BT Assure Threat Intelligence



Similar documents
Cyber Security Evolved

CYBER SECURITY Audit, Test & Compliance

Protecting against cyber threats and security breaches

Advanced Threat Protection with Dell SecureWorks Security Services

THE WORLD IS MOVING FAST, SECURITY FASTER.

Cyber Security - What Would a Breach Really Mean for your Business?

A global infrastructure to safeguard your business_

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Connecting things. Creating possibilities. A point of view

ISO27032 Guidelines for Cyber Security

Address C-level Cybersecurity issues to enable and secure Digital transformation

Moving to a new dimension of networks. Connect IQ: evaluator

Risk Analytics for Cyber Security

Threat Intelligence. Benefits for the enterprise

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Increase insight. Reduce risk. Feel confident.

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

BT Quick Starts for Retail Banking Customers

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

Developments in cybercrime and cybersecurity

CYBER SECURITY TRAINING SAFE AND SECURE

Cloud Infrastructure Security Management

CGI Cyber Risk Advisory and Management Services for Insurers

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Penetration Testing Services. Demonstrate Real-World Risk

Unified Security Management and Open Threat Exchange

Five reasons SecureData should manage your web application security

Riding technology waves

Managed Security Monitoring: Network Security for the 21st Century

Outsourcing customer contact

1 WE MAKE IT POSSIBLE BT LOCATION SERVICES. Protection, advice, care. Professional services and assistance to boost efficiency.

ESKISP Conducts vulnerability assessment under supervision

Proactive Threat Management using Global Threat Intelligence

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY

Cybersecurity and internal audit. August 15, 2014

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Cybernetic Global Intelligence. Service Information Package

Protecting your business interests through intelligent IT security services, consultancy and training

MANAGED SECURITY SERVICES (MSS)

Manage the unexpected

Optimizing Network Vulnerability

BT Advise Connect. Delivering intelligent network capability around the globe. BT Connect IQ Quick Start. BT Advise

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales


INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.

A BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper

Cyber Risks in Italian market

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

BT Assure Rethink the Risk

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

DNS Server Security Survey

Mitigating and managing cyber risk: ten issues to consider

External Supplier Control Requirements

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

ESKISP Manage security testing

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity

Malware isn t The only Threat on Your Endpoints

Managing cyber risks with insurance

Cyber Security solutions

CASSIDIAN CYBERSECURITY

HP Fortify Software Security Center

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

A risky business. Why you can t afford to gamble on the resilience of business-critical infrastructure

IBM Security Intelligence Strategy

Tackling the growing risk of cyber crime

Addressing Cyber Risk Building robust cyber governance

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

developing your potential Cyber Security Training

Cyber Threat Summit Brochure

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

BT Unified Trading communication. The Future Delivered

Defending against modern threats Kruger National Park ICCWS 2015

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

CyberReady Solutions. Integrated Threat Intelligence and Cyber Operations MONTH DD, YYYY SEPTEMBER 8, 2014

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Security for the Cloud of Clouds

Hospitality Solutions

Making Contact Centres Efficient. Meet the needs of your customers and your business

A HELPING HAND TO PROTECT YOUR REPUTATION

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Cybersecurity Strategic Consulting

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Cyber security Building confidence in your digital future

Obtaining Enterprise Cybersituational

CYBER SECURITY INFORMATION SHARING & COLLABORATION

How To Protect Your It Infrastructure

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Finance sector application of the SATURN Intelligent Data Analytics and Visualisation Platform

THE GENIUS OF DATA: MAKING INTELLIGENT SECURITY A REALITY

Transcription:

BT Assure Threat Intelligence Providing you with the intelligence to help keep your organisation safe BT Assure. Security that matters

At all times, organisations are vulnerable to all kinds of cyber attacks that need defending against. You need to have the peace of mind that comes from knowing what to look out for and how to create an effective defence. BT Assure Threat Intelligence can provide the knowledge and understanding to create that peace of mind. Assure Threat Intelligence gives you the insight to help anticipate and defend against cyber threats.

DO YOU KNOW WHAT THE IMPACT OF CYBER ATTACKS CAN BE ON YOUR ORGANISATION? 51% OF CHIEF EXECUTIVES SAY THEIR COMPANY EXPERIENCES CYBER ATTACKS HOURLY OR DAILY1 RES PO RE ONNSE P R EPSS SEE L P NS O A PA SL ON REPP NN LA AN SE PL N 40% OF IT DECISION MAKERS ARE NOT CONVINCED THAT THEIR ORGANISATION HAS A RESPONSE PLAN TO COUNTERACT DDOS ATTACKS2 TWO THIRDS OF IT DECISION MAKERS SAY THEIR SYSTEMS WERE DOWNED FOR MORE THAN THE NATIONAL CRIME AGENCY CONSIDER THE TARGETED COMPROMISE OF UK NETWORKED SYSTEMS IS LIKELY TO RISE3 HACKERS ARE RENTING-OUT THEIR SERVICES AND BESPOKE TOOLKITS, MAKING CYBER ATTACKS VIABLE FOR ALMOST ANYONE3 Ponemon Institute study, Cost of a Data Breach, 2014 1 BT DDoS research, June 2014 The National Crime Agency (NCA), National Strategic Assessment of Serious and Organised Crime, 2014 2 3

