Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat...

11
THREATQUOTIENT, INC. PROPRIETARY CONFIDENTIAL Positioning Intelligence at the Heart of security processes in order to revolution Cyber Defense

Transcript of Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat...

Page 1: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

THREATQUOTIENT, INC. PROPRIETARY CONFIDENTIAL

Positioning Intelligence at the Heart of security processes in order to revolution Cyber Defense

Page 2: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

Wayne Chiang, Co-Founder Ryan Trost, Co-Founder

THREATQUOTIENT, INC. PROPRIETARY CONFIDENTIAL

• SoftwareEngineer/CyberSecurityPractitioner

• IEEEInfoAssuranceAuthor• 10YearsIndustryExperience• PerpetualOptimizer

• PublishedAuthor (2009&est.2015)• IndustryThoughtLeader(presented

atSANS,BlackHat,DEF CON,ISACAISRM,Interop)

• 15yearsIndustryExperience• ManagedGeneralDynamics&

USGSecurityOperationsCenter(SOC)

John Czupak, CEO

• 25+yearsstartup&cyberexperience• BroadexecutivelevelexperiencewithCisco,

Sourcefire,Axent Technologies&more• ExtensiveGo-To-Marketbackground• Garagebandguitarplayer

World Class Team

Page 3: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

3

Page 4: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

4

Page 5: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

5

Page 6: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

@

6

Page 7: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

7

Page 8: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

8

MesAdversaires

Donnéesexternes:OSINT,Rapports,…

Donnéesamies:GroupeMISP,CERT,Emails…

DonnéesMondeRéel:Ticketing /SIEM/IR/SANDBOX

FW/IPS WEB MAIL…

SIEM

Donnée Information Renseignement

Détection, Priorisation &Prévention

Page 9: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

9

Page 10: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

Threat Intelligence defense maturity leverage

10

PartialReactive Proactive Adapt ive

Protect the Enteprise Project the Threat

-CISO-DedicatedVuln.MngmtCapability-Basicsecurityinfrastructure

-CISO-DedicatedVuln.Mngmtcapability-BasicSOC/IRTcapability-Perimeterenterprisesecurityinfrastructure-Externalthreatindicatorfeeds/data

-CISO-DedicatedVuln.Mngmtcapability-AdvancedSOC/IRTcapability-CTITeam-Perimeter/internalenterprisesecurityinfrastructure-ExternalCTIconsumption(contextandindicators)

-CISO-DedicatedVuln.Mngmtcapability-SOC/IRT/CTIcapabilityw/totalinteroperability-Intelligence-integratedperimeterandinternalenterprisesecurityinfrastructure-ExternalandinternalCTIconsumption(contextandindicators)

Organ iza t iona l D i sposi t ionEmploy basic/t raditional defenses Total intell igence-driven cybersecurity

Page 11: Positioning Intelligence at the Heart of security processes in ......2016/11/08  · Threat Intelligence defense maturity leverage 10 Partial Reactive Proactive Adaptive Protect the

THREATQUOTIENT, INC. PROPRIETARY CONFIDENTIAL

Questions?