threat intelligence solution demonstration

11
Threat Intelligence Solution Demonstration

Upload: surfwatch-labs

Post on 18-Jan-2017

233 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Threat Intelligence Solution Demonstration

Threat Intelligence Solution Demonstration

Page 2: Threat Intelligence Solution Demonstration

Today’s Speaker

2

Adam MeyerChief Security StrategistSurfWatch Labs

Page 3: Threat Intelligence Solution Demonstration

Intelligence-Driven Security Ensures You are Focusing on the Right Areas

3

Source: EMC

Page 4: Threat Intelligence Solution Demonstration

4

Nation State: • Typically leverage cyber capabilities to engage in long term

campaigns focusing on economic, industrial, and government espionage

Criminal: • Cyber crime is a business - high return taking little effort

• Target businesses that are custodians of a commodity that can be monetized:

- Identity information (Employee & Consumer)

- Financial Information (Payment, Banking, Gift Card, Coupons, Entertainment accounts etc.)

• Criminals will target any business that provides an avenue into high value entities

- Defense/law enforcement

- Critical Infrastructure

- Supply Chain

Know Your Adversary

Page 5: Threat Intelligence Solution Demonstration

The Threat Balloon

Adversaries shift their tactics to hit targets

that are:“Attractive” and “Soft”

5

Page 6: Threat Intelligence Solution Demonstration

6

How is Your Intelligence Used?

Cyber Threat Intelligence needs to help you focus on

Making Decisions and Taking the Right Action

It’s no different than Intelligence you are using for other areas of the business.

Page 7: Threat Intelligence Solution Demonstration

7

Mitigating Risk with Practical Cyber Threat Intelligence

• Consider “Co-Managed” Intel –Complement your intel and facilitate faster, more effective risk management decisions

• Focus on Analysis – It’s less about getting more data and more about enabling sound analysis

• Link Intel to Business Impact – Avoid alert fatigue by worrying about threats specific to your business

• People, Process, Technology – Good intelligence leverages automation, expert human analysis and a process for using the intel

Page 8: Threat Intelligence Solution Demonstration

8

Threat Intelligence Suite

Page 9: Threat Intelligence Solution Demonstration

9

SurfWatch Cyber Advisor

Cyber intelligence and insights delivered to Key Stakeholders • Establish a unique, in-depth cyber risk profile• Personalize and adapt the SurfWatch Threat

Intelligence Suite to suit your business profile• Continuously and proactively monitor the cyber

risk landscape for new, emerging or trending threats

• Produce relevant cyber threat alerts and reports with best practice recommendations to mitigate risks

• Includes a 10 user annual subscription to Threat Intelligence Suite

• Option for Dark Web Surveillance and monitoring

Page 10: Threat Intelligence Solution Demonstration

Q&A and Additional SurfWatch Labs Resources

SurfWatch Cyber Advisor:www.surfwatchlabs.com/cyber-advisor

Dark Web Surveillance: www.surfwatchlabs.com/dark-web-intelligence

Threat Intelligence Suite:www.surfwatchlabs.com/threat-intelligence-suite

Personalized SurfWatch Demonstration:info.surfwatchlabs.com/request-demo

Strategic and Operational Threat Intelligence

10

Page 11: Threat Intelligence Solution Demonstration

Thank You!

www.surfwatchlabs.comFollow us at: