Focussed on understanding high level trends and adversarial motives, and then leveraging that understanding to engage in strategic security and business decision making.
Stakeholders:
• CISO
• CIO
• CTO
• Executive Board
Focused on understanding adversarial capabilities, infrastructure and TTPs, and then leveraging that understanding to conduct more targeted and prioritized cybersecurity operations.
Stakeholders:
• Threat Hunter
• SOC Analyst
• Vulnerability Management
• Incident Response
Focused on performing Malware analysis and Enrichment, as well as ingest atomic, static and behavioural threat indicators into defensive cybersecurity systems
Stakeholders:
• SOC Analyst
• SIEM and Datalakes
• Endpoints and Servers
• Network Security
Tactical Threat Intel
Tactical Threat Intel
DRP and Phishing Malicious URL’s – Per Brand
Operational Threat Intel
Operational Threat Intel
DRP Scams and Trademark Abuse – Per Brand
Strategic Threat Intel
Strategic Threat Intel
Takedown Services - 1
Enrichment & Curation
Enrichment & Curation
Takedown Services - 2
Dark Web Monitoring
Dark Web Monitoring
Takedown Services - 3