SlideShare a Scribd company logo
©2017 RiskIQ 1
YOU’RE AT WAR
Understanding Your Digital Attack Surface and
Mitigating External Threat Damage:
The What, Why, How
Ulf Mattsson
CTO Security Solutions
Atlantic Business Technologies
ulf.mattsson@atlanticbt.com
David Morris
david.morris@morriscybersecurity.com
Benjamin Powell
Product Marketing Manager
RISKIQ
1.888.415.4447
©2017 RiskIQ 2
The Presenters
©2017 RiskIQ 3
David Morris
Thought Leader and Pioneer in the Cybersecurity space, Mr. Morris has
founded, managed and advised several start-ups and later stage companies
leading them to multi-million dollar revenues.
His particular areas of technical expertise are:
- Cryptography, Threat Intelligence, Third Party Risk Management, Biometric
Systems, Penetration Tests and Vulnerability Assessments
Currently Mr. Morris advises end-users, technology developers and investors in
the area of Cybersecurity.
david.morris@morriscybersecurity.com
©2017 RiskIQ 4
Ulf Mattsson
Inventor of more than 55 US Patents
Industry Involvement:
• PCI DDS - PCI Security Standards Council
Encryption & Tokenization Task Forces, Cloud & Virtualization SIGs
• IFIP - International Federation for Information Processing
• CSA - Cloud Security Alliance
• ANSI - American National Standards Institute
ANSI X9 Tokenization Work Group
• NIST - National Institute of Standards and Technology
NIST Big Data Working Group
• User Groups
Security: ISACA & ISSA
Databases: IBM & Oracle
©2017 RiskIQ 5
Benjamin Powell
Technical Marketing Manager at RiskIQ
Skills & Competencies:
Leadership, systems architecture, project management, staff
development, professional services, pre and post-sales support,
security architect & investigator, business development, problem
resolution, communication skills, strategic planning, critical
thinking, future focused, demand generation programs, partner
marketing, and field marketing. Currently holds CEH
5
©2017 RiskIQ 6
YOU’RE AT WAR
Understanding Your Digital Attack Surface and
Mitigating External Threat Damage:
The What, Why, How
Benjamin Powell
Product Marketing Manager
©2017 RiskIQ 7
What is your Digital Footprint?
•Your digital footprint contains all of your external-facing assets
•These include websites, servers, landing pages, web
applications, and other assets put online (some of which were
created outside official protocol and thus, unknown/unmanaged)
•Without the knowledge and inventory of these assets by IT
security teams, you can’t protect what you don’t know about
–Shadow IT
–Rogue developers, rogue marketing teams
©2017 RiskIQ 8
What are blended attacks?
Web Social Mobile
• Domain
infringement
• Phishing
• Brand abuse
• Malware, exposed
vulnerabilities
• Phishing
• Fake apps and rogue
apps on third-party sites
• Malware and
compromise
• Brand, exec imposters
• Phishing
• Scams and fraud
©2017 RiskIQ 9
How easy is it to become a victim of a phishing campaign?
Freeware Application for phishing
•Free fully functioning phishing
application framework.
–Linux, Windows, and Mac
versions available
•Gophish is a powerful, easy-to-use,
open-source phishing toolkit meant
to help pen-testers and businesses
conduct real-world phishing
simulations.
For Educational Purposes Only
©2017 RiskIQ 10
Real Email For Template In Phishing Attack
Real Email Message
View Source
gophish Phish Email Template
©2017 RiskIQ 11
Importing Targeted Landing Pages For Attack
Targeted Website gophish Targeted Landing Gage for phish Attack
©2017 RiskIQ 12
Phishing Campaign & Tracking
Creating Phishing Campaign
Tracking Phishing Campaign
©2017 RiskIQ 13
How to get proactive in monitoring the internet for threats?
• Know your digital footprint
• Patch and update your internet-facing
servers and assets often
• Monitor & block newly observed domains
• Monitor what websites are linking to your
assets (host pairs)
• Track your correspondence of security
incidents outside of email inboxes so
everyone knows what is happening at
any given time.
©2017 RiskIQ 14
Considerations in External Threat solutions
• Automated discovery of assets in your digital footprint
• Continuous monitoring of critical internet-facing assets
• Reporting on risky infrastructure issues and potential vulnerabilities
• Monitoring of the internet, mobile app stores, and social media for
threats, impersonation, active attacks
• Integrated, automated mitigation workflows with in-app correspondence
tracking and audit trails
• Dedicated support team to help with complicated threats
©2017 RiskIQ 15
Security Incident Response Steps
1. Preparation
2. Identification
3. Containment
4. Eradication
5. Recovery
6. Lessons Learned
Sample Incident Handling Forms
https://www.sans.org/score/incident-forms
©2017 RiskIQ 16
Common Attacks you should have a plan for
• Domain infringement
• Phishing attack
• Fraudulent Social Media Profile
• Malware being served from your website
• Rogue mobile application
• Website defacement
• Vulnerable infrastructure
• Web Compliance
• Ransomware
©2017 RiskIQ 17
Lessons Learned
1. Create security incident response plans.
2. Practice your security incident response plans.
3. Use tools, services, or both that make your organization
proactive in facing external threats.
4. Communication is key in handling security incidents.
5. Mitigate threats immediately by utilizing global black listing
services with Google, Microsoft (95% of worlds browsers).
6. Learn from your drills and real incidents to become better and
more proactive.
©2017 RiskIQ 18
Domain Infringement?
•A domain that has the same spelling and a different Top Level
Domain (Typosquatting) ?
–riskiq.om
–risciq.com
–risk-iq.com
Yes or No?
Answer: No
©2017 RiskIQ 19
Domain Infringement?
•A domain that has the same spelling and a different Top Level
Domain?
–riskiq.om
–risciq.com
–risk-iq.com
•Now the domain has your logos on the website.
Yes or No?
Answer: Yes
©2017 RiskIQ 20
Domain Infringement?
•A domain that has the same spelling and a different Top Level
Domain?
–riskiq.om
–risciq.com
–risk-iq.com
•Now the domain has your logos on the website.
•Now the domain has a login page just like your real site.
Yes or No?
Answer: Yes, but it now a potential phishing attack as well
©2017 RiskIQ 21
Recently Seen Rogue Mobile App Scenarios
•You have a mobile application on the Google Play Store and
Apple iTunes.
–You Charge $0 and it is free for everyone.
–Threat actors down load your free application and upload it to one
of the other 178 different app store around the world.
–They state it is new and improved and charge $1.00
©2017 RiskIQ 22
RISKIQ Community Edition
https://community.riskiq.com
©2017 RiskIQ 23
SecDevOps
©2017 RiskIQ 24
Security Tools for DevOps
Static
Application
Security
Testing
(SAST)
Dynamic Application Security Testing (DAST)
Fuzz testing is
essentially
throwing lots of
random garbage
Vulnerability
Analysis
Runtime Application
Self Protection
(RASP)
Interactive
Application Self-
Testing (IAST)
©2017 RiskIQ 25
Security Metrics from DevOps
# Vulnerabilities
Time
©2017 RiskIQ 26
Generating Key Security Metrics
# Vulnerabilities
Time
©2017 RiskIQ 27
©2017 RiskIQ 28
Atlantic BT Application Security Solutions
•Data Security. We map the flow of data across your digital footprint, applications
environment, library framework, source code, and storage to pinpoint risks before
they turn into attacks.
•Secure Hosting. We create dynamic, cloud-based environments with inside-out
security controls to protect your systems and storage from attacks and other service
disruptions.
•Application Security. We practice “secure by design” discipline in our software
development. This protects your custom applications by automating secure coding
standards and automation in testing at every step.
•Active Application Monitoring and Vulnerability Management. We can monitor
your systems, applications, and digital interactions for threats and ongoing security
process improvements.
https://www.atlanticbt.com/services/cybersecurity/
©2017 RiskIQ 29
Thank you!
Ulf Mattsson
CTO Security Solutions
Atlantic Business Technologies
ulf.mattsson@atlanticbt.com
David Morris
david.morris@morriscybersecurity.com
Benjamin Powell
Product Marketing Manager
RISKIQ
1.888.415.4447

More Related Content

PDF
How to Reduce the Attack Surface Created by Your Cyber-Tools
PDF
Building a Next-Generation Security Operations Center (SOC)
PPTX
Cyber security
PPTX
Security operation center
PPTX
Hyphenet Security Awareness Training
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PDF
Threat Intelligence
How to Reduce the Attack Surface Created by Your Cyber-Tools
Building a Next-Generation Security Operations Center (SOC)
Cyber security
Security operation center
Hyphenet Security Awareness Training
Cybersecurity Attack Vectors: How to Protect Your Organization
Threat Intelligence

What's hot (20)

PPSX
Next-Gen security operation center
PDF
Benefits of Web Application Firewall
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
Security Operation Center Fundamental
PDF
Cybersecurity Roadmap Development for Executives
PPTX
SIEM Primer:
PDF
Cybersecurity tips for employees
PDF
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
PPTX
Security operation center (SOC)
PDF
Cyber Security Awareness
PDF
Endpoint Security
PDF
Global Cyber Threat Intelligence
PDF
Overview of the Cyber Kill Chain [TM]
PPTX
Cybersecurity 1. intro to cybersecurity
PPT
Cyber Security and Cyber Awareness
PPTX
SOC and SIEM.pptx
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PPTX
Cyber Security 101
PDF
Cyber attacks
PPTX
Next-Gen security operation center
Benefits of Web Application Firewall
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Security Operation Center Fundamental
Cybersecurity Roadmap Development for Executives
SIEM Primer:
Cybersecurity tips for employees
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Security operation center (SOC)
Cyber Security Awareness
Endpoint Security
Global Cyber Threat Intelligence
Overview of the Cyber Kill Chain [TM]
Cybersecurity 1. intro to cybersecurity
Cyber Security and Cyber Awareness
SOC and SIEM.pptx
Security operations center-SOC Presentation-مرکز عملیات امنیت
Cyber Security 101
Cyber attacks
Ad

Similar to Understanding Your Attack Surface and Detecting & Mitigating External Threats (20)

PPTX
The 2018 Threatscape
PDF
The state of web applications (in)security @ ITDays 2016
PDF
Application Security - Your Success Depends on it
PPTX
For Business's Sake, Let's focus on AppSec
PDF
Vulnerability Management: A Comprehensive Overview
PPTX
IT Security and Wire Fraud Awareness Slide Deck
PDF
Tech Talent Meetup Hacking Security Event Recap
PDF
Fall2015SecurityShow
PPTX
Allianz Global CISO october-2015-draft
PDF
A Manifesto for Cyber Resilience
PPTX
FireHost Webinar: Protect Your Application With Intelligent Security
PDF
Social Networks And Phishing
PPTX
Security_Trends_-_Johnson.ppt pdf download
PDF
Essentials of Web Application Security: what it is, why it matters and how to...
PPSX
Meraj Ahmad - Information security in a borderless world
PDF
Journey to the Cloud: Securing Your AWS Applications - April 2015
PPTX
Leveraging Compliance to “Help” Prevent a Future Breach
PPTX
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
PPTX
APT or not - does it make a difference if you are compromised?
The 2018 Threatscape
The state of web applications (in)security @ ITDays 2016
Application Security - Your Success Depends on it
For Business's Sake, Let's focus on AppSec
Vulnerability Management: A Comprehensive Overview
IT Security and Wire Fraud Awareness Slide Deck
Tech Talent Meetup Hacking Security Event Recap
Fall2015SecurityShow
Allianz Global CISO october-2015-draft
A Manifesto for Cyber Resilience
FireHost Webinar: Protect Your Application With Intelligent Security
Social Networks And Phishing
Security_Trends_-_Johnson.ppt pdf download
Essentials of Web Application Security: what it is, why it matters and how to...
Meraj Ahmad - Information security in a borderless world
Journey to the Cloud: Securing Your AWS Applications - April 2015
Leveraging Compliance to “Help” Prevent a Future Breach
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
APT or not - does it make a difference if you are compromised?
Ad

More from Ulf Mattsson (20)

PPTX
Jun 29 new privacy technologies for unicode and international data standards ...
PPTX
Jun 15 privacy in the cloud at financial institutions at the object managemen...
PPTX
PPTX
May 6 evolving international privacy regulations and cross border data tran...
PPTX
Qubit conference-new-york-2021
PDF
Secure analytics and machine learning in cloud use cases
PPTX
Evolving international privacy regulations and cross border data transfer - g...
PDF
Data encryption and tokenization for international unicode
PPTX
The future of data security and blockchain
PPTX
New technologies for data protection
PPTX
GDPR and evolving international privacy regulations
PPTX
Privacy preserving computing and secure multi-party computation ISACA Atlanta
PPTX
Safeguarding customer and financial data in analytics and machine learning
PPTX
Protecting data privacy in analytics and machine learning ISACA London UK
PPTX
New opportunities and business risks with evolving privacy regulations
PPTX
What is tokenization in blockchain - BCS London
PPTX
Protecting data privacy in analytics and machine learning - ISACA
PPTX
What is tokenization in blockchain?
PPTX
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
PPTX
Unlock the potential of data security 2020
Jun 29 new privacy technologies for unicode and international data standards ...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
May 6 evolving international privacy regulations and cross border data tran...
Qubit conference-new-york-2021
Secure analytics and machine learning in cloud use cases
Evolving international privacy regulations and cross border data transfer - g...
Data encryption and tokenization for international unicode
The future of data security and blockchain
New technologies for data protection
GDPR and evolving international privacy regulations
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Safeguarding customer and financial data in analytics and machine learning
Protecting data privacy in analytics and machine learning ISACA London UK
New opportunities and business risks with evolving privacy regulations
What is tokenization in blockchain - BCS London
Protecting data privacy in analytics and machine learning - ISACA
What is tokenization in blockchain?
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Unlock the potential of data security 2020

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Modernizing your data center with Dell and AMD
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
Teaching material agriculture food technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Empathic Computing: Creating Shared Understanding
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
“AI and Expert System Decision Support & Business Intelligence Systems”
Modernizing your data center with Dell and AMD
Network Security Unit 5.pdf for BCA BBA.
Per capita expenditure prediction using model stacking based on satellite ima...
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I
Mobile App Security Testing_ A Comprehensive Guide.pdf
Teaching material agriculture food technology
Building Integrated photovoltaic BIPV_UPV.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation_ Review paper, used for researhc scholars
Approach and Philosophy of On baking technology
NewMind AI Monthly Chronicles - July 2025
Empathic Computing: Creating Shared Understanding
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MYSQL Presentation for SQL database connectivity
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Understanding Your Attack Surface and Detecting & Mitigating External Threats

  • 1. ©2017 RiskIQ 1 YOU’RE AT WAR Understanding Your Digital Attack Surface and Mitigating External Threat Damage: The What, Why, How Ulf Mattsson CTO Security Solutions Atlantic Business Technologies ulf.mattsson@atlanticbt.com David Morris david.morris@morriscybersecurity.com Benjamin Powell Product Marketing Manager RISKIQ 1.888.415.4447
  • 2. ©2017 RiskIQ 2 The Presenters
  • 3. ©2017 RiskIQ 3 David Morris Thought Leader and Pioneer in the Cybersecurity space, Mr. Morris has founded, managed and advised several start-ups and later stage companies leading them to multi-million dollar revenues. His particular areas of technical expertise are: - Cryptography, Threat Intelligence, Third Party Risk Management, Biometric Systems, Penetration Tests and Vulnerability Assessments Currently Mr. Morris advises end-users, technology developers and investors in the area of Cybersecurity. david.morris@morriscybersecurity.com
  • 4. ©2017 RiskIQ 4 Ulf Mattsson Inventor of more than 55 US Patents Industry Involvement: • PCI DDS - PCI Security Standards Council Encryption & Tokenization Task Forces, Cloud & Virtualization SIGs • IFIP - International Federation for Information Processing • CSA - Cloud Security Alliance • ANSI - American National Standards Institute ANSI X9 Tokenization Work Group • NIST - National Institute of Standards and Technology NIST Big Data Working Group • User Groups Security: ISACA & ISSA Databases: IBM & Oracle
  • 5. ©2017 RiskIQ 5 Benjamin Powell Technical Marketing Manager at RiskIQ Skills & Competencies: Leadership, systems architecture, project management, staff development, professional services, pre and post-sales support, security architect & investigator, business development, problem resolution, communication skills, strategic planning, critical thinking, future focused, demand generation programs, partner marketing, and field marketing. Currently holds CEH 5
  • 6. ©2017 RiskIQ 6 YOU’RE AT WAR Understanding Your Digital Attack Surface and Mitigating External Threat Damage: The What, Why, How Benjamin Powell Product Marketing Manager
  • 7. ©2017 RiskIQ 7 What is your Digital Footprint? •Your digital footprint contains all of your external-facing assets •These include websites, servers, landing pages, web applications, and other assets put online (some of which were created outside official protocol and thus, unknown/unmanaged) •Without the knowledge and inventory of these assets by IT security teams, you can’t protect what you don’t know about –Shadow IT –Rogue developers, rogue marketing teams
  • 8. ©2017 RiskIQ 8 What are blended attacks? Web Social Mobile • Domain infringement • Phishing • Brand abuse • Malware, exposed vulnerabilities • Phishing • Fake apps and rogue apps on third-party sites • Malware and compromise • Brand, exec imposters • Phishing • Scams and fraud
  • 9. ©2017 RiskIQ 9 How easy is it to become a victim of a phishing campaign? Freeware Application for phishing •Free fully functioning phishing application framework. –Linux, Windows, and Mac versions available •Gophish is a powerful, easy-to-use, open-source phishing toolkit meant to help pen-testers and businesses conduct real-world phishing simulations. For Educational Purposes Only
  • 10. ©2017 RiskIQ 10 Real Email For Template In Phishing Attack Real Email Message View Source gophish Phish Email Template
  • 11. ©2017 RiskIQ 11 Importing Targeted Landing Pages For Attack Targeted Website gophish Targeted Landing Gage for phish Attack
  • 12. ©2017 RiskIQ 12 Phishing Campaign & Tracking Creating Phishing Campaign Tracking Phishing Campaign
  • 13. ©2017 RiskIQ 13 How to get proactive in monitoring the internet for threats? • Know your digital footprint • Patch and update your internet-facing servers and assets often • Monitor & block newly observed domains • Monitor what websites are linking to your assets (host pairs) • Track your correspondence of security incidents outside of email inboxes so everyone knows what is happening at any given time.
  • 14. ©2017 RiskIQ 14 Considerations in External Threat solutions • Automated discovery of assets in your digital footprint • Continuous monitoring of critical internet-facing assets • Reporting on risky infrastructure issues and potential vulnerabilities • Monitoring of the internet, mobile app stores, and social media for threats, impersonation, active attacks • Integrated, automated mitigation workflows with in-app correspondence tracking and audit trails • Dedicated support team to help with complicated threats
  • 15. ©2017 RiskIQ 15 Security Incident Response Steps 1. Preparation 2. Identification 3. Containment 4. Eradication 5. Recovery 6. Lessons Learned Sample Incident Handling Forms https://www.sans.org/score/incident-forms
  • 16. ©2017 RiskIQ 16 Common Attacks you should have a plan for • Domain infringement • Phishing attack • Fraudulent Social Media Profile • Malware being served from your website • Rogue mobile application • Website defacement • Vulnerable infrastructure • Web Compliance • Ransomware
  • 17. ©2017 RiskIQ 17 Lessons Learned 1. Create security incident response plans. 2. Practice your security incident response plans. 3. Use tools, services, or both that make your organization proactive in facing external threats. 4. Communication is key in handling security incidents. 5. Mitigate threats immediately by utilizing global black listing services with Google, Microsoft (95% of worlds browsers). 6. Learn from your drills and real incidents to become better and more proactive.
  • 18. ©2017 RiskIQ 18 Domain Infringement? •A domain that has the same spelling and a different Top Level Domain (Typosquatting) ? –riskiq.om –risciq.com –risk-iq.com Yes or No? Answer: No
  • 19. ©2017 RiskIQ 19 Domain Infringement? •A domain that has the same spelling and a different Top Level Domain? –riskiq.om –risciq.com –risk-iq.com •Now the domain has your logos on the website. Yes or No? Answer: Yes
  • 20. ©2017 RiskIQ 20 Domain Infringement? •A domain that has the same spelling and a different Top Level Domain? –riskiq.om –risciq.com –risk-iq.com •Now the domain has your logos on the website. •Now the domain has a login page just like your real site. Yes or No? Answer: Yes, but it now a potential phishing attack as well
  • 21. ©2017 RiskIQ 21 Recently Seen Rogue Mobile App Scenarios •You have a mobile application on the Google Play Store and Apple iTunes. –You Charge $0 and it is free for everyone. –Threat actors down load your free application and upload it to one of the other 178 different app store around the world. –They state it is new and improved and charge $1.00
  • 22. ©2017 RiskIQ 22 RISKIQ Community Edition https://community.riskiq.com
  • 24. ©2017 RiskIQ 24 Security Tools for DevOps Static Application Security Testing (SAST) Dynamic Application Security Testing (DAST) Fuzz testing is essentially throwing lots of random garbage Vulnerability Analysis Runtime Application Self Protection (RASP) Interactive Application Self- Testing (IAST)
  • 25. ©2017 RiskIQ 25 Security Metrics from DevOps # Vulnerabilities Time
  • 26. ©2017 RiskIQ 26 Generating Key Security Metrics # Vulnerabilities Time
  • 28. ©2017 RiskIQ 28 Atlantic BT Application Security Solutions •Data Security. We map the flow of data across your digital footprint, applications environment, library framework, source code, and storage to pinpoint risks before they turn into attacks. •Secure Hosting. We create dynamic, cloud-based environments with inside-out security controls to protect your systems and storage from attacks and other service disruptions. •Application Security. We practice “secure by design” discipline in our software development. This protects your custom applications by automating secure coding standards and automation in testing at every step. •Active Application Monitoring and Vulnerability Management. We can monitor your systems, applications, and digital interactions for threats and ongoing security process improvements. https://www.atlanticbt.com/services/cybersecurity/
  • 29. ©2017 RiskIQ 29 Thank you! Ulf Mattsson CTO Security Solutions Atlantic Business Technologies ulf.mattsson@atlanticbt.com David Morris david.morris@morriscybersecurity.com Benjamin Powell Product Marketing Manager RISKIQ 1.888.415.4447