top of page

Trend Micro User Research
Discover the Needs of the Person in Charge
CISOs' Needs of Cyber Threat Intelligence

Proposed by HIE User Researcher

Joseph Yeh | Senior UXR

Monly Zhuang | UXR intern

Research Overview

  • Project Duration: 2 months

  • Conducted in-depth interviews with the most executive security leaders of U.S. organizations

  • Clarify 3 key TI usage motivations and scenarios, and E2E processes

  • Integrate demand pain points and TM's advantages, and propose 3 key business strategies.

  • The proposed product value proposition has been officially adopted and released.

Research Background

"Threat Intelligence" still remains a critical unknown area

Threat Intelligence (TI) is critical information for VLM and high-risk industries, which serves not only to mitigate the likelihood of attacks but also to enhance crisis response capabilities. In the past, Trend Micro focused on threat detection and response, and had not yet developed early-stage threat prevention-related solutions, such as "TI".

The Chief Information Security Officer (CISO) assumes a pivotal role in determining the acquisition of TI solutions. Thus, this study commences by examining the requirements of our main customer, American CISOs, regarding TI and delves into the forms of TI and the associated processes necessary for crafting pertinent product strategies.

image_edited.jpg

Research Objective

In this research, we would like  to know...

Motivation &
Use Cases

1

E2E Process

2

CISOs' Motivation, Use cases, and E2E process to apply Cyber Threat Intelligence in works.

Positioning

Trend Product

3

And find out the most valuable strategy for TM.

Objective

Introduction | What is Threat Intelligence

Threat Intelligence is knowledge of attack, and risk

截圖 2024-03-13 下午5.16.28.png

There are 4 types of TI, Strategic, Operational, Tactical, and Technical.

For CISOs, they are more inclined to utilize
Strategic and Operational Threat Intelligence, which is conveyed in human language and encompasses information essential for preemptive measures before an attack or for managing situations post-attack.

Threat Intelligence can be conveyed in diverse

For CISOs, they are more likely to digest high-level TI through podcasts, blogs, forums, and emails.

Delivery Format

TI Venders

截圖 2024-03-13 下午5.27.30.png
Introduction

Research Method

Transform User Interviews to Business Strategies

User
Research

1.5 month

  • Interviewee Recruitment

  • User Interviews

  • Analysis: use case and E2E processes

Strategy Development

0.5 month

  • Defined Target Audience

  • TI Product Value and Purpose

  • Key Features Suggestions

In this research, we interviewed the Cyber Security Executive Managers from the U.S.

 

The participants of this research were selected from the members listed in the PM OPS (the team responsible for customer communication) customer list.

All members on this list are customers of significant importance, prompting the PM OPS team to hold weekly meetings to address issues or gather their requirements.

Method
Insight

Research Insight

Use cases, E2E Process

3 Major Use Cases for CISOs to
Apply Cyber Threat Intel in Works

截圖 2024-03-13 下午7.02.35.png

Use Case 1.
Ensure to Meet Gov. Compliance

Government (US-CERT), is the primary TI provider

1. Adjust the environment to suit the policy

Gov. will email TI to CISOs from vulnerabilities to the policies covering all software and endpoint devices. The institute members need to filter out the related issues and prioritize the severity to decide whether to adjust their environment.

"Sometimes the emails will marked like red or amber, then I would pay attention to them because they're more likely a serious event. I'll see if that email applies to what we're doing."

截圖 2024-03-13 下午7.09.39.png

2. Enrich the TI community through the reporting mechanism

The US Gov. established a TI community by reporting mechanism: 

  • Upon receiving critical or related TI, the enrolled members must follow the instructions, then ask the SOC team to fill out the fixed format questionnaire of US-CERT to ensure the threat is being handled and enrich the solution toward the threat.

  • On the other hand, if the enrolled members met a new threat, they also had to fill out the questionnaire of US-CERT to enrich the TI community.

"If you encounter a data breach, you need to fill out a questionnaire of US-CERT, because they need to collect that information and deliver it to other CIOs. And the companies that encounter ransomware, data breach must report to us-cert within 72 hours."

For CISO, it's also critical to "Play It Safe"

In government institutes, the biggest goal of the CIO/CISO is to keep their jobs, so the decision would tend to be conservative, like using products with Gov. recommended or good reputations and changing the inner environment to meet the policies announced by Gov.

I wanted to replace our endpoint protection before, and deloitte offered 3 best-selling products in the U.S., McAfee, Symantec & Trend Mirco; I chose Symantec but for TM because Gov. hadn't used TM product before. I didn't want to take the risk of losing my job. I wanted to play it safe."

The problems of meeting the Government's compliance

1. Hard to differentiate the critical TI

The U.S. government established a community, sharing comprehensive TI related to the U.S., while the sharing wouldn't depend on the members' environment, which makes it difficult to differentiate the ones critical to themselves.

“Email usually contains general information and will not send letters for different environments. Sometimes they send too many letters to me, and I can’t tell which one is important”

“A lot of times I do not use the products they mentioned, so I'll just delete them. Like here, we don't use FortiNAC, but here's something about FortiNAC having some problems, so I'll delete this one.”

2. Concern of product reputation (for Trend Micro)

For government CISO, the investment of the security tools would be chosen from popular brands that had been used before, which means having a good reputation, to ensure the decision will not cause any problems. Therefore it's hard for a new company to play in the field.

Use Case 2.
Report to C-Suite

Explain and then Convince the Top Executive Manager

截圖 2024-03-13 下午7.54.09.png

1. Explain security events/news that occur outside

The C-Suite will be concerned about cybersecurity issues, especially when they notice something happening outside, but most of them don't understand the situation and need further explanation.

"When they(C-suites) saw something (cyber events) on the news, they would ask. For example, will we be ransomed by that ransomware? Where does the ransomware come from?"

TI is typically conveyed through general CISO reports

  • Only Strategic / Operational will be conveyed.​​

  • Covers security improvements and security events.

The information C-Suite needs to know:

  • How good is our security posture?​​

  • ​What is the threat?  Would it impact us?  How’s the impact?  What is the plan?

截圖 2024-03-13 下午10.47.18.png
截圖 2024-03-13 下午7.54.09.png

2. Convince to adjust security policies or investments.

Some critical security investments require significant human resources and funding, making it easier to convince executives with a higher security mindset because they know their importance.

"There is often a conflict between operations and security, but everyone reports to the CIO at the same level. Operations may doubt why they need to assist in security. If the C-Suite is more knowledgeable about how to use ransomware news to their advantage, we're more likely to succeed."

The problems of Report to C-Suite

Hard to convert the TI terminology into vernacular communication.

Most of the superiors do not understand the technical terminology of information security and need to convert it into very vernacular communication. Therefore it often takes a long time to explain, or decrease the possibility of investing more in critical security solutions.

Use Case 3.
Monitor & Discuss with SOC Team

SOC team digests TI both
proactively and automatically via different types.

Proactively digest Strategical/ Operational TI through blogs, podcast

Both CISO and SOC team members will proactively absorb new TI via blogs, and podcasts related to cyber security. So that they can keep up to date on the security issues, and prepare in advance.

"Most of the threat intelligence is directly sent to the CISO through emails (e.g., SolarWinds event)"

截圖 2024-03-13 下午8.59.32.png
截圖 2024-03-13 下午9.00.21.png

Venders: SANS                /      DarkReading

"They(SOC) listen to podcasts like the SANS Internet Storm Center, which gives the latest 24-hour updates on things that happened in the cyber world. It's 15-minute news, so I listened to that when going to work. This morning when I was driving in, they mentioned another password manager security issue, LastPass issues, that have gone around."

Automatically fed Tactical/ Technical TI into security platforms to enrich the detection & response process

The code format threat intelligence, such as Tactical and Technical TI, will be directly sent to the security platform, to enrich the detection system.

"One of the engineers at Trend Micro helped to write a PHP script that converts the feeds and imports it into Vision One(Trend Micro's product). It retrieves data every Friday, grabs a new block list & removes the old one. When we have our machines going out and talking to IP addresses which are potentially C&C servers, it'll block any connections and alert us."

"We started doing actual threat Intel with "Insights" which was acquired by "Rapid 7".

I had all the feeds sent to Rapid7."

Prioritize: Only the TI related to us matters!

“Criticality” and “Scope” of impact assets are the key factors.

To prioritize the Threat Intelligence, they usually consider the criticality and the scope of the asset, to determine the impact scope of the TI. 
For example, if all members of the company use Mac as a work tool, then the scope is large, then Mac-related TI will be a high priority.

"I would like to have the TI integrate with assets inventory to see the impact scope... The information can improve their risk management."

"We usually key in the tool we use for searching, business product. If the bulletin of the newsletter was about a tool that we use in-house, we would look to see if we had availability in that piece of software and we would patch."

The "Communication" system must never go down.

The communication tools, such as Teams, Slack, Email, and so on will be a high priority to handle, because damage to these tools will significantly affect the recovering process.

"If it will impact our communicate system like email/teams. You cannot solve problems because you cannot connect with others."