CYBER SECURITY SHOULD BE A PRIORITY FOR EVERY ORGANISATION To survive and thrive, any organisation needs to identify threats early. Intelligence is only useful if it is timely, relevant and actionable. The best way to defend against threats is to be prepared and proactive. Receiving a stream of data and analysis after an attack is really too late. Our Assure Threat Intelligence Service helps protect in four key ways: Behaviour-led Analysts identify existing and potential threats using our four key processes: Proactive anticipating what could happen before it does Pre-emptive based on proactive findings, helping you to put in place measures to mitigate the vulnerabilities before they are exploited Discovery find existing vulnerabilities and threats already deployed Remediate offering advice and support for vulnerabilities that have been exploited Risk-based We understand risk and the importance of protecting assets. We rely on this service to protect BT s assets and reputation Analysis Our reports don t just provide data, they offer contextual information based on the so what? or what if factors, applicable to your network Intelligence sharing We have established secure communities that share information globally within sectors. This means we have access to accurate intelligence enabling you to take defensive action faster.

THE BENEFITS OF ASSURE THREAT INTELLIGENCE Minimise risk Forewarned is forearmed, so we can tailor our intelligence reporting specifically to meet your needs, looking for threats and vulnerability against your organisation. Improve security We can develop your cyber strategy to help you manage and minimise vulnerabilities that you are exposed to, giving you the peace of mind that you are doing all that you can to reduce the risk of cyber attack. Give insight into the future With the nature of our business, we have insight of what lies ahead and needs defending against. We can therefore advise on threat trends and new technologies or solutions that drive a more informed protection against security incidences. Save money Any breach of security has a financial impact, whether it s on your reputation, theft of intellectual property or fraud. Assure Threat Intelligence gives you the latest knowledge so that you can protect your assets, customers and employees. Timely and accurate cyber intelligence reporting needs to be at the heart of protecting your organisation if it is to proactively remain ahead of the threats. WHAT WE OFFER Threat / customer-specific threat reports Number of individual licenses Customer workshop to establish intelligence requirements (IR) Monthly review of IR s with intelligence professionals Technical intelligence Weekly customer-bespoke intelligence reports Weekly sector intelligence report Weekly cross sector intelligence report Monthly trend reports Ad-hoc reports on key threats Reports delivered in both English and customer specific language Dedicated coverage relevant to customers and threat time zones Advanced + Advanced Standard Entry 4 2 10 5 4 4

AND HOW WE DO IT We gather information and turn it into intelligence that you can actually use and act upon. Our analysts have specialist sources for collecting data and assessing threats. Our unique position enables us to collect a huge amount of intelligence from a variety of sources, both human and technical and draw conclusions on risk and threat. We advise you of what you need to know rather than overwhelm you with non-relevant information. Daily scanning of threats based on your intelligence requirements: depending upon your chosen level of service we provide dedicated intelligence coverage and automated monitoring giving you round-the-clock coverage. Cross sector threat report: casts a wide angle lens on a variety of sectors, regions and technical threats. Bespoke and sector threat reports: these focus on specific and emerging threats tailored to you and/or your sector. These reports act as a tactical heartbeat of the threat landscape, and allow operational teams to stay ahead of emerging issues. Ad-hoc bespoke reports: these are threat reports specific to you and your intelligence requirements. They review hackers and third party assets of interest, in the context of your estate and intelligence requirements. Monthly trend reports: these reports focus on incidents in the past month to ensure strategy remains focused on key threats facing your organisation. Technical threat reports and remediation advice: produced as and when a threat is identified. They focus on emerging threats and Advanced Persistent Threats (APTs) and their relevance to your estate, market sector and/or external interests. Topics range from advising on potential mitigation strategies through to very specific and directed intelligence threat assessment of a group, operation or hacker based on your network topology.

WHY CHOOSE ASSURE THREAT INTELLIGENCE? As a GLOBAL NETWORK OPERATOR we are in a position to immediately identify emerging and potential threats wherever they may come from We have a wide range of STRATEGIC PARTNERSHIPS with world-class organisations that cooperate with us on gathering intelligence We blend physical and logical information to build a full picture of threats, analysing data in 14 follow-the-sun SECURITY OPERATIONS CENTRES We have 600 global security specialists, 2,000 security practitioners and over 4,000 professional services consultants world-wide What we OFFER TO YOU is what we have successfully used to protect our own business Our service is not purely derived from open-source data and is HIGHLY CUSTOMISABLE to meet your needs. WANT TO KNOW MORE? THEN GET STARTED TODAY For further information and case studies go to: www.globalservices.bt.com/uk/en/casestudy To arrange a consultation with one of our security experts just email assurecti@bt.com Or, why not see our technology in action? Book a visit to one of our BT showcases at www.globalservices.bt.com/uk/en/insights/vehicle_for_change

Offices worldwide The services described in this publication are subject to availability and may be modified from time to time. Services and equipment are provided subject to British Telecommunications plc s respective standard conditions of contract. Nothing in this publication forms any part of any contract. British Telecommunications plc 2014 Registered office: 81 Newgate Street, London EC1A 7AJ Registered in England No: 1800000