielle Meah

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training