A Structured Approach to Using Threat IntelligenceUjjivan Bank CISO Ratan Jyoti on the Need for Clear Procedures
Organizations need to take a more structured approach to using threat intelligence, with clearly defined procedures, to improve detection of malicious attacks, says Ratan Jyoti, CISO at Ujjivan Bank.
"Threat intelligence works best in the form of indicators of attacks - malicious IP, malicious hashes and malicious domains and feeds," Jyoti says in an interview with Information Security Media Group. "Threat intelligence works best for perimeter security."
Jyoti points out that organizations can use two forms of threat intelligence: "Operational TI is generated by computers and systems whereas strategic TI is generated by humans."
In this interview (see audio link below image) Jyoti also discusses:
- The importance of benchmarking threat intelligence;
- The role artificial intelligence will play in automating some processes;
- Cybersecurity trends for 2018.
Jyoti is the first CISO of Ujjivan Small Finance Bank. He formerly was CISO of Vijaya Bank. He has 15 years of experience, with expertise in setting up cybersecurity infrastructure from scratch. Earlier, he worked at Oriental Bank of Commerce and Corporation Bank.