SlideShare a Scribd company logo
Using SurfWatch Labs’
Threat Intelligence
To Understand 3rd Party Risk
Today’s Speaker
Adam Meyer
Chief Security Strategist
SurfWatch Labs
2
Baselining the Different Types of
Cyber Threat Intelligence
For Senior Business Leaders – CISO, CIO, Risk Officer, etc.
• Informs business decisions and used to prioritize defense and direct
cybersecurity investments
• “Known Knowns” – Threat is understood and can be acted on / mitigated
For SOC/NOC Managers and Threat Analysts
• Aggregation of events along with the motivations, intent, and capabilities
of adversaries – how they plan, conduct, and sustain attack campaigns
• “Known Unknowns” – Confirmed existence of an actual threat
For SOC/NOC Operators
• The effort to detect and respond to on-the-wire events that are
technical and high volume. Focuses on threat indicators to hunt for and
defend against adversaries. Little-to-no contextualization or learning.
• “Unknown Unknowns” – Something weird is going on
Operational
Tactical
Decision
Strategic
Inputs
Outputs
Inputs
Outputs
LevelofIntelligence
3
Your Digital Footprint Provides a Lot
of Opportunity for Adversaries
4
Your Digital Footprint Provides a Lot
of Opportunity for Adversaries
5
You
Are
Here
Or Here
Or Here
According to PwC
• Smaller companies spend far less on
cyber security
• As big companies get better,
attackers are targeting smaller, less
capable businesses
• 57% of breaches originate from
partners & suppliers. In retail &
consumer goods it’s 68%
• Large orgs make little effort to
monitor the security of their partners
or suppliers
• Attackers know this!
• A moat around a heavily fortified
castle does nothing if the bridge is
down to your supply chain
Practical Risk Mitigation Steps
You Can Take
6
1. Ensure vendors are properly managing data and access
credentials. Poor security practices and errors among 3rd parties
regularly lead to unauthorized access and sensitive information
being exposed.
2. Gain visibility of who is connected to your organization. Know
who you’re working with, continue to evaluate their cyber risks
and understand how they are digitally connected to you.
3. Look at threat activity outside your organization – as well as
obviously from within. Threat intelligence provides insights as to
where to focus your resources most effectively. The best approach
leverages both internal and external intel – so you have a
complete picture of risk.
Dark Web Markets: Where Your
Information is Actively Targeted and Sold
• Hacking for Hire
• PII/Identity Info/Credit Cards
• Cyber Exploits for Sale
• Vulnerabilities for Sale
• Stolen IP, Designs & Counterfeits
• Spam & Phishing Campaigns for Hire
• Doxxing & Investigation for Hire
• Hacktivist Targeting Forums
• Insider Threat for Hire
7
8
The SurfWatch Labs
Threat Intelligence Stack
Cloud-based Suite and Advisory
Services deliver:
• Strategic and Operational
Threat Intelligence
• Relevant Cyber Risk
Management
• Actionable Fraud Awareness
and Prevention
• Digital Supply Chain Risk Visibility
• Brand and IP Protection
• Legal and Regulatory
Diligence
• KPIs and Cyber Risk
Reporting
Products
SaaS Applications and
API
Information and Analytics
Collect, Validate, Analyze and
Enrich
Solutions
Human Expertise Threat
Analyst
Cyber
Advisor
Data Collection Sources:
• Millions of Open Source
Media Outlets
• Twitter – Full Feed
• Cyber-Focused Sources- Blogs,
Security Researchers, etc.)
• Govt Mandated Breach Reports
• Vulnerability Reports
• PII Release Reports
• Phishing Feeds
• Dark Web Markets & Forums
• Paste Sites
• SurfWatch Customers
Q&A and Additional
SurfWatch Labs Resources
9
SurfWatch Cyber Advisor:
www.surfwatchlabs.com/cyber-advisor
SurfWatch Threat Analyst:
www.surfwatchlabs.com/threat-intel
Dark Web Intelligence:
www.surfwatchlabs.com/dark-web-intelligence
Personalized SurfWatch Demo:
info.surfwatchlabs.com/request-demo
Strategic and Operational Threat Intelligence

More Related Content

PPTX
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
PPTX
SurfWatch Labs Threat Intelligence Solution Demo
PPTX
Threat intelligence in security
PDF
Cyber threat intelligence ppt
PPTX
Cyber Threat Intelligence
PPTX
Threat Intelligence Data Collection & Acquisition
PDF
4 Rules for Successful Threat Intelligence Teams
PPSX
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
SurfWatch Labs Threat Intelligence Solution Demo
Threat intelligence in security
Cyber threat intelligence ppt
Cyber Threat Intelligence
Threat Intelligence Data Collection & Acquisition
4 Rules for Successful Threat Intelligence Teams
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...