The problems of Monitor & Discuss with SOC Team

Too much “irrelevant” information among a bunch of TI materials

The data provided by public TIs (such as US-CERT) used mainly by businesses and government agencies in the United States have no filtering system, making it difficult to extract the real key information.

"If the intel is not tailored to your environment, they may not provide substantial help."

"I feel like I cannot get any more value from the open and public feeds.

So I had all the feeds sent to Rapid7. I set a profile for our company and our profile says we're manufacturing, so of anything that comes in related to health care, it’ll filter that out.

So, I have predefined a company profile if you will identify things that are of interest versus irrelevant things." 

Summary

The Problems of TI Usage by CISOs

Use case 1: Ensure to Meet Gov. Compliance

1. Hard to differentiate the critical TI

2. Concern of product reputation (for Trend Micro)

Use case 2: Report to C-Suite

3. Hard to convert the TI terminology into vernacular communication.

Use case 3: Monitor and Discuss with SOC team

4. Too much “irrelevant” information among a bunch of TI materials

Business Strategy

Target Audience, Value Proposition, Key Feature

Strategies

Target Audience:
Government Institute

Build our brand reputation for government organizations or companies that need to meet government requirements and compliance. Therefore prioritize Trend Micro products.

Government.webp

Insight
Gov. has enough resources and the community can apply and empower the TI solution

  • Governments and VLEs have more resources to build mature security teams

  • Due to the inspection system, CIOs and CISOs have a conservative attitude toward investing in information security products.

  • The government has a complete TI-sharing community system.

  • All government agencies are included in the above-shared system.

截圖 2024-03-13 下午10.27.22.png

Key Feature1
Support government TI, and Report System

All the government institutes in the U.S. need to follow the rules of gov. 

Therefore it would be very convenient if the TI from gov. could be well organized and generated into a needed report automatically. 

Allegra_essentail no. 2_impact assessment_web (1).jpg

Value Proposition:
Defining 
the impact of TI

Serve as a TI manage platform to help users import and organize threat intelligence from different sources, and filter information by their “ tools in use/ industry ”.

Insight
Filtering out the relevant and prioritizing the critical TI is a must. 

  • Too much irrelevant information among a bunch of TI materials.

  • Only external threats are not valuable enough for the enterprise to take further action.

  • User search “Tools used in their environment ” or “keywords related to their industry” as their first step.

  • The “criticality” and “scope” of impact assets are the key factors that CISOs and their SOC team consider when prioritizing threat intel and planning action.

Our Advantages
External Threat * Internal Security Posture

The beauty of Trend Micro is that it provides complete risk visibility to assist customers in assessing the potential impact of threats on their environment. Especially by clarifying the relationship between the threat(TI) and their asset.

Such as, Recorded Future, they tracks nearly 600 million domains, scan billions of posts, and other DNS record. Then, match them with customer’s assets to provide a list of risky “internet facing assets” that help customers to address the risk and take action.

截圖 2024-03-13 下午10.14.03.png

Referred by Recorded Future

Key Feature 2
Generate Vernacular Security Reports

Help clients conduct strategic/operational TI that is easy to understand so that it can be explained in reports to the top executive manager.

Covers below:

  • What’s the threat?

  • What’s the impact?

  • What’s the reaction plan?

Artificial-intelligence-1024x577.png

Insight
Needs to communicate with C-Suite by vernacular report

  • Strategic / Operational TI is typically communicated through general CISO reports.

  • Top management doesn’t understand most internet and cyber terminology.

截圖 2024-03-13 下午10.58.46.png

Integrate with generative AI tools, such as GPT.

Recorded Future AI 2023. 4. 11.

It is said to be the first threat Intel platform powered by artificial intelligence. Open AI GPT is used as an analysis and report generation engine to leverage threat intelligence from Intelligence Cloud and Insikt Group.

Project Outcome

The value proposition we proposed,

"Define the Impact of TI,"

has been officially adopted and released.

截圖 2024-05-08 下午1.58.22.png
截圖 2024-05-08 下午1.57.58.png

Personal Reflection

Develop specific strategies
for selling to government agencies.

In this study, we interviewed top-level cybersecurity executives about their thoughts and actions regarding threat intelligence, gaining highly valuable insights.

However, I believe it is somewhat unfortunate that, although we suggested defining "government agencies" as the primary target group, as the research results indicate, government agencies are also the most challenging to adopt new products or brands.

Interestingly, the U.S. government uses some of our other products. Therefore, if given another opportunity, I would like to explore the sales and marketing strategies used for those products to develop more concrete action plans.

© 2024 by Monly Zhuang  |  All rights reserved
bottom of page