Episode 114 - The Good, Bad, and Ugly of Threat Intelligence with Patrick Coughlin

In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview Patrick Coughlin, Co-Founder and CEO of TruSTAR. Patrick began his career as a security analyst in Washington D.C. and the middle east. By working with government contractors, multinational corporations, and counter-terrorism units, Patrick learned that the biggest challenge that security analysts have is retrieving the needed information from disparate data sources. This discovery led Patrick to founding TruStar. Patrick’s focus is to help organizations automate the collection and curation of threat intelligence data.

Patrick’s analytical prowess originated from working at Booz Allen Hamilton where he learned a fundamental skill that all cybersecurity analysts should have - how to put together a slide deck. This skill helped Patrick articulate the importance of threat intelligence to leaders in the government and private sector. 

As the episode progresses, Patrick details the differences between threat intelligence requirements for national security and enterprise. For enterprise threat intelligence programs, the goal is to accelerate automation of detection and rarely attribution. Patrick also mentions automation is only as effective as the data is cleaned, normalized, and prioritized. 

What about the good, bad, and ugly of threat intelligence? Patrick describes that an organization can thrive by leveraging internal intelligence. This can be overlooked when organizations are fixated on buying threat data feeds and subscribing to ISAC feeds. Most enterprise organizations have a detection and response stack that is constantly providing information about threats relevant to their organization - which serves as great threat intelligence data.

Chris and Ron ask Patrick about the science vs art aspects of cybersecurity and threat intelligence. Patrick describes that there is room for both art and science in threat intelligence. While new concepts are being discovered, there is art in finding the needle in the haystack. However, at some point, intuition can be described into steps that a machine can repeat. For example, after years of analytical practice an analyst can describe how and why they are tagging threat intelligence related data in such a way that can be repeated by other analysts or automation. 

This episode covers an abundance of tactics and techniques for threat intelligence analysts. Patrick describes the best place to begin automating threat intelligence is detection. An analyst can ask the question, “How do I get sources of known bad indicators into my detection stack so that I could drive high fidelity detections?”. As false positives decrease, your mean time to detection (MTTD) and resolution (MTTR) decrease which makes your threat intelligence and security operation team members more effective.

 

0:00 - Intro

1:53 - This episode features Patrick Coughlin, Co-Founder and CEO of TruSTAR

2:30 - Patrick’s background and start as a security analyst

5:19 - How to automate threat intelligence while reducing analyst fatigue

7:05 - How Patrick cultivated his analyst prowess

8:43 - Articulating threat intelligence to government and enterprise organizations

11:09 - Can a threat intelligence program be automated?

17:21 - Patrick’s experience of “good” and “bad” threat intelligence programs

20:31 - Logic vs Intuition in threat intelligence

27:04 - Artificial Intelligence and Machine Learning to make threat intelligence decisions

28:42 - Where to start when automating threat intelligence

30:02 - How to stay in touch with Patrick Coughlin

 

Links: 

Connect with Patrick Coughlin on LinkedIn

Link to Patrick’s company TruSTAR

Learn more about Hacker Valley Studio.

Support Hacker Valley Studio on Patreon.

Follow Hacker Valley Studio on Twitter.

Follow hosts Ron Eddings and Chris Cochran on Twitter.

Learn more about our sponsor ByteChek

Take our FREE course for building threat intelligence programs by visiting www.hackervalley.com/easy

Episodes

Cover for https://HackerValleyStudio.podbean.com/e/episode-170-the-beauty-of-cybersecurity-with-grace-chi/

Episode 170 - The Beauty of Cybersecurity with Grace Chi

Grace is Cofounder and COO of Pulsedive, a US-based threat intelligence startup. At P...

Details

Cover for https://HackerValleyStudio.podbean.com/e/episode-169-art-science-and-nanotechnology-with-dr-bahijja-raimi-abraham/

Episode 169 - Art, Science, and Nanotechnology with Dr. Bahijja Raimi-Abraham

Among other things, Dr. Bahijja Raimi-Abraham is an award-winning researcher, lecture...

Details

Cover for https://HackerValleyStudio.podbean.com/e/episode-168-asking-the-right-cybersecurity-questions-with-ganesh-pai/

Episode 168 - Asking the Right Cybersecurity Questions with Ganesh Pai

Hacker Valley's Hosts, Ron and Chris are speaking with Ganesh Pai, the CEO and founde...

Details

Cover for https://HackerValleyStudio.podbean.com/e/episode-167-fun-versus-fud-security-with-ashley-rose/

Episode 167 - Fun Versus ”FUD” Security with Ashley Rose

In today's episode Ron and Chris talk to Living Security's CEO and Co-Founder Ashley ...

Details

Cover for https://HackerValleyStudio.podbean.com/e/episode-166-there-is-no-skills-gap-with-andy-ellis/

Episode 166 - There is No Skills Gap with Andy Ellis

Hosts Ron and Chris interview Andy Ellis, CISO for over two decades that recently sta...

Details

Cover for https://HackerValleyStudio.podbean.com/e/episode-165-living-your-values-with-dean-sysman/

Episode 165 - Living Your Values with Dean Sysman

On this episode, Hacker Valley Studio has a very big announcement! Hosts Ron and Chri...

Details

Cover for https://HackerValleyStudio.podbean.com/e/episode-164-demystifying-product-innovation-with-erik-goldman/

Episode 164 - Demystifying Product Innovation with Erik Goldman

Hosts Ron and Chris interview guest Erik Goldman, VP of Product at Panther Labs, a so...

Details

Cover for https://HackerValleyStudio.podbean.com/e/episode-163-a-blueprint-for-learning-cyber-with-keith-wilson/

Episode 163 - A Blueprint for Learning Cyber with Keith Wilson

Hosts Ron and Chris interview guest Keith Wilson, director of cyber security educatio...

Details

Cover for https://HackerValleyStudio.podbean.com/e/episode-162-security-in-space-with-frank-pound/

Episode 162 - Security in Space with Frank Pound

What do you call cyberspace in space? What is the evolution of cyber security in spac...

Details

Cover for https://HackerValleyStudio.podbean.com/e/quickq-what-is-social-networking-hacker-summer-camp-fomo/

QuickQ: What is Social Networking? Hacker Summer Camp FOMO

In this episode of Hacker Valley, Chris and Ron tackle a quick question. The question...

Details

Cover for https://HackerValleyStudio.podbean.com/e/episode-160-creating-valuable-tech-content-with-ken-underhill/

Episode 160 - Creating Valuable Tech Content with Ken Underhill

Ken Underhill is an award-winning cyber security executive, entrepreneur, and teacher...

Details

Cover for https://HackerValleyStudio.podbean.com/e/quickq-what-is-threat-hunting/

QuickQ: What is Threat Hunting?

In this episode of Hacker Valley, Chris and Ron are joined by a familiar friend, Vale...

Details


Philosophies

Chris Cochran

Chris Cochran

Cybersecurity is not technology centric, in my opinion. It is human centric. I am driven by my duty to not only protect people, but enlist and inspire the next generation of cybersecurity professionals.

Ronald Eddings

Ronald Eddings

The pursuit of knowledge always leads to something, so be open to whatever that is. It could be becoming the best, but it’s going to lead something and it’s most likely going to be a positive impact on your life.

Allan Alford

Allan Alford

It's not enough to be knowledgeable and skilled. Without passion you might as well be doing something else. Surround yourself with people who are passionate about what they do and the rest will come together.

CJ Howard

CJ Howard

Learning and listening allows you to access new perspectives and frames of mind. I believe that information is meant to be shared generously, but understanding without compassion is like a map without a legend.

Episode 170 - The Beauty of Cybersecurity with Grace Chi

00:00:00
00:00:00