Skip to main content

Cyber Threat Intelligence Program

Updated over 5 months ago

Service Overview

The Cyber Threat Intelligence (CTI) program provides continuous automated and manual threat discovery and analysis across the clear, deep, and dark web, as well as cellular applications.

CYE’s experts identifiy leaked data, exposed threat surfaces, and attacker intentions across multiple risk domains.


Methodology

CYE’s CTI services cover four primary focus areas:

  • Corporate
    Monitoring the corporation and its subsidiaries to assess cyber risks such as:
    • Potential incidents
    • Attackers with intent or opportunity to target the customer
    • Leaked or traded sensitive information on online platforms
    SLA: Real-time alerts / Daily alerts / Periodic report only

  • Vulnerability Management Intelligence (VMI)
    Targets organizational technologies (on-premises or cloud-based) to detect and alert on vulnerabilities of varying severity - from newly discovered issues to critical unpatched risks. This enables customers to take actions to harden the tech stack or replace parts to boost cyber resilience. It includes technologies and third-party vendors.
    SLA: Real-time alerts / Daily alerts / Periodic report only

  • Key Personnel
    Monitors a single individual or a list of individuals to assess personal-level cyber risks and support mitigation actions to reduce their exposure.
    SLA: Real-time alerts / Daily alerts / Periodic report only

  • Suppliers
    Focuses on the organization’s supply chain to monitor cyber risks related to vendors and third parties that may impact the customer.
    SLA: Real-time alerts / Daily alerts / Periodic report only


Deliverables

  • Real-time alerts via email

  • Quarterly intelligence reports


Prerequisites

  • Relevant domains

  • IP addresses of monitored assets

  • Names of personnel, technologies, or suppliers - depending on focus area


Customer Engagement

Providing the target list before activity commencement


Relevant Standards

  • NIST Cybersecurity Framework


Security Domains Covered

  • Security operations, monitoring, and incident response.

Did this answer your question?