executive security - lookingglass cyber | cybersecurity ......report includes a summary of findings,...

2
Executive Security Physical Threats Online posngs that threaten or incite others to take harmful acon directly against individuals. Informaon Threats From malicious posng of personal informaon to inadvertent disclosures by the individual, the web and social media can spread sensive data rapidly. Known Adversaries A growing and increasingly observable community of actors that target organizaons and individuals for criminal, polical, and even social and religious reasons. In the age of social media, high-profile individuals face a range of risks and threats that were uncommon even a few years ago. Online adversaries and acvists are increasingly seeking to threaten, harass, and embarrass high-profile execuves and other public figures. From the posng of personal informaon on public sites through “doxxing” or organized efforts to overwhelm Twier accounts with large amounts of messages, aka “Twierbombs,” criminals and hackvists are finding new and creave ways to go aſter their targets. Anyone with a grudge or disagreement now has a free global plaorm from which to launch their acvies. The Cyveillance Execuve Security Suite helps security professionals detect and assess threats to their execuves and high- profile employees. Our real-me Threat Alerts provide advance indicaons and warnings to your team, and can be integrated directly into your Operaons Center and security tools to deliver online threat intelligence from a wide range of global online sources. In-depth Assessments, Family Monitoring, Invesgaons, and Response Services round out a complete suite of offerings. A s s e s s m e n t s A l e r t s R e p o r t s Information Threats Physical Threats Known Adversary

Upload: others

Post on 17-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Executive Security - LookingGlass Cyber | Cybersecurity ......report includes a summary of findings, source material, expert observations and recommended risk mitigation strategies

Executive Security

Physical ThreatsOnline postings that threaten or incite others to take harmful action directly against individuals.

Information ThreatsFrom malicious posting of personal information to inadvertent disclosures by the individual, the web and social media can spread sensitive data rapidly.

Known AdversariesA growing and increasingly observable community of actors that target organizations and individuals for criminal, political, and even social and religious reasons.

In the age of social media, high-profile individuals face a range of risks and threats that were uncommon even a few years ago. Online adversaries and activists are increasingly seeking to threaten, harass, and embarrass high-profile executives and other public figures. From the posting of personal information on public sites through “doxxing” or organized efforts to overwhelm Twitter accounts with large amounts of messages, aka “Twitterbombs,” criminals and hacktivists are finding new and creative ways to go after their targets. Anyone with a grudge or disagreement now has a free global platform from which to launch their activities.

The Cyveillance Executive Security Suite helps security professionals detect and assess

threats to their executives and high-profile employees. Our real-time Threat Alerts provide advance indications and warnings to your team, and can be integrated directly into your Operations Center and security tools to deliver online threat intelligence from

a wide range of global online sources. In-depth Assessments, Family Monitoring,

Investigations, and Response Services round out a complete suite of offerings.

Asse

ssments Alerts

Reports

Information ThreatsPhysical ThreatsKnown Adversary

Page 2: Executive Security - LookingGlass Cyber | Cybersecurity ......report includes a summary of findings, source material, expert observations and recommended risk mitigation strategies

Executive Security

24x7 Detection and MonitoringCyveillance Threat Alerts warn of physical and information threats being made on major social networking sites, and keep watch on hundreds of bad actors and known adversaries. Cyveillance Security Analysts assess every potential threat detected and deliver only the truly relevant findings in near real-time.

Expert AnalysisDaily Intelligence Briefings enhance the Threat Alerts with a focus on context and supplemental information specific to the threat, post or specific actor. Cyveillance analysts are available to provide in-depth source coverage and to deliver briefings that bring an additional level of industry knowledge and insight to the 24x7 monitoring service.

Executive Threat AssessmentsOur experienced analysts produce our Executive Threat Assessments. These “deep dive” reports examine both the protected individual’s online exposure and any current or recent online activity from, or indicating an active adversary such as a hacking or activist group. Each report includes a summary of findings, source material, expert observations and recommended risk mitigation strategies.

Investigative Services A cadre of specialized analysts produces threat assessments for executive travel, adversary-group profiles, content analysis, social network mapping and a variety of ad hoc research based on your business needs. Options also include expedited results and urgent or sensitive investigations available any time, day or night.

Family MonitoringOften, disclosures by family members escape the watch of even the most diligent security representatives. Cyveillance can look for geo-tagged social media posts, phone numbers and email addresses for the executive’s immediate family. These type of disclosures allow threat actors to directly target the executive’s most prized assets, family members. Cyveillance will monitor and detect disclosures pertaining to the executive’s family as part of the upgraded daily report. These services are included in the Daily Intelligence Briefing option.

Response ServicesThe Cyveillance Response Operations Center assists clients with content removal and account shutdown and recovery. This can include disabling impersonation or “spoof” accounts, posts that contain sensitive information such as personal identity data, or disparaging content that violates a website or social network’s terms of use.

About CyveillanceCyveillance is the leading provider of cyber threat intelligence, enabling organizations to protect their information, infrastructure, and employees from physical and online threats found outside the network permeter. Founded in 1997, Cyveillance delivers an intelligence-led approach to security through continuous, comprehensive monitoring of millions of online data sources, along with sophisticated technical and human analysis. The Cyveillance Cyber Threat Center, a cloud-based platform, combines web search, social media monitoring, underground channel information, and global intelligence with investigative tools and databases of threat actors, domain names and IP data, phishing activity, and malware. Cyveillance serves the Global 2000 and the majority of the Fortune 50 – as well as global leaders in finance, technology, and energy – along with data partners and resellers. For more information, visit www.cyveillance.com. Cyveillance is a wholly-owned subsidiary of QinetiQ, a FTSE250 company which uses its domain knowledge to provide technical support and know-how to customers in the global aerospace, defense and security markets. For more information, visit www.qinetiq.com.

Cyveillance, Inc.11091 Sunset Hills Road, Suite 210 Reston, Virginia 20190888.243.0097

www.cyveillance.com [email protected]

Copyright © 2015 Cyveillance, Inc. All rights

reserved. Cyveillance is a registered trademark

of Cyveillance, Inc.