The Future of Threat Intelligence at Netflix

The Future of Threat Intelligence at Netflix

UPDATE: I am pleased to announce that Chris Cochran has joined the team to lead our intelligence program. He will be posting the rest of the articles in this series and I will link over to his work from here!

I have been chatting with Mary Landesman, our intelligence lead, about how best to derrive business value from threat intelligence in Netflix’s unique culture and modern technology stack. Threat intelligence can be a slippery concept. While we have seen it work well, we have also seen it struggle to keep up with changing technologies and observed uneven return on investment across industries and organizations. We came up with a bunch of questions and a few promising theories. I will share those in a series of posts in the hope of drawing out debate and new ideas. Mary is looking towards retirement! So we are looking for the next generation intelligence leader to continue our momentum for Netflix, and the broader community. If that sounds interesting please get in touch: [email protected]

Thanks to Mary for the insights and rewrites. Some of the topics (I will add links as they post):

  1. The evolution of IOCs
  2. Attribution
  3. Intelligence for Vulnerability Management
  4. Intelligence for Fraud Prevention (Chris)
  5. Intelligence: Right Down AppSec Lane (Chris)
  6. Physical and Information Security Convergence
  7. Detecting Pre-Operational Surveillance
  8. Strategic Security Intelligence
  9. Requirements gathering, feedback, and the intelligence cycle
  10. Building sustainable threat sharing communities that add value
Graham Westbrook

VP Cybersecurity Sales Engineering | Oxford AI Candidate

6 年

one element (that i don't see listed here) is intelligence for the end user. The intersection of threat intel and security awareness is telling payroll that there's an uptick in BEC scams... deriving high-value targets from internal data set and correlating with external threat activity... etc. significant ROI

Daniel Sherry

Mid-Atlantic Regional Manager

6 年

I am glad to see they included?Intelligence for Vulnerability Management

回复
Joseph Cosgrove

I help government and fortune 100 organizations define, develop and implement automated solutions using bleeding edge technology and A.I.

6 年

Aside from tracking atomic IOCs from different threat actors, adversaries, and threat groups.I think it’s important to build a threat profile and look at the behavior and characteristics to build your alerting. Also, looking at your environments current vulnerabilities and determining your toolstacks limitations might help you identify potential exploits before they occur. OSINT has its uses, but noise reduction is key for a successful threat Intel program. If you are lucky enough to have a CMBD or know your Crown Jewels, then start there and work with your product teams.

Rob Gresham

Principal Engineer specializing in Security Operations, Response, Automation and Threat Intelligence - @SOCologize, co-founder of TTP0

6 年

I wouldn’t use it and would begin creating my own internal threat intelligence program. Use external TI to help with program enhancements.

要查看或添加评论,请登录

Alex Maestretti的更多文章

  • New Year. New Job? Remitly security roles!

    New Year. New Job? Remitly security roles!

    This is always a fun this time of year as Twitter comes alive with new year’s resolutions and retrospectives on last…

  • Netflix and beyond

    Netflix and beyond

    It was about five years into my career in government when one of my mentors, Rick Wilson, forwarded me the original…

    20 条评论
  • Netflix Incident Response in LA

    Netflix Incident Response in LA

    I am excited to announce the latest opening on our Security Incident Response Team (SIRT), which is also our first…

  • Threat Intelligence for Vulnerability Management

    Threat Intelligence for Vulnerability Management

    Effective patch management remains as much a challenge today as it was a decade ago. The missing foundational piece is…

    4 条评论
  • Attribution and Threat Modeling

    Attribution and Threat Modeling

    Thank you for joining us on article two of our series about the Future of Threat Intelligence at Netflix. Early in my…

    2 条评论
  • The Evolution of IOCs

    The Evolution of IOCs

    Thank you for joining us for our series on Threat Intelligence. This is the first of our content posts, linked from our…

    11 条评论
  • A Learning Security Organization

    A Learning Security Organization

    When I was six my family spent a year in France as part of a Fulbright exchange. I dragged my parents to every castle I…

    5 条评论
  • A SOCless Detection Team at Netflix

    A SOCless Detection Team at Netflix

    I am excited to share that we are investing in additional detection capabilities as part of the SIRT mission. There are…

    37 条评论
  • On Call Developers

    On Call Developers

    In hiring for my team I sometimes get questions about on call. I wanted to share some context on how I view on call for…

  • Memory Forensics in Clouds and Containers

    Memory Forensics in Clouds and Containers

    At Netflix my targets are primarily Linux VMs running in a microservices environment. I rarely have to pursue criminal…

    1 条评论

社区洞察

其他会员也浏览了