Date post: | 19-Feb-2017 |
Category: |
Technology |
Upload: | surfwatch-labs |
View: | 274 times |
Download: | 8 times |
How to Grow Your Managed Security Services Practice with
Strategic Threat Intelligence
Today’s Speakers
2
Adam MeyerChief Security StrategistSurfWatch Labs
Todd WhileVP of Business DevelopmentSurfWatch Labs
Getting a Baseline of Where We Are Today with Cybersecurity
3
200+ days is the average time to detect a breach• Only looking inward means
you’re too late
• Point-in-time assessments are only good at that point in time!
• $3.8M is the average cost of a breach
Wall Building… But No Lookout?
4
Your Customers’ Dirty Laundry…Coming Out on the Dark Web
5
The New Regulatory Reality
6
• Regulatory guidance, enforcement and ensuing litigation is here… and more is coming… - SEC
- FTC
- FCC
- FFIEC
- UK GCHQ
Prepare for a Wave of Litigation, Fines and Penalties
7
Being able to prove due diligence and standard of care is a must• Cox Communications - $590k Fine, 7 years of audits
• Wyndham
• Ashley Madison
• Excellus BlueCross BlueShield
• OPM
• Sony
• Target
• Anthem
• Home Depot
We’ve Been Breached? You’re Fired!
8
• Cybersecurity and IT teams will get fingers pointed at, but…
• Executives are now being held accountable when breaches occur
• MSSPs also held accountable
9
Examining The Need for Cyber
Threat Intelligence
Cyber Threat Intelligence Will Help Steer the Ship in the Right Direction
11
Using Threat Intelligence
12
Intelligence is regularly defined as information that can be acted upon to change outcomes.
One definition of Threat intelligence is the process of moving topics:
1. From “unknown unknowns” to “known unknowns” by discovering the existence of threats, and then…
2. Shifting “known unknowns” to “known knowns”, where the threat is well understood and mitigated.
Unlock Cybersecurity from the Bits and Bytes
13
• Cyber impacts everyone and thus must be understood by everyone
• Tie specific threats to business impact
Know What Threats are Coming
14
Look Outward to Plan Ahead• Understand attack execution methods
based on relevant cyber trends
• Prepare for attacks on specific assets of value
• Know what information is already out on the Dark Web
Armed with these insights you can ensure the most effective cyber defense tactics
Be Able to Prove Due Diligence in a Court of Law
15
• Threat Intelligence is a recognized best practice by industry analysts and frameworks/guidelines- UK GCHQ- FFIEC
• Using Cyber Threat Intelligence Shows You’re Paying Attention!
Gain a Competitive Edge
16
Obtain Net New Business• Use cyber data warehouse to build personalized prospect
pitches that are highly targeted
Expand Your Existing Business Footprint• Deliver greater value that reaches a business-oriented audience
• Provide ongoing analyst services to increase stickiness
Flexibility for Your Business Model• Reduce costs - use intelligence to focus your security efforts and to
automate reporting
• Scale up or down as needed
✓✓
✓
Your Opportunity to Become a
Cyber Advisor for Your Clients
Turn Raw Data into Meaningful Cyber Threat Intelligence
18
Cyber Advisor: Your All-in-One Threat Intelligence Solution
19
• Combines of Analytics, Products and Human Experts Guide You to Make the Most Effective Security Decisions
• Ties Relevant, Critical Risks to the Impact on Your Business Operations (IT, Security, Legal, Fraud, Risk Management)
• Ensures Continuous Risk Monitoring of Traditional and Dark Web Threats to Your Business
• Delivers Prioritized Threat Mitigation Best Practice Recommendations
Complete Threat Intelligence Suite of Products
20
Easy-to-use SaaS products that provide real-time and continuous visibility on your specific threat landscape• What cyber activity is occurring in your business domain?
• What are you seeing within your network?
• What’s happening from a cyber risk perspective in your supply chain?
Deliver Real Value for Small Business Clients
21
Your Source for Cybersecurity News, Analysis and Alerts• Cost-effective threat intelligence
delivered to you through mobile and web platforms
• Commentary and insights from SurfWatch Analysts
• Personalized alerts that match your profile
• Human intelligence in monthly risk reports
Change the Cybersecurity Game for You and Your Clients
22
• Cyber threats are dynamic - A point in time risk assessment is only useful AT THAT POINT IN TIME
• Continuous outward-looking visibility and understanding is KEY TO KNOWING WHAT’S COMING YOUR WAY
• Cyber can no longer be boxed in as a technical problem – it must be tied to the business to PROPERLY MANAGE RISK
Q&A and Additional SurfWatch Labs Resources
23
Solution and Product Information• Cyber Advisor
http://info.surfwatchlabs.com/SurfWatch-Cyber-Advisor-Datasheet
• Dark Web Intelligencehttp://info.surfwatchlabs.com/dark-web-service-brochure
• Threat Intelligence Suitehttp://info.surfwatchlabs.com/SurfWatch-Threat-Intelligence-Suite-Datasheet
• Analytics APIhttp://info.surfwatchlabs.com/SurfWatch-Analytics-Datasheet
Become a Partner• Email [email protected]
Thank You!
www.surfwatchlabs.comFollow us at: