how to grow your managed security service practice with strategic threat intelligence
TRANSCRIPT
![Page 1: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/1.jpg)
How to Grow Your Managed Security Services Practice with
Strategic Threat Intelligence
![Page 2: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/2.jpg)
Today’s Speakers
2
Adam MeyerChief Security StrategistSurfWatch Labs
Todd WhileVP of Business DevelopmentSurfWatch Labs
![Page 3: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/3.jpg)
Getting a Baseline of Where We Are Today with Cybersecurity
3
200+ days is the average time to detect a breach• Only looking inward means
you’re too late
• Point-in-time assessments are only good at that point in time!
• $3.8M is the average cost of a breach
![Page 4: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/4.jpg)
Wall Building… But No Lookout?
4
![Page 5: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/5.jpg)
Your Customers’ Dirty Laundry…Coming Out on the Dark Web
5
![Page 6: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/6.jpg)
The New Regulatory Reality
6
• Regulatory guidance, enforcement and ensuing litigation is here… and more is coming… - SEC
- FTC
- FCC
- FFIEC
- UK GCHQ
![Page 7: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/7.jpg)
Prepare for a Wave of Litigation, Fines and Penalties
7
Being able to prove due diligence and standard of care is a must• Cox Communications - $590k Fine, 7 years of audits
• Wyndham
• Ashley Madison
• Excellus BlueCross BlueShield
• OPM
• Sony
• Target
• Anthem
• Home Depot
![Page 8: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/8.jpg)
We’ve Been Breached? You’re Fired!
8
• Cybersecurity and IT teams will get fingers pointed at, but…
• Executives are now being held accountable when breaches occur
• MSSPs also held accountable
![Page 9: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/9.jpg)
9
![Page 10: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/10.jpg)
Examining The Need for Cyber
Threat Intelligence
![Page 11: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/11.jpg)
Cyber Threat Intelligence Will Help Steer the Ship in the Right Direction
11
![Page 12: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/12.jpg)
Using Threat Intelligence
12
Intelligence is regularly defined as information that can be acted upon to change outcomes.
One definition of Threat intelligence is the process of moving topics:
1. From “unknown unknowns” to “known unknowns” by discovering the existence of threats, and then…
2. Shifting “known unknowns” to “known knowns”, where the threat is well understood and mitigated.
![Page 13: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/13.jpg)
Unlock Cybersecurity from the Bits and Bytes
13
• Cyber impacts everyone and thus must be understood by everyone
• Tie specific threats to business impact
![Page 14: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/14.jpg)
Know What Threats are Coming
14
Look Outward to Plan Ahead• Understand attack execution methods
based on relevant cyber trends
• Prepare for attacks on specific assets of value
• Know what information is already out on the Dark Web
Armed with these insights you can ensure the most effective cyber defense tactics
![Page 15: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/15.jpg)
Be Able to Prove Due Diligence in a Court of Law
15
• Threat Intelligence is a recognized best practice by industry analysts and frameworks/guidelines- UK GCHQ- FFIEC
• Using Cyber Threat Intelligence Shows You’re Paying Attention!
![Page 16: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/16.jpg)
Gain a Competitive Edge
16
Obtain Net New Business• Use cyber data warehouse to build personalized prospect
pitches that are highly targeted
Expand Your Existing Business Footprint• Deliver greater value that reaches a business-oriented audience
• Provide ongoing analyst services to increase stickiness
Flexibility for Your Business Model• Reduce costs - use intelligence to focus your security efforts and to
automate reporting
• Scale up or down as needed
✓✓
✓
![Page 17: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/17.jpg)
Your Opportunity to Become a
Cyber Advisor for Your Clients
![Page 18: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/18.jpg)
Turn Raw Data into Meaningful Cyber Threat Intelligence
18
![Page 19: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/19.jpg)
Cyber Advisor: Your All-in-One Threat Intelligence Solution
19
• Combines of Analytics, Products and Human Experts Guide You to Make the Most Effective Security Decisions
• Ties Relevant, Critical Risks to the Impact on Your Business Operations (IT, Security, Legal, Fraud, Risk Management)
• Ensures Continuous Risk Monitoring of Traditional and Dark Web Threats to Your Business
• Delivers Prioritized Threat Mitigation Best Practice Recommendations
![Page 20: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/20.jpg)
Complete Threat Intelligence Suite of Products
20
Easy-to-use SaaS products that provide real-time and continuous visibility on your specific threat landscape• What cyber activity is occurring in your business domain?
• What are you seeing within your network?
• What’s happening from a cyber risk perspective in your supply chain?
![Page 21: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/21.jpg)
Deliver Real Value for Small Business Clients
21
Your Source for Cybersecurity News, Analysis and Alerts• Cost-effective threat intelligence
delivered to you through mobile and web platforms
• Commentary and insights from SurfWatch Analysts
• Personalized alerts that match your profile
• Human intelligence in monthly risk reports
![Page 22: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/22.jpg)
Change the Cybersecurity Game for You and Your Clients
22
• Cyber threats are dynamic - A point in time risk assessment is only useful AT THAT POINT IN TIME
• Continuous outward-looking visibility and understanding is KEY TO KNOWING WHAT’S COMING YOUR WAY
• Cyber can no longer be boxed in as a technical problem – it must be tied to the business to PROPERLY MANAGE RISK
![Page 23: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/23.jpg)
Q&A and Additional SurfWatch Labs Resources
23
Solution and Product Information• Cyber Advisor
http://info.surfwatchlabs.com/SurfWatch-Cyber-Advisor-Datasheet
• Dark Web Intelligencehttp://info.surfwatchlabs.com/dark-web-service-brochure
• Threat Intelligence Suitehttp://info.surfwatchlabs.com/SurfWatch-Threat-Intelligence-Suite-Datasheet
• Analytics APIhttp://info.surfwatchlabs.com/SurfWatch-Analytics-Datasheet
Become a Partner• Email [email protected]
![Page 24: How to Grow Your Managed Security Service Practice with Strategic Threat Intelligence](https://reader030.vdocument.in/reader030/viewer/2022032613/58a9a6d31a28ab9c758b4d19/html5/thumbnails/24.jpg)
Thank You!
www.surfwatchlabs.comFollow us at: