SlideShare a Scribd company logo
Using Threat Intelligence
to Address Your
Growing Digital Risk
Today’s Speaker
Adam Meyer
Chief Security Strategist
SurfWatch Labs
2
The Fabric of Cyber
3
• Cyber is tied to the fabric of everything
necessary to run a business,
connecting or enabling your:
- Supply chain
- Customer base
- Business support applications
- Financials
- IT Infrastructure
- Marketing and Sales
- Communications
The Threat Balloon
4
Cybercriminals
shift their tactics to hit
targets that are:
“Attractive” and “Soft”
This is a blind spot
in your risk program
The CISO’s Tug of War
5
Intelligence Operations (Tracking threats) vs. Network Defense (Stop the Bleeding)
All of the Breached Companies Had Security Tools and Staff…
Why is it that spending keeps increasing but nothing ever changes?
Source: EMC
Your Digital Footprint is Expanding
Beyond Traditional Corporate Walls
6
Increased Risk From
Your Physical Infrastructure
7
• Building Automation
- “Smart” Consumables
- Facilities Devices
- HVAC
• Operational Technology
- ICS/SCADA Devices
• Physical Security
- CCTV
- Access Control
Increased Risk From
Your Employees
8
• Insider Risk
- Malicious Data Leakage
- Extortion
- Fraud
• Identity/Access Management
- Exposed Credentials
- Employee Doxing
• Social Engineering
- Phishing
- Phone Scams
- Help Desk Scams
Increased Risk From
Your Public-Facing Presence
9
• Customer Portals
- Brute Force Attempts
- Customer Account Takeover
- Customer Account Transfer
• Social Media
- Account Takeover
- Malicious Followers
- Social Media Threat “Chatter”
• Company Site and Blog
- Brand Profiling
- Domain Hijack/Theft
- Account Takeover
Increased Risk From
Your Supply Chain
10
• Partners
- Data Exchange
- Connectivity
- Data “Custodianship”
• As-a-Service Vendors
- Customer Impact
- Brand Impact
- Service Impact
• Suppliers
- Financials Transactions
- Data Exchange
- Availability
Increased Risk From
Criminal/Fraud Activity
11
• Dark Web Markets
- Sale of Commodities
- Counterfeit Efforts
- Fraud Efforts
• Cybercrime Forums
- Discussion About “You”
- Sharing of Sensitive Information
• Open Source
- Blogs
- Forums
- Social Media
- Paste Sites
Increased Risk From
Your Technology Infrastructure
12
• Devices
- Threats Targeting Your Devices
- Threats Targeting Your Device Vendors
• Applications
- Vulnerabilities Affecting Your Apps
- Threats Targeting Your Apps
• Software (A Stack)
- Vulnerabilities Affecting Your Software
Suites and Capabilities
- Threats Targeting Your Software Suites
and Capabilities
How Does Your Digital Footprint
Translate into Increased Risk?
13
• Network-enabled or "smart" IOT
devices are commonplace
• The potential of having numerous
devices per building potentially
translates into the largest digital
footprint that is NOT under proper
security management
• According to IDC forecasts, 40
percent of the information in the
digital universe requires some level
of protection, but only half of that
data is protected.
IoT Threat Examples
14
Rise of the IoT Botnets
• Proliferation of devices
• DDoS attacks
• Ease of weaponization –
ala Mirai, which
weaponizes vulnerable IoT
devices
Distribution of Mirai Botnet in October attack
Dark Web Forum Example
15
Sentry MBA is a credential-stuffing tool that tests stolen
credentials against the authentication mechanisms on websites
and mobile application API servers to discover instances of
password reuse across those applications, and enable large-
scale account takeovers.
Dark Web Market Example
16
Fake Web Pages to use in phishing attacks – Bank of Montreal
Physical Infrastructure Example
17
BACnet was designed to allow communication of building automation and control
systems for applications such as heating, ventilating, and air-conditioning control
(HVAC), lighting control, access control, and fire detection systems and their
associated equipment. The BACnet protocol provides mechanisms for
computerized building automation devices to exchange information, regardless
of the particular building service they perform.
Physical Infrastructure Example
18
Tridium Niagara is an IoT Building Automation Manufacturer
Device
belongs to
an Assisted
Living
Facility in
NY
Using Threat Intelligence to Drive
More Effective Risk Decisions
19
Gain critical insights on ACTIVE threats and risks to
your business and can be applied to different areas
• Threat Intel teams – know threat actors and their motivations
to improve your defenses
• Fraud teams – understand what commodities are being
monetized so you can minimize fraud
• Partners and Suppliers – understand the “presence” your
vendors have to complement supply chain risk management
• Breach Response – improve your planning and preparation
instead of waiting to “get the call” from law enforcement
• Executives and BoDs – understand the impact of cyber risk on
your business and know where/how to best allocate resources
to effectively mitigate risk
• Brand Management – understand and mitigate brand risks
from open and dark web sources
Using Threat Intelligence to Drive
More Effective Risk Decisions
20
SurfWatch Cyber Advisor:
Strategic and Operational CTI
• Establish a unique, in-depth cyber risk profile
• Collect relevant threat data from a wide
range of open, deep and dark web sources
• Continuously and proactively monitor for
new, emerging or trending threats to your
business, supply chain and industry
• Produce “to-the-point” cyber threat alerts
and reports with risk mitigation
recommendations
• Establish and/or extend your cyber threat
intel operation with automated data
collection and processing, a team of expert
analysts and SaaS visualization software
Using Threat Intelligence to Drive
More Effective Risk Decisions
21
Gain a Complete Picture of Your
Digital Risk Landscape
How do cyber risks impact your…
• Business processes
• Critical IT infrastructure
• Brand
• Finances
• Customers
• Suppliers
• and More…
Using Threat Intelligence to Drive
More Effective Risk Decisions
22
Aggregate and Standardize Cyber
Data from Thousands of Sources
• Social Media
• Cyber Expert Blogs and News Feeds
• Vulnerability Reports
• PII Release Reports
• Phishing and Breach Reports
• Deep Web, Dark Web Markets and Forums
• Paste Sites
• Customers
Using Threat Intelligence to Drive
More Effective Risk Decisions
23
Team of Human Experts
• Former U.S. Intelligence Analysts
• Operational Cybersecurity Practitioners
• Relevant Threats are Mapped to Your
Key Business Areas so You Know Your
Cyber Strengths and Weaknesses
• Analysis of Actors, Threat Campaigns,
etc. includes Specific Best Practice
Recommendations to Take Meaningful
Action and Mitigate Risk
Using Threat Intelligence to Drive
More Effective Risk Decisions
24
Stay Ahead of Cyber Criminals
• Receive actionable alerts on ONLY cyber
threats relevant to your business
• Read personalized risk reports, written in
plain English and based on your profile
• Easy to understand and share with key
business and technical stakeholders
across the enterprise
- Executives and Board of Directors
- Legal
- IT Operations
- Information Security
- Enterprise Risk Management
- Fraud Department
Using Threat Intelligence to Drive
More Effective Risk Decisions
25
Keep Up with Evolving Risk
• Proactively monitor changes in your cyber
risk profile
• Access to SurfWatch Threat Analyst so
your team can review, monitor and analyze
relevant intel
• Ongoing alerts and reports when a relevant
threat matches your risk profile
• Analyst team on standby for specific
questions including threat impact
assessment, actor profiles, TTPs, and more
• Receive updated list of phishing URLs and
IPs based on SurfWatch collected data,
along with assistance in notifying providers
to initiate “takedown”
Q&A and Additional
SurfWatch Labs Resources
26
SurfWatch Cyber Advisor:
www.surfwatchlabs.com/cyber-advisor
SurfWatch Threat Analyst:
www.surfwatchlabs.com/threat-intel
Dark Web Intelligence:
www.surfwatchlabs.com/dark-web-intelligence
Personalized SurfWatch Demo:
info.surfwatchlabs.com/request-demo
Strategic and Operational Threat Intelligence

More Related Content

PDF
Hunting for cyber threats targeting weapon systems
PPTX
Cyber Crime Threat Landscape - A Focus on the Financial Industry
PPTX
Understanding Your Attack Surface and Detecting & Mitigating External Threats
PDF
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PDF
How to Reduce the Attack Surface Created by Your Cyber-Tools
PPTX
Cyber Threat Intelligence Solution Demonstration
PPTX
IT Security Essentials
PPTX
Cybersecurity Operations: Examining the State of the SOC
Hunting for cyber threats targeting weapon systems
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Understanding Your Attack Surface and Detecting & Mitigating External Threats
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
How to Reduce the Attack Surface Created by Your Cyber-Tools
Cyber Threat Intelligence Solution Demonstration
IT Security Essentials
Cybersecurity Operations: Examining the State of the SOC

What's hot (18)

PDF
Cyber Security and the National Central Banks
PDF
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
PDF
Practical approach to combating cyber crimes
PDF
The Cyber Security Landscape: An OurCrowd Briefing for Investors
PPTX
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
PDF
Top Cyber Security Trends for 2016
PDF
Cybersecurity | Risk. Impact. Innovations.
PDF
Data Security in Healthcare
PDF
ICION 2016 - Cyber Security Governance
PDF
Key Findings from the 2015 IBM Cyber Security Intelligence Index
PDF
Protecting Essential Information
PPTX
Cyber Security Landscape: Changes, Threats and Challenges
PPTX
Eliminating the Confusion Surrounding Cyber Insurance
PDF
2014 the future evolution of cybersecurity
PPT
Breaking down the cyber security framework closing critical it security gaps
PDF
Ch&Cie - Cyber Security - CIB - Teaser
PPT
The Changing Security Landscape
PPTX
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Cyber Security and the National Central Banks
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Practical approach to combating cyber crimes
The Cyber Security Landscape: An OurCrowd Briefing for Investors
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
Top Cyber Security Trends for 2016
Cybersecurity | Risk. Impact. Innovations.
Data Security in Healthcare
ICION 2016 - Cyber Security Governance
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Protecting Essential Information
Cyber Security Landscape: Changes, Threats and Challenges
Eliminating the Confusion Surrounding Cyber Insurance
2014 the future evolution of cybersecurity
Breaking down the cyber security framework closing critical it security gaps
Ch&Cie - Cyber Security - CIB - Teaser
The Changing Security Landscape
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Ad

Similar to Using Threat Intelligence to Address Your Growing Digital Risk (20)

PPTX
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
PPTX
How to Mitigate Risk From Your Expanding Digital Presence
PPTX
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats
PPTX
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
PPTX
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
PPTX
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
PPTX
Unit-1&2,mdngmnd,mngmdnmgnmdnfmngdf.pptx
PPT
Open Source Intelligence Overview
PDF
security-team-guide-reducing-operational-risk.pdf
PDF
Cyber Threat Intelligence
PDF
Cybersecurity for Energy: Moving Beyond Compliance
PDF
Threat Intelligence in Cyber Risk Programs
PPTX
Shining a Light on Cyber Threats from the Dark Web
PPTX
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
PDF
Fall2015SecurityShow
PDF
Building an Intelligence-Driven Security Operations Center
 
PPTX
Threat Intelligen.pptx
PPTX
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
PDF
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
PDF
Threat Intelligence in Cybersecurity.pdf
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
How to Mitigate Risk From Your Expanding Digital Presence
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Unit-1&2,mdngmnd,mngmdnmgnmdnfmngdf.pptx
Open Source Intelligence Overview
security-team-guide-reducing-operational-risk.pdf
Cyber Threat Intelligence
Cybersecurity for Energy: Moving Beyond Compliance
Threat Intelligence in Cyber Risk Programs
Shining a Light on Cyber Threats from the Dark Web
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
Fall2015SecurityShow
Building an Intelligence-Driven Security Operations Center
 
Threat Intelligen.pptx
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Threat Intelligence in Cybersecurity.pdf
Ad

More from SurfWatch Labs (13)

PPTX
Know Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
PPTX
IoT Devices Expanding Your Digital Footprint
PPTX
Cyber Threat Intelligence Solution Demonstration
PPTX
SurfWatch Labs Threat Intelligence Solution Demo
PPTX
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
PPT
Treat Cyber Like a Disease
PPTX
SANS Report: The State of Security in Control Systems Today
PPT
Point of Sale Insecurity: A Threat to Your Business
PPTX
Using Threat Information to Build Your Cyber Risk Intelligence Program
PPT
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
PPT
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
PPT
How to Raise Cyber Risk Awareness and Management to the C-Suite
PPT
Completing the Risk Picture: Adding a business intelligence and collaborative...
Know Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
IoT Devices Expanding Your Digital Footprint
Cyber Threat Intelligence Solution Demonstration
SurfWatch Labs Threat Intelligence Solution Demo
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Treat Cyber Like a Disease
SANS Report: The State of Security in Control Systems Today
Point of Sale Insecurity: A Threat to Your Business
Using Threat Information to Build Your Cyber Risk Intelligence Program
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Raise Cyber Risk Awareness and Management to the C-Suite
Completing the Risk Picture: Adding a business intelligence and collaborative...

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Mushroom cultivation and it's methods.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
August Patch Tuesday
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
A Presentation on Artificial Intelligence
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
cloud_computing_Infrastucture_as_cloud_p
A comparative analysis of optical character recognition models for extracting...
Building Integrated photovoltaic BIPV_UPV.pdf
Web App vs Mobile App What Should You Build First.pdf
WOOl fibre morphology and structure.pdf for textiles
Heart disease approach using modified random forest and particle swarm optimi...
MIND Revenue Release Quarter 2 2025 Press Release
OMC Textile Division Presentation 2021.pptx
Mushroom cultivation and it's methods.pdf
1 - Historical Antecedents, Social Consideration.pdf
August Patch Tuesday
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Zenith AI: Advanced Artificial Intelligence
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Approach and Philosophy of On baking technology
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Unlocking AI with Model Context Protocol (MCP)
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
A Presentation on Artificial Intelligence

Using Threat Intelligence to Address Your Growing Digital Risk

  • 1. Using Threat Intelligence to Address Your Growing Digital Risk
  • 2. Today’s Speaker Adam Meyer Chief Security Strategist SurfWatch Labs 2
  • 3. The Fabric of Cyber 3 • Cyber is tied to the fabric of everything necessary to run a business, connecting or enabling your: - Supply chain - Customer base - Business support applications - Financials - IT Infrastructure - Marketing and Sales - Communications
  • 4. The Threat Balloon 4 Cybercriminals shift their tactics to hit targets that are: “Attractive” and “Soft” This is a blind spot in your risk program
  • 5. The CISO’s Tug of War 5 Intelligence Operations (Tracking threats) vs. Network Defense (Stop the Bleeding) All of the Breached Companies Had Security Tools and Staff… Why is it that spending keeps increasing but nothing ever changes? Source: EMC
  • 6. Your Digital Footprint is Expanding Beyond Traditional Corporate Walls 6
  • 7. Increased Risk From Your Physical Infrastructure 7 • Building Automation - “Smart” Consumables - Facilities Devices - HVAC • Operational Technology - ICS/SCADA Devices • Physical Security - CCTV - Access Control
  • 8. Increased Risk From Your Employees 8 • Insider Risk - Malicious Data Leakage - Extortion - Fraud • Identity/Access Management - Exposed Credentials - Employee Doxing • Social Engineering - Phishing - Phone Scams - Help Desk Scams
  • 9. Increased Risk From Your Public-Facing Presence 9 • Customer Portals - Brute Force Attempts - Customer Account Takeover - Customer Account Transfer • Social Media - Account Takeover - Malicious Followers - Social Media Threat “Chatter” • Company Site and Blog - Brand Profiling - Domain Hijack/Theft - Account Takeover
  • 10. Increased Risk From Your Supply Chain 10 • Partners - Data Exchange - Connectivity - Data “Custodianship” • As-a-Service Vendors - Customer Impact - Brand Impact - Service Impact • Suppliers - Financials Transactions - Data Exchange - Availability
  • 11. Increased Risk From Criminal/Fraud Activity 11 • Dark Web Markets - Sale of Commodities - Counterfeit Efforts - Fraud Efforts • Cybercrime Forums - Discussion About “You” - Sharing of Sensitive Information • Open Source - Blogs - Forums - Social Media - Paste Sites
  • 12. Increased Risk From Your Technology Infrastructure 12 • Devices - Threats Targeting Your Devices - Threats Targeting Your Device Vendors • Applications - Vulnerabilities Affecting Your Apps - Threats Targeting Your Apps • Software (A Stack) - Vulnerabilities Affecting Your Software Suites and Capabilities - Threats Targeting Your Software Suites and Capabilities
  • 13. How Does Your Digital Footprint Translate into Increased Risk? 13 • Network-enabled or "smart" IOT devices are commonplace • The potential of having numerous devices per building potentially translates into the largest digital footprint that is NOT under proper security management • According to IDC forecasts, 40 percent of the information in the digital universe requires some level of protection, but only half of that data is protected.
  • 14. IoT Threat Examples 14 Rise of the IoT Botnets • Proliferation of devices • DDoS attacks • Ease of weaponization – ala Mirai, which weaponizes vulnerable IoT devices Distribution of Mirai Botnet in October attack
  • 15. Dark Web Forum Example 15 Sentry MBA is a credential-stuffing tool that tests stolen credentials against the authentication mechanisms on websites and mobile application API servers to discover instances of password reuse across those applications, and enable large- scale account takeovers.
  • 16. Dark Web Market Example 16 Fake Web Pages to use in phishing attacks – Bank of Montreal
  • 17. Physical Infrastructure Example 17 BACnet was designed to allow communication of building automation and control systems for applications such as heating, ventilating, and air-conditioning control (HVAC), lighting control, access control, and fire detection systems and their associated equipment. The BACnet protocol provides mechanisms for computerized building automation devices to exchange information, regardless of the particular building service they perform.
  • 18. Physical Infrastructure Example 18 Tridium Niagara is an IoT Building Automation Manufacturer Device belongs to an Assisted Living Facility in NY
  • 19. Using Threat Intelligence to Drive More Effective Risk Decisions 19 Gain critical insights on ACTIVE threats and risks to your business and can be applied to different areas • Threat Intel teams – know threat actors and their motivations to improve your defenses • Fraud teams – understand what commodities are being monetized so you can minimize fraud • Partners and Suppliers – understand the “presence” your vendors have to complement supply chain risk management • Breach Response – improve your planning and preparation instead of waiting to “get the call” from law enforcement • Executives and BoDs – understand the impact of cyber risk on your business and know where/how to best allocate resources to effectively mitigate risk • Brand Management – understand and mitigate brand risks from open and dark web sources
  • 20. Using Threat Intelligence to Drive More Effective Risk Decisions 20 SurfWatch Cyber Advisor: Strategic and Operational CTI • Establish a unique, in-depth cyber risk profile • Collect relevant threat data from a wide range of open, deep and dark web sources • Continuously and proactively monitor for new, emerging or trending threats to your business, supply chain and industry • Produce “to-the-point” cyber threat alerts and reports with risk mitigation recommendations • Establish and/or extend your cyber threat intel operation with automated data collection and processing, a team of expert analysts and SaaS visualization software
  • 21. Using Threat Intelligence to Drive More Effective Risk Decisions 21 Gain a Complete Picture of Your Digital Risk Landscape How do cyber risks impact your… • Business processes • Critical IT infrastructure • Brand • Finances • Customers • Suppliers • and More…
  • 22. Using Threat Intelligence to Drive More Effective Risk Decisions 22 Aggregate and Standardize Cyber Data from Thousands of Sources • Social Media • Cyber Expert Blogs and News Feeds • Vulnerability Reports • PII Release Reports • Phishing and Breach Reports • Deep Web, Dark Web Markets and Forums • Paste Sites • Customers
  • 23. Using Threat Intelligence to Drive More Effective Risk Decisions 23 Team of Human Experts • Former U.S. Intelligence Analysts • Operational Cybersecurity Practitioners • Relevant Threats are Mapped to Your Key Business Areas so You Know Your Cyber Strengths and Weaknesses • Analysis of Actors, Threat Campaigns, etc. includes Specific Best Practice Recommendations to Take Meaningful Action and Mitigate Risk
  • 24. Using Threat Intelligence to Drive More Effective Risk Decisions 24 Stay Ahead of Cyber Criminals • Receive actionable alerts on ONLY cyber threats relevant to your business • Read personalized risk reports, written in plain English and based on your profile • Easy to understand and share with key business and technical stakeholders across the enterprise - Executives and Board of Directors - Legal - IT Operations - Information Security - Enterprise Risk Management - Fraud Department
  • 25. Using Threat Intelligence to Drive More Effective Risk Decisions 25 Keep Up with Evolving Risk • Proactively monitor changes in your cyber risk profile • Access to SurfWatch Threat Analyst so your team can review, monitor and analyze relevant intel • Ongoing alerts and reports when a relevant threat matches your risk profile • Analyst team on standby for specific questions including threat impact assessment, actor profiles, TTPs, and more • Receive updated list of phishing URLs and IPs based on SurfWatch collected data, along with assistance in notifying providers to initiate “takedown”
  • 26. Q&A and Additional SurfWatch Labs Resources 26 SurfWatch Cyber Advisor: www.surfwatchlabs.com/cyber-advisor SurfWatch Threat Analyst: www.surfwatchlabs.com/threat-intel Dark Web Intelligence: www.surfwatchlabs.com/dark-web-intelligence Personalized SurfWatch Demo: info.surfwatchlabs.com/request-demo Strategic and Operational Threat Intelligence