positioning intelligence at the heart of security processes in ......2016/11/08 · threat...
TRANSCRIPT
![Page 1: Positioning Intelligence at the Heart of security processes in ......2016/11/08 · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the](https://reader034.vdocuments.net/reader034/viewer/2022051900/5fee85dfadf80116ac216f84/html5/thumbnails/1.jpg)
THREATQUOTIENT, INC. PROPRIETARY CONFIDENTIAL
Positioning Intelligence at the Heart of security processes in order to revolution Cyber Defense
![Page 2: Positioning Intelligence at the Heart of security processes in ......2016/11/08 · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the](https://reader034.vdocuments.net/reader034/viewer/2022051900/5fee85dfadf80116ac216f84/html5/thumbnails/2.jpg)
Wayne Chiang, Co-Founder Ryan Trost, Co-Founder
THREATQUOTIENT, INC. PROPRIETARY CONFIDENTIAL
• SoftwareEngineer/CyberSecurityPractitioner
• IEEEInfoAssuranceAuthor• 10YearsIndustryExperience• PerpetualOptimizer
• PublishedAuthor (2009&est.2015)• IndustryThoughtLeader(presented
atSANS,BlackHat,DEF CON,ISACAISRM,Interop)
• 15yearsIndustryExperience• ManagedGeneralDynamics&
USGSecurityOperationsCenter(SOC)
John Czupak, CEO
• 25+yearsstartup&cyberexperience• BroadexecutivelevelexperiencewithCisco,
Sourcefire,Axent Technologies&more• ExtensiveGo-To-Marketbackground• Garagebandguitarplayer
World Class Team
![Page 3: Positioning Intelligence at the Heart of security processes in ......2016/11/08 · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the](https://reader034.vdocuments.net/reader034/viewer/2022051900/5fee85dfadf80116ac216f84/html5/thumbnails/3.jpg)
3
![Page 4: Positioning Intelligence at the Heart of security processes in ......2016/11/08 · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the](https://reader034.vdocuments.net/reader034/viewer/2022051900/5fee85dfadf80116ac216f84/html5/thumbnails/4.jpg)
4
![Page 5: Positioning Intelligence at the Heart of security processes in ......2016/11/08 · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the](https://reader034.vdocuments.net/reader034/viewer/2022051900/5fee85dfadf80116ac216f84/html5/thumbnails/5.jpg)
5
![Page 6: Positioning Intelligence at the Heart of security processes in ......2016/11/08 · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the](https://reader034.vdocuments.net/reader034/viewer/2022051900/5fee85dfadf80116ac216f84/html5/thumbnails/6.jpg)
@
6
![Page 7: Positioning Intelligence at the Heart of security processes in ......2016/11/08 · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the](https://reader034.vdocuments.net/reader034/viewer/2022051900/5fee85dfadf80116ac216f84/html5/thumbnails/7.jpg)
7
![Page 8: Positioning Intelligence at the Heart of security processes in ......2016/11/08 · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the](https://reader034.vdocuments.net/reader034/viewer/2022051900/5fee85dfadf80116ac216f84/html5/thumbnails/8.jpg)
8
MesAdversaires
Donnéesexternes:OSINT,Rapports,…
Donnéesamies:GroupeMISP,CERT,Emails…
DonnéesMondeRéel:Ticketing /SIEM/IR/SANDBOX
FW/IPS WEB MAIL…
SIEM
Donnée Information Renseignement
Détection, Priorisation &Prévention
![Page 9: Positioning Intelligence at the Heart of security processes in ......2016/11/08 · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the](https://reader034.vdocuments.net/reader034/viewer/2022051900/5fee85dfadf80116ac216f84/html5/thumbnails/9.jpg)
9
![Page 10: Positioning Intelligence at the Heart of security processes in ......2016/11/08 · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the](https://reader034.vdocuments.net/reader034/viewer/2022051900/5fee85dfadf80116ac216f84/html5/thumbnails/10.jpg)
Threat Intelligence defense maturity leverage
10
PartialReactive Proactive Adapt ive
Protect the Enteprise Project the Threat
-CISO-DedicatedVuln.MngmtCapability-Basicsecurityinfrastructure
-CISO-DedicatedVuln.Mngmtcapability-BasicSOC/IRTcapability-Perimeterenterprisesecurityinfrastructure-Externalthreatindicatorfeeds/data
-CISO-DedicatedVuln.Mngmtcapability-AdvancedSOC/IRTcapability-CTITeam-Perimeter/internalenterprisesecurityinfrastructure-ExternalCTIconsumption(contextandindicators)
-CISO-DedicatedVuln.Mngmtcapability-SOC/IRT/CTIcapabilityw/totalinteroperability-Intelligence-integratedperimeterandinternalenterprisesecurityinfrastructure-ExternalandinternalCTIconsumption(contextandindicators)
Organ iza t iona l D i sposi t ionEmploy basic/t raditional defenses Total intell igence-driven cybersecurity
![Page 11: Positioning Intelligence at the Heart of security processes in ......2016/11/08 · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the](https://reader034.vdocuments.net/reader034/viewer/2022051900/5fee85dfadf80116ac216f84/html5/thumbnails/11.jpg)
THREATQUOTIENT, INC. PROPRIETARY CONFIDENTIAL
Questions?