Top Banner
THREATQUOTIENT, INC. PROPRIETARY CONFIDENTIAL Positioning Intelligence at the Heart of security processes in order to revolution Cyber Defense
11

Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

Sep 11, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

THREATQUOTIENT, INC. PROPRIETARY CONFIDENTIAL

Positioning Intelligence at the Heart of security processes in order to revolution Cyber Defense

Page 2: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

Wayne Chiang, Co-Founder Ryan Trost, Co-Founder

THREATQUOTIENT, INC. PROPRIETARY CONFIDENTIAL

• SoftwareEngineer/CyberSecurityPractitioner

• IEEEInfoAssuranceAuthor• 10YearsIndustryExperience• PerpetualOptimizer

• PublishedAuthor (2009&est.2015)• IndustryThoughtLeader(presented

atSANS,BlackHat,DEF CON,ISACAISRM,Interop)

• 15yearsIndustryExperience• ManagedGeneralDynamics&

USGSecurityOperationsCenter(SOC)

John Czupak, CEO

• 25+yearsstartup&cyberexperience• BroadexecutivelevelexperiencewithCisco,

Sourcefire,Axent Technologies&more• ExtensiveGo-To-Marketbackground• Garagebandguitarplayer

World Class Team

Page 3: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

3

Page 4: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

4

Page 5: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

5

Page 6: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

@

6

Page 7: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

7

Page 8: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

8

MesAdversaires

Donnéesexternes:OSINT,Rapports,…

Donnéesamies:GroupeMISP,CERT,Emails…

DonnéesMondeRéel:Ticketing /SIEM/IR/SANDBOX

FW/IPS WEB MAIL…

SIEM

Donnée Information Renseignement

Détection, Priorisation &Prévention

Page 9: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

9

Page 10: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

Threat Intelligence defense maturity leverage

10

PartialReactive Proactive Adapt ive

Protect the Enteprise Project the Threat

-CISO-DedicatedVuln.MngmtCapability-Basicsecurityinfrastructure

-CISO-DedicatedVuln.Mngmtcapability-BasicSOC/IRTcapability-Perimeterenterprisesecurityinfrastructure-Externalthreatindicatorfeeds/data

-CISO-DedicatedVuln.Mngmtcapability-AdvancedSOC/IRTcapability-CTITeam-Perimeter/internalenterprisesecurityinfrastructure-ExternalCTIconsumption(contextandindicators)

-CISO-DedicatedVuln.Mngmtcapability-SOC/IRT/CTIcapabilityw/totalinteroperability-Intelligence-integratedperimeterandinternalenterprisesecurityinfrastructure-ExternalandinternalCTIconsumption(contextandindicators)

Organ iza t iona l D i sposi t ionEmploy basic/t raditional defenses Total intell igence-driven cybersecurity

Page 11: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

THREATQUOTIENT, INC. PROPRIETARY CONFIDENTIAL

Questions?