intelligence driven defense folio
TRANSCRIPT
-
7/27/2019 Intelligence Driven Defense Folio
1/12
www.boozallen.com
Intelligence-Driven SecurityMinimize Risk by Mastering the Motives, Strategies,
and Tactics of Your Cyber Adversaries
Written by:
Christopher Ling and Bill Wansley
-
7/27/2019 Intelligence Driven Defense Folio
2/12
INTELLIGENCE-DRIVEN SECURITY - MINIMIZE RISK BY MASTERING THE MOTIVES, STRATEGIES, AND TACTICS OF YOUR CYBER ADVERSARIES
This Booz Allen Interactive Marketing
Brie is comprised o interactive
elements or a more engaging anddynamic user-experience. For your
reerence, the key below explains the
interactive elements.
INTERACTIVE ELEMENTS:
How to Use This Document?
As you expand your business in cyberspace,
you increase the opportunities or cyber
adversaries to steal intellectual propertyand assets, disrupt global networks, and
shut down global supply chains because
traditional perimeter deenses are no longer
sucient to stop them.
To prevent, detect, and predict cyber threats
beore they strike, you demand a dynamic-
deense approach to security a holistic
approach that integrates your people,
processes, and technology to produce the
actionable intelligence you need to stop
adversaries beore they harm your business.
CYBERSPACE OPPORTUNITIES:
GROWTH, PERFORMANCE, PROFITABILITY
Thanks to technology innovations in cyberspace,
your company is enjoying opportunities toexpand to new markets, partner with low-cost
providers in emerging economies, implement
ecient just-in-time supply chains, and drive
protability and shareholder value.
Mobile devices are improving the
productivity o your increasingly dispersed
workorce, social media is opening new
avenues to grow and nurture customers, and
the cloud is allowing you to cost-efectivelycollect and analyze data, gain valuable
insights, and make more inormed business
decisions. Though such digital technologies
open up opportunities, they also open your
company up to unprecedented levels o risk.
Consider:
Digital technology allows complex
nancial transactions to traverse multiple
locations and approvals in nanoseconds,
but how do you respond when the
approval process is inltrated and
corrupted?
Innovations with just-in-time inventory
have revolutionized your manuacturing
operations and are saving you millions,but how do you keep your operations
running when your system has been
breached and your supply chain has been
disrupted?
How do you enjoy the benets o cyberspace
without acing increased risk?
Introduction
Play Video
Play Video Fullscreen
Interactive Button
Interactive Button
Indicates a Scrollable
Text Area
Button
Button
1
-
7/27/2019 Intelligence Driven Defense Folio
3/12
INTELLIGENCE-DRIVEN SECURITY - MINIMIZE RISK BY MASTERING THE MOTIVES, STRATEGIES, AND TACTICS OF YOUR CYBER ADVERSARIES
Modern Cyber Threats: A Risk to Your Image, Operations, and Bottom Line
2
-
7/27/2019 Intelligence Driven Defense Folio
4/12
INTELLIGENCE-DRIVEN SECURITY - MINIMIZE RISK BY MASTERING THE MOTIVES, STRATEGIES, AND TACTICS OF YOUR CYBER ADVERSARIES
Needed: Intelligence-Driven Security
3
-
7/27/2019 Intelligence Driven Defense Folio
5/12
INTELLIGENCE-DRIVEN SECURITY - MINIMIZE RISK BY MASTERING THE MOTIVES, STRATEGIES, AND TACTICS OF YOUR CYBER ADVERSARIES
To that end, we embed layers of security not justin your IT networks and systems, but across yourenterprise your policies, operations, management,
and people.We implement smart, proactive security policies, and train and inorm your people on
how to apply them, to limit opportunities or your adversaries to strike.
This ully integrated approach to security gives you complete visibility and
understanding into all potential risks across your enterprise and the actions you
must take to prevent, detect, and predict cyber attacks beore they harm your
ability to conduct business reely in cyberspace.
4
-
7/27/2019 Intelligence Driven Defense Folio
6/12
INTELLIGENCE-DRIVEN SECURITY - MINIMIZE RISK BY MASTERING THE MOTIVES, STRATEGIES AND TACTICS OF YOUR CYBER ADVERSARIES
Incident Response:Rapid Remediation, Long-Term Analysis
-
7/27/2019 Intelligence Driven Defense Folio
7/12
INTELLIGENCE-DRIVEN SECURITY - MINIMIZE RISK BY MASTERING THE MOTIVES, STRATEGIES AND TACTICS OF YOUR CYBER ADVERSARIES
Threat Intelligence:Understanding Your Adversaries
-
7/27/2019 Intelligence Driven Defense Folio
8/12
INTELLIGENCE-DRIVEN SECURITY - MINIMIZE RISK BY MASTERING THE MOTIVES, STRATEGIES AND TACTICS OF YOUR CYBER ADVERSARIES
Preemptive Response:Developing a Strategic Roadmap
-
7/27/2019 Intelligence Driven Defense Folio
9/12
INTELLIGENCE-DRIVEN SECURITY - MINIMIZE RISK BY MASTERING THE MOTIVES, STRATEGIES AND TACTICS OF YOUR CYBER ADVERSARIES
5
Integrated Remediation:Continuous Feedback & Improvement
-
7/27/2019 Intelligence Driven Defense Folio
10/12
INTELLIGENCE-DRIVEN SECURITY - MINIMIZE RISK BY MASTERING THE MOTIVES, STRATEGIES, AND TACTICS OF YOUR CYBER ADVERSARIES
It Takes a Network to Defend a Network
6
-
7/27/2019 Intelligence Driven Defense Folio
11/12
INTELLIGENCE-DRIVEN SECURITY - MINIMIZE RISK BY MASTERING THE MOTIVES, STRATEGIES, AND TACTICS OF YOUR CYBER ADVERSARIES
A Senior Vice President at
Booz Allen Hamilton, Bill
Wansley develops advanced
intelligence-based security
services to better understandand predict cyber security threats. He holds
a BS degree in engineering rom the US
Military Academy, West Point, an MBA rom
Creighton University, and an MMAS in theater
operations rom SAMS.
WILLIAM J. WANSLEY
A Senior Vice President at Booz
Allen Hamilton, Christopher Lingleads our military intelligence
support operations and specializes
in high-level strategies that
improve intelligence support. He holds B.S.
and M.S. degrees in Physics rom Cambridge
University and won a National Science
Foundation ellowship or advanced physics at
Harvard University.
CHRISTOPHER LING
About The AuthorsConclusion
Booz Allen is a thought leader in the use o sophisticated analytic tools that identiy anomalies that
help us identiy breaches, gather intelligence on perpetrators, and shut the perpetrators down.
Our intelligence-driven, dynamic-deense approach to security will deliver the condence youneed to prevent, detect, and predict rapidly evolving cyber threats, respond with maximum
speed when breaches occur, ensure that your business is secure, and continuously improve
your deense processes to keep you several steps ahead o todays adversaries. We will help you
secure cyberspace so you may grow your business reely.
About Booz Allen Cyber Services
Booz Allens intelligence-driven, dynamic-deense approach to security helps organizations
build secure cyber architectures and develop and implement efective standards to
ensure interoperability, integration, and innovation. Our thousands o experienced cyber
proessionals nationwide ofer unparalleled expertise in cyber assurance, engineering,
solutions, IT management, and mission assurance.
7
William J. Wansley
Christopher Ling
-
7/27/2019 Intelligence Driven Defense Folio
12/12
INTELLIGENCE-DRIVEN SECURITY - MINIMIZE RISK BY MASTERING THE MOTIVES, STRATEGIES, AND TACTICS OF YOUR CYBER ADVERSARIES
Booz Allen Hamilton
has been at the forefrontof strategy and technologyconsulting for nearlya century.
Today, Booz Allen is a leading provider o
management and technology consulting
services to the US government in deense,
intelligence, and civil markets, and to
major corporations, institutions, and not-
or-prot organizations. In the commercial
sector, the rm ocuses on leveraging
its existing expertise or clients in the
nancial services, healthcare, and energy
markets, and to international clients in the
Middle East. Booz Allen ofers clients deepunctional knowledge spanning strategy and
organization, engineering and operations,
technology, and analyticswhich it
combines with specialized expertise in clients
mission and domain areas to help solve their
toughest problems.
The rms management consulting heritage
is the basis or its unique collaborative culture
and operating model, enabling Booz Allen toanticipate needs and opportunities, rapidly
deploy talent and resources, and deliver
enduring results. By combining a consultants
problem-solving orientation with deep
technical knowledge and strong execution,
Booz Allen helps clients achieve success in
their most critical missionsas evidenced by
the rms many client relationships that spandecades. Booz Allen helps shape thinking and
prepare or uture developments in areas o
national importance, including cybersecurity,
homeland security, healthcare, and inormation
technology.
Booz Allen is headquartered in McLean, Virginia,
employs approximately 25,000 people, and
had revenue o $5.86 billion or the 12 months
ended March 31, 2012. Fortune has named
Booz Allen one o its 100 Best Companies to
Work For or eight consecutive years. Working
Mother has ranked the rm among its 100
Best Companies or Working Mothers annually
since 1999. More inormation is available at
www.boozallen.com. (NYSE: BAH)
About Booz Allen
8
Our Locations
Find any o our locations here
About Booz AllenLearn even more on our website
Booz Allen InsightsDownload or your iPad rom theApple App store