What's hot (19)

PDF
Top 6 Sources for Identifying Threat Actor TTPs
PDF
Cybersecurity Five Facts in Five Minutes - IOD - London - 20161129
PPTX
Identity theft and data responsibilities
PPTX
Webinar cybersecurity presentation-6-2018 (final)
PDF
Cyber Threat Intelligence
PDF
Hunting for cyber threats targeting weapon systems
PDF
Proactive Defense: Understanding the 4 Main Threat Actor Types
PDF
4. Mitigating a Cyber Attack
PDF
Road map for actionable threat intelligence
PDF
2015 Atlanta CHIME Lead Forum
PDF
Securign siem for small business
PDF
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
PPTX
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
PDF
Building an Effective Cyber Intelligence Program
PDF
5 Signs you have an Insider Threat
PDF
Incident handling of cyber espionage
PPTX
Insider Threat Solution from GTRI
PDF
Cybersecurity: How to Protect Your Firm from a Cyber Attack
PPTX
Cyber Threat Intelligence | Information to Insight
Top 6 Sources for Identifying Threat Actor TTPs
Cybersecurity Five Facts in Five Minutes - IOD - London - 20161129
Identity theft and data responsibilities
Webinar cybersecurity presentation-6-2018 (final)
Cyber Threat Intelligence
Hunting for cyber threats targeting weapon systems
Proactive Defense: Understanding the 4 Main Threat Actor Types
4. Mitigating a Cyber Attack
Road map for actionable threat intelligence
2015 Atlanta CHIME Lead Forum
Securign siem for small business
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Building an Effective Cyber Intelligence Program
5 Signs you have an Insider Threat
Incident handling of cyber espionage
Insider Threat Solution from GTRI
Cybersecurity: How to Protect Your Firm from a Cyber Attack
Cyber Threat Intelligence | Information to Insight
Ad

Similar to Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk (20)

PPTX
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats
PPTX
Using Threat Intelligence to Address Your Growing Digital Risk
PDF
Ethical hacking and social engineering
PPTX
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
PDF
Module 3-cyber security
PPTX
Cyber Threat Intelligence.pptx
PPTX
How to Mitigate Risk From Your Expanding Digital Presence
PPTX
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
PDF
GAM 2021 - Aligning Audits with Leadership Cybersecurity Questions.pdf
PPTX
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
PPTX
Research on AI using Cyber Security and Forensics
PDF
Cyber Threat Intelligence
PPTX
Cybercrime and the Hidden Perils of Patient Data
PPT
Ethical hacking a licence to hack
PDF
Aujas incident management webinar deck 08162016
PDF
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
PPT
13734729.ppt
PPTX
cybersecurityandthe importance of the that
PPTX
Your cyber security webinar
PDF
What Is Cyber Threat Intelligence | How It Work? | SOCVault
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats
Using Threat Intelligence to Address Your Growing Digital Risk
Ethical hacking and social engineering
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
Module 3-cyber security
Cyber Threat Intelligence.pptx
How to Mitigate Risk From Your Expanding Digital Presence
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
GAM 2021 - Aligning Audits with Leadership Cybersecurity Questions.pdf
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Research on AI using Cyber Security and Forensics
Cyber Threat Intelligence
Cybercrime and the Hidden Perils of Patient Data
Ethical hacking a licence to hack
Aujas incident management webinar deck 08162016
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
13734729.ppt
cybersecurityandthe importance of the that
Your cyber security webinar
What Is Cyber Threat Intelligence | How It Work? | SOCVault
Ad

More from SurfWatch Labs (17)

PPTX
Know Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
PPTX
IoT Devices Expanding Your Digital Footprint
PPTX
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
PPTX
Cyber Threat Intelligence Solution Demonstration
PPTX
Cyber Threat Intelligence Solution Demonstration
PPTX
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
PPTX
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
PPTX
Shining a Light on Cyber Threats from the Dark Web
PPTX
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
PPT
Treat Cyber Like a Disease
PPTX
SANS Report: The State of Security in Control Systems Today
PPT
Point of Sale Insecurity: A Threat to Your Business
PPTX
Using Threat Information to Build Your Cyber Risk Intelligence Program
PPT
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
PPT
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
PPT
How to Raise Cyber Risk Awareness and Management to the C-Suite
PPT
Completing the Risk Picture: Adding a business intelligence and collaborative...
Know Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
IoT Devices Expanding Your Digital Footprint
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution Demonstration
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Shining a Light on Cyber Threats from the Dark Web
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Treat Cyber Like a Disease
SANS Report: The State of Security in Control Systems Today
Point of Sale Insecurity: A Threat to Your Business
Using Threat Information to Build Your Cyber Risk Intelligence Program
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Raise Cyber Risk Awareness and Management to the C-Suite
Completing the Risk Picture: Adding a business intelligence and collaborative...

Recently uploaded (20)

PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
STKI Israel Market Study 2025 version august
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
August Patch Tuesday
PPTX
Modernising the Digital Integration Hub
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
The various Industrial Revolutions .pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
DP Operators-handbook-extract for the Mautical Institute
STKI Israel Market Study 2025 version august
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
August Patch Tuesday
Modernising the Digital Integration Hub
Assigned Numbers - 2025 - Bluetooth® Document
A contest of sentiment analysis: k-nearest neighbor versus neural network
Hindi spoken digit analysis for native and non-native speakers
The various Industrial Revolutions .pptx
Module 1.ppt Iot fundamentals and Architecture
Getting Started with Data Integration: FME Form 101
Chapter 5: Probability Theory and Statistics
O2C Customer Invoices to Receipt V15A.pptx
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Univ-Connecticut-ChatGPT-Presentaion.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Getting started with AI Agents and Multi-Agent Systems
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf

Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk

  • 1. Using SurfWatch Labs’ Threat Intelligence To Understand 3rd Party Risk
  • 2. Today’s Speaker Adam Meyer Chief Security Strategist SurfWatch Labs 2
  • 3. Baselining the Different Types of Cyber Threat Intelligence For Senior Business Leaders – CISO, CIO, Risk Officer, etc. • Informs business decisions and used to prioritize defense and direct cybersecurity investments • “Known Knowns” – Threat is understood and can be acted on / mitigated For SOC/NOC Managers and Threat Analysts • Aggregation of events along with the motivations, intent, and capabilities of adversaries – how they plan, conduct, and sustain attack campaigns • “Known Unknowns” – Confirmed existence of an actual threat For SOC/NOC Operators • The effort to detect and respond to on-the-wire events that are technical and high volume. Focuses on threat indicators to hunt for and defend against adversaries. Little-to-no contextualization or learning. • “Unknown Unknowns” – Something weird is going on Operational Tactical Decision Strategic Inputs Outputs Inputs Outputs LevelofIntelligence 3
  • 4. Your Digital Footprint Provides a Lot of Opportunity for Adversaries 4
  • 5. Your Digital Footprint Provides a Lot of Opportunity for Adversaries 5 You Are Here Or Here Or Here According to PwC • Smaller companies spend far less on cyber security • As big companies get better, attackers are targeting smaller, less capable businesses • 57% of breaches originate from partners & suppliers. In retail & consumer goods it’s 68% • Large orgs make little effort to monitor the security of their partners or suppliers • Attackers know this! • A moat around a heavily fortified castle does nothing if the bridge is down to your supply chain
  • 6. Practical Risk Mitigation Steps You Can Take 6 1. Ensure vendors are properly managing data and access credentials. Poor security practices and errors among 3rd parties regularly lead to unauthorized access and sensitive information being exposed. 2. Gain visibility of who is connected to your organization. Know who you’re working with, continue to evaluate their cyber risks and understand how they are digitally connected to you. 3. Look at threat activity outside your organization – as well as obviously from within. Threat intelligence provides insights as to where to focus your resources most effectively. The best approach leverages both internal and external intel – so you have a complete picture of risk.
  • 7. Dark Web Markets: Where Your Information is Actively Targeted and Sold • Hacking for Hire • PII/Identity Info/Credit Cards • Cyber Exploits for Sale • Vulnerabilities for Sale • Stolen IP, Designs & Counterfeits • Spam & Phishing Campaigns for Hire • Doxxing & Investigation for Hire • Hacktivist Targeting Forums • Insider Threat for Hire 7
  • 8. 8 The SurfWatch Labs Threat Intelligence Stack Cloud-based Suite and Advisory Services deliver: • Strategic and Operational Threat Intelligence • Relevant Cyber Risk Management • Actionable Fraud Awareness and Prevention • Digital Supply Chain Risk Visibility • Brand and IP Protection • Legal and Regulatory Diligence • KPIs and Cyber Risk Reporting Products SaaS Applications and API Information and Analytics Collect, Validate, Analyze and Enrich Solutions Human Expertise Threat Analyst Cyber Advisor Data Collection Sources: • Millions of Open Source Media Outlets • Twitter – Full Feed • Cyber-Focused Sources- Blogs, Security Researchers, etc.) • Govt Mandated Breach Reports • Vulnerability Reports • PII Release Reports • Phishing Feeds • Dark Web Markets & Forums • Paste Sites • SurfWatch Customers
  • 9. Q&A and Additional SurfWatch Labs Resources 9 SurfWatch Cyber Advisor: www.surfwatchlabs.com/cyber-advisor SurfWatch Threat Analyst: www.surfwatchlabs.com/threat-intel Dark Web Intelligence: www.surfwatchlabs.com/dark-web-intelligence Personalized SurfWatch Demo: info.surfwatchlabs.com/request-demo Strategic and Operational Threat Intelligence

Editor's Notes

  • #8: Talk through the different types of threats out on the dark web