Threat Information for
Improved Risk Analysis
As overwhelming volumes of raw cyber event data are ingested into the SurfWatch data warehouse, they are aggregated and standardized into the CyberFact information model, which leverages a simple ATEP structure - Actor, Target, Effect, and Practice. Now security and IT professionals, executives and analysts can understand risks facing their organization and make more strategic and informed cybersecurity decisions.
As part of the ATEP information model, SurfWatch Labs creates high-level threat categories for tags within a piece of information (i.e. a document). Associated with every CyberFact are Industry Target Tags, which describe the business or organization most impacted by the event. Below is the listing of threat categories for Actor, Target, Effect and Practice, along with definitions and real-world examples.
Who conducted/will conduct the attack?
What was specifically targeted in the attack?
What occurred as a result of the attack?
What method was used to carry out the attack?
Once the cyber event data is put into the ATEP structure, SurfWatch Labs runs sophisticated analytics and adds a layer of human intelligence to filter out all the "white noise". This resulting strategic and operational cyber threat intelligence is available via:
Immediately establish a threat intelligence operation that delivers personalized intelligence based on your specific business profile.
Gain visibility of relevant threats to your business, supply chain and industry, and mitigate your risk.
Easily access and integrate threat intelligence with your existing environment to compare relevant, external-facing threats to what you're seeing inside your network.
"SurfWatch serves as our threat intelligence team, providing us with critical link analyses and insights to proactively address any potential cyber threats to our customers and our business. Knowing what cyber threat and Dark Web activity is occurring helps us ensure the safeguarding of customer information and focus our cybersecurity efforts in the right areas."
Director of Cyber Security