Service Overview
The Cyber Threat Intelligence (CTI) program provides continuous automated and manual threat discovery and analysis across the clear, deep, and dark web, as well as cellular applications.
CYE’s experts identifiy leaked data, exposed threat surfaces, and attacker intentions across multiple risk domains.
Methodology
CYE’s CTI services cover four primary focus areas:
Corporate
Monitoring the corporation and its subsidiaries to assess cyber risks such as:
• Potential incidents
• Attackers with intent or opportunity to target the customer
• Leaked or traded sensitive information on online platforms
• SLA: Real-time alerts / Daily alerts / Periodic report onlyVulnerability Management Intelligence (VMI)
Targets organizational technologies (on-premises or cloud-based) to detect and alert on vulnerabilities of varying severity - from newly discovered issues to critical unpatched risks. This enables customers to take actions to harden the tech stack or replace parts to boost cyber resilience. It includes technologies and third-party vendors.
• SLA: Real-time alerts / Daily alerts / Periodic report onlyKey Personnel
Monitors a single individual or a list of individuals to assess personal-level cyber risks and support mitigation actions to reduce their exposure.
• SLA: Real-time alerts / Daily alerts / Periodic report onlySuppliers
Focuses on the organization’s supply chain to monitor cyber risks related to vendors and third parties that may impact the customer.
• SLA: Real-time alerts / Daily alerts / Periodic report only
Deliverables
Real-time alerts via email
Quarterly intelligence reports
Prerequisites
Relevant domains
IP addresses of monitored assets
Names of personnel, technologies, or suppliers - depending on focus area
Customer Engagement
Providing the target list before activity commencement
Relevant Standards
NIST Cybersecurity Framework
Security Domains Covered
Security operations, monitoring, and incident response.
