teamt5 introduction
play

TeamT5 Introduction Tsai Sung-Ting ( TT ) Global Customers Client - PowerPoint PPT Presentation

TeamT5 Introduction Tsai Sung-Ting ( TT ) Global Customers Client / Partner regions Japan, Taiwan, ASEAN, Korea, US 50+ Clients Government agencies Leading CTI Firms Security vendors MSSP Telecom / ISP


  1. TeamT5 Introduction Tsai Sung-Ting ( TT )

  2. Global Customers Client / Partner regions Japan, Taiwan, ASEAN, Korea, US • 50+ Clients Government agencies • Leading CTI Firms • Security vendors • MSSP • Telecom / ISP • Accounting firms / Financial sectors • Semiconductor / Manufacturing • International Trading •

  3. TeamT5 Solutions Elegant Threat Hunting Technology Uncover hidden threats • Threat hunting platform and service. • Incident response, malware analysis, and forensics. Threat mitigation and consulting service. • World-leading Threat Intelligence Know your enemies Tracking and monitoring to 100+ cyber attack groups. • Leader in espionage threat research, especially threats from Asia. • Not only tracking and analyzing, we are also hunting actors. •

  4. WORLD-LEADING CTI RESEARCH

  5. TeamT5 Threat Intelligence Many people are talking about Threat Intelligence, we actually do it. Analysis Language & 10+ years Threat Visibility Hunting Actors Automation Culture experience

  6. THE SOLUTION TO MODERN THREATS

  7. An elegant threat hunting solution Threat Hunting Behavior Modeling • • Threat Intelligence Outlier • Elegant and Efficient Light-weight with high l Auto Investigation detection rate Low cost, less efforts Infection Timeline • l Low risk, non-intrusive Lateral movement analysis • l Orchestration • SIEM Integration On premise HTTP Restful API •

  8. Use Case (1) – Threat Hunting Tool Identify infected computers instantly Powerful remote forensics Much more efficient than • Compromise assessment on risks • traditional incident response. Incident response, especially cyber • espionage Automatic investigation, log • Auditing riskware, shadow IT • analysis, malware analysis. (unauthorized servers) Simple and efficient Target clients Simply bring a server to IR-site • • CSIRT team of large enterprises Dispatch scanner using AD or existing • • MSSP, SOC, *-ISAC, CERT service mechanism providers IR Scan 2000+ PC per hour / per • server • Computer Auditing or Accounting firms Centralized Dashboard & Reports • from server • Cybersecurity insurance

  9. Use Case (2) – Endpoint Protection Target clients Daily endpoint health check Installed dedicated ThreatSonar • Enterprises, especially with oversea • server subsidiaries Regular scan (e.g. 1 time / day) • • Financial firms with ATM, need on- Dashboard shows high level • premise suspicious PC • Cybersecurity insurance companies If threats detected, start investigation • • Who need lightweight endpoint with information provided by visibility ThreatSonar.

  10. Fusion of Threat Hunting & Threat Intelligence T5 Intelligence

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend