SlideShare a Scribd company logo
1 of 8
Download to read offline
CENTRE FOR STRATEGIC
CYBERSPACE + SECURITY SCIENCECSCSS
COMMITTED TO EXCELLENCE
IN CYBER DEFENCE.
ONE MISSION. ONE GROUP.
CSCSS / DEFENCE
INTELLIGENCE GROUPC DIG
We live in a world of highly interconnected, network-centric,
global systems. This provides endless opportunities for the
development of new visions for growth and prosperity. The
current economic shadow is generating increased competition
from legitimate competitors as well as other players who
strive for any advantage and present significant national,
transnational and economic security risks and threats.
These factors will foster new necessities for cyber defence.
Complex,interrelated and dynamic forces will transform
and recast the face of cyber defence, its role, priorities,
strategies, frameworks and the methodologies necessary
to meet the unique demands placed upon it.
The threats faced are persistent, constantly evolving
and transcend national boundaries.
CSCSS / DEFENCE INTELLIGENCE GROUP
IS YOUR SHIELD, YOUR FIRST LINE OF DEFENCE.
Understanding what is at risk means you have
the keys to protecting yourself.
C DIG
CSCSS Defence Intelligence Group – C/DIG
The CSCSS Defence Intelligence Group strives to change the
paradigm identifying the: WHO, HOW and WHY behind cyber-
attacks. This enables a pro-active defence based on solid
understanding of threats and players.
C/DIG offers a spectrum of Intelligence products. At the
strategic level we track national players to determine their
policies, and intentions. At the operational level C/DIG
documents their Tactics, Techniques and Procedures (TTP).
At the tactical level we provide threat analysis, identification
and forensic analysis. All of this data is used for awareness,
education, prevention and defence from cyber-attacks and in
support of contingency operations to protect your organization.
Our Mission
The Defence Intelligence Centre works in real-time to report,
analyze, forecast providing credible, reliable, sustained intel-
ligence services and contingency planning.
Our Vision
Provide the best all source cyber-centric intelligence, counter-
intelligence, and cyber-security services oriented to national
players.
Clear answers to your critical challenges
We will help you to identify how key trends will impact your
business and security strategy and you’ll get direct answers
to your most pressing security challenges and your defence
Intelligence stance.
What are we doing to protect information?
Security is no longer simply about preventing external threats
from entering the enterprise; it’s about keeping critical information
assets from leaving. Defence Intelligence plays a key role in
Information security. It is an essential strategic business
requirement resource that expands the strategic role of leader-
ship, transforming them into point persons who lead and develop
strategy, conduct an organization’s business and manage
security risk.
Delivering Threat Intelligence for the Real World
C/DIG - How are we responding to threats?
The interconnected landscape around us continues to evolve at
blinding speed, introducing new threats, complexities, concerns
and exposures. This state of challenge has become the norm,
requiring us to respond much more rapidly and effectively to stay
ahead of the competition, our adversaries, and the security curve.
This means organizations must understand ‘threat information’
AND security as part of the constant business evolution process.
Defence Intelligence is a component of the effort to be continually
diligent in security strategies and risk management programs.
A Snapshot - What is the Issue?
Competitive Intelligence, corporate and foreign espionage,
cyber attacks on the supply chain, counterfeiting, the global
cyber crime epidemic, fraud, malware research + development,
theft of proprietary and intellectual property and information.
All this effort is focused on illicitly gaining competitive advantage.
These threats can, and in most cases will, include national level
players that seek to improve competitive advantage, their
economies, technologies and militaries through specifically
targeted activities
DEFENCE INTELLIGENCE DEFINED
[Intelligence is] The integration, evaluation, analysis,
and interpretation of data into actionable information
that you need to know to be successful.
YOU ARE A TARGET
IF YOUR COMPANY:
n has a technology or technological edge
n has cutting edge proprietary information
n has developed a process that manufactures an item
at less cost than others
n is negotiating with another company or country,
the negotiators and negotiation strategy are
highly confidential
THE BOTTOM LINE – VALUE AND ADVANTAGE –
TRADE SECRETS ARE AT RISK EVERY DAY
If your company has invested time and resources
developing a concept, market strategy, process,
product or technology, you have to protect it.
You will be a target and you should expect
to be attacked.
How We Help
The CSCSS Defence Intelligence Group provides a full range of
cyber - Intelligence services in order to profile your organization
and identify, detect, and neutralize exploitable threats. Our areas
of expertise deliver extremely specialized risk management
services mapped to, NIST, COBIT, ISO, BS25999 and/or other
industry standards.
It’s about Focus
We engage our clients with a team of professionals focused
exclusively on defence intelligence. We provide the critical
insight, advice, and information to enable senior-level business,
IT, and security executives to make the strategic, organizational,
and technology investment decisions required to control today’s
continually evolving business and security threat environments.
We Deliver
C/DIG will provide you with the insight you require to look
beyond security and technology to gain an evocative, strategic
approach to assessing and defending against the threats against
you. You will have what you need to manage information
security and mission-critical business processes and assets.
You will get the clear and focused picture, without the hype,
to deliver organizational competitive edge.
Strategically
CSCSS and the Defence Intelligence Group recognize the Rule of
Law and the application of internationally recognized principals,
protocols and conventions to cyberspace. CSCSS, through the
Defence Intelligence Group provides a response to nations that
discard or refuse to comply with these principals. We operate
as a Cyber-Defence partner against non-compliant nations.
Strategic Commitment
n Teamwork: Partnership across multinational and
organizational boundaries for mission accomplishment
n Integrity: Adherence to the highest legal and ethical
principles in our work
n Excellence: Deliver agile, empirical, and insightful
professionalism and expertise in cyber-defence intelligence
n Service: Dedication to our mission, goals, and objectives
and clients to achieve the highest standards of excellence
and greater stability in cyberspace
Leadership / Research / Defence
From thought leadership, strategy development, to operations,
we deliver a highly skilled and agile team of professionals with
leading-edge training, experience, skill, and technology to
enable you to adapt to changing cyber threats and mission-
critical information assurance environments. We focus on
critical, cyberspace/cyber security decisions, and provide cyber
defence intelligence and support leadership whenever and
wherever it is required. We do this by providing a response
to unique policy, operational DI requirements and to respond
to national defence intelligence missions.
Defence Intelligence Group Experience + Expertise
The Defence Intelligence Group is composed of: Intelligence
Analysts, Network engineers, and Computer Security Analysts
who have worked with various governments within the law
enforcement and military intelligence community. C/DIG personnel
have been security screened to NATO SECRET in accordance
with host nation, 5i and NATO security requirements.
Our standard is a comprehensive, highly trained, highly skilled
and agile team. C/DIG enables CSCSS to provide a response
to the evolving trends and challenges faced by our clients.
THE FBI ESTIMATES THAT BILLIONS OF U.S. DOLLARS ARE LOST
annually to foreign and domestic competitors who deliberately target
economic intelligence in flourishing U.S. industries and technologies,
and who cull intelligence out of Commercial Off-The-Shelf (COTS)
technologies by exploiting open source information and company
trade secrets
THE INTELLIGENCE CYCLE
Your MISSION and the ORIENTATION of what you are
doing direct intelligence. We provide our leadership
and experience, which we apply to the four
components of DI to the Intelligence Cycle:
Tactically, we provide practical solutions
to issues through the DI Cycle that are
both dynamic and fluid in nature to ensure
security attempting to minimize the
exposure of your organization.
DIRECTION
COLLECTION
PROCESSING
DISSEMINATION
CSCSS Defence Intelligence Services
Mapping Solutions to Evolving Threat Landscapes
We deliver real-world computer / network security intelligence
derived from our skills and experience within the defence
intelligence community. We collect data points from numerous
intelligence sources drawing on military defence intelligence
backgrounds through which we analyzes data from a broad
spectrum sources, including but not limited to:
n Open Source Intelligence (OSINT)
n Directed Research and Collection (DR+C)
n Human Intelligence (HUMINT)
n Network Intelligence (Technology Based)
n Technical Intelligence (TECHINT)
n Digital Forensics + Analysis
n Cyber Intelligence (CYBINT)
n Proprietary Resources and Techniques
Our Defence Intelligence Services
CSCSS DIG delivers its services through Actionable Intelligence
and proactive programs and services to address real-world
issues. Drawing from our expertise and experience with various
agencies within the law enforcement and military intelligence
communities we deliver a spectrum services:
n Actionable Intelligence
n Cyber-Centric Intelligence
n Nation Player Threat profiling and Corporate Risk Profiling
n Enterprise Risk Management
n Information Assurance and Testing
n Incident Response + Forensics / Malware Analysis
n Defence Intelligence Education / Awareness Programmes
Due to the sensitive, sometimes classified, nature of Defence
Intelligence many of our services are not expressly described
in our public literature or within our website and are highly
specialized. Please contact CSCSS or the CSCSS Defence
Intelligence Group to determine if we can help.
Defence Intelligence + Practice
Our diverse areas of practice include:
n Cyber attack profiling
n Cybersecurity threat assessments and testing
n Cyber architecture development and evaluation
n Cyber-Defence Strategy + Policy Development and
implementation
n Apply Defence Intelligence knowledge to security +
business process
n Support stakeholder mapping through educational
awareness programs in order to support education
Outreach and Collaboration
n As a component of CSCSS and a partner with the
Cyber Conflict Center, C/DIG Analyzes on-going attacks.
C/DIG also provides warning of potential and ongoing
attacks and persistent threats.
Examples of CDIG activities include:
We bring third party neutrality and confidentiality and integrity
for reporting security and intelligence threats. This enables
businesses to share data without compromise to their
organization.
n Threat analysis and identification, for setting priorities during
an emergency response to issues or a breach of security.
n Analysis and tracking of Advanced persistent threats (APT),
intelligence gathering / industrial espionage
n Detection of active internal / external threats, identifying
target sets including intellectual property, identification of
attacking malware designed to gather economic intelligence,
including trade secrets, proprietary data, financial and other
electronically stored private information
n Evaluating and recommending strategic and tactical
approaches, priorities, criteria for computer security and/or
information protection
n Providing leadership from the political, legal, and technical
perspectives within two parallel DI focus areas the include
Law & Policy Technical Security.
n Supporting security transformation within organizations to
assist leadership and policymakers to better understand the
complexities of APT and Nation Players in relation to their
organization
ACCORDING TO A GOVERNMENT OFFICIAL, the UK faces
yearly some 44 million cyber-attacks against private
companies, government institutions and crucial infra-
structure sectors, costing about £27 billion a year.
CSCSS Defence Intelligence / Situational Awareness
Complimentary to our cyber-security efforts, C/DIG is engaged in
creating Defence Intelligence training and educational materials
to promote a stronger understanding of:
n Using Intelligence to safeguard your computer /
network security
n Information security
n APT ( Advanced Persistent Threats )
n Role of nation players / National actors
The CSCSS Defence Intelligence Group is uniquely positioned to
attract some of the foremost defence intelligence, strategists,
and intelligence professionals to develop and high caliber,
professional training and programs and services. Cyberspace
threat awareness and protection must be driven by senior
leadership through organization-wide cyber policy and awareness.
DI Education / Awareness Products
n Lectures / Presentations
n Classes
n Executive / C-Level Briefings
n Roundtables
n Workshops
n Webinars
Topics Include:
n Organizational Defence Intelligence / Threat Level Profiling
n Defining the cyber-environment (defining the area of
operations)
n Case Studies (cyber-attacks in detail)
n Detailed Studies / Detailed Aggressor Briefings
n Cyber-Attack (trends and potential types of cyber-attacks)
n Smart Defence (designing a secure environment / countering
an attack)
n Leveraging cyber-capability (your return on security investment)
Subscription Products
n Intelligence Summaries (INTSUMs)
n Weekly / Monthly reports designed to keep the subscriber
current on specific topics.
n Current cyber-threats from international players
n Reports on Policies, Histories, TTP and Trends on a specific
cyber-aggressor.
n Intelligence Reports (INTREPs) These are spot reports on
one specific incident or event
OFFICE OF THE NATIONAL COUNTERINTELLIGENCE EXECUTIVE
China and Russia view themselves as strategic competitors
of the United States and are the most aggressive collectors
of US economic information and technology.
n FIND OUT MORE ABOUT THE ACTIVITIES
OF THE “ASYMMETRIC” CYBER THREAT
that may be putting your organization at risk.
n UNDERSTAND THE IMPACT OF
CORPORATE ESPIONAGE,
cyber-fraud, and the insider
threat to your organization and staff
n LEARN TO IDENTIFY VULNERABILITIES
in your supply chain. How secure is
your ‘partner’?
n EXAMINE YOUR INFORMATION
MANAGEMENT STRATEGIES
to mitigate the risks.
n SUPPORT YOUR DEVELOPMENT OF
YOUR CYBERSECURITY STRATEGY
and concepts to help you navigate
the threat landscape
C DIG
CONTACT
Custom Services + Products
C/DIG provides insights on key issues, relating to DI as well as
advisory services to government, military, industry and agencies.
We strive to enhance the understanding of the defence and
intelligence related to cyber threats posed by foreign intelligence
services and transnational competitors to bring attention to
national security issues of common concern. We offer a broad
range of services to secure and better protect commercial
activities, economic programs, and intellectual property in
hostile environments, which, if lost, could dramatically impact
national and economic security
The Industries We Serve
In an enabled world where everything is interconnected, our future
is tied to information – its manipulation, delivery, integrity and
security. Cyberspace and related security cannot be treated as
an afterthought. CSCSS Defence Intelligence Group serves public -
privately industry spanning a wide range of sectors and industries.
Civilian / Government Agencies
Supporting the Civilian and Government Mission
Government civil servants face complex challenges in cyberspace
and with the related security issues of operating in a digital
world. C/DIG strategy and technology experts have helped with
strategic planning, intelligence management and analysis,
information sharing, training, counterintelligence, and other
forms of support.
National Defence Agencies
Globally, defence agencies face persistent, fast-paced, rapidly
evolving threats and changing national security environments.
To address threats and meet complex mission requirements,
C/DIG and its associated internal groups and key partners
provide intelligence support and will function as a resource.
We will deliver strategic and tactical DI leadership to
cyber/defence planners, interagency partners, and policymakers
to defend cyberspace and related cyber security interests.
Intelligence Community
Supporting the Intelligence Community +
Intelligence Mission
CSCSS DIG collaborates with organizations in government,
health, finance, transportation, energy and other critical sector
industries to develop cyberspace risk assessments that deliver
benchmarks and indicators to assist in securing cyber operations.
Commercial Organizations
CSCSS delivers programs that are tailored to meet unique
requirements. We work to ensure they are better prepared to
mitigate the risk of future attacks through: threat awareness,
vulnerability assessment, enhanced processes, programs,
services, policies, and technologies. We direct organizations
through a dynamic, collaborative approach, helping our clients
not only understand their weaknesses through assessments and
vulnerability or penetration tests, but also to anticipate threats
and respond to incidents when they occur.
SECTORS
WE SERVE
PUBLICLY AND PRIVATELY HELD COMPANIES
ACROSS A WIDE RANGE OF INDUSTRIES IN
THE FOLLOWING SECTORS:
Public Sector
Utilities and
Government
Payment Card
Industry + Processing
Telecommunications
Manufacturing
Healthcare /
Medical Health
Sciences
Science / Research
Banking and
Financial
WALL STREET JOURNAL
The bulk of the theft of U.S. corporate and economic secrets
is carried out in cyberspace, where vast volumes of data can
be stolen in seconds, according to U.S. intelligence officials.
About CSCSS
The Centre for Strategic Cyberspace + Security Science / CSCSS is a multilateral, international not-for-profit organization that
conducts independent cyber-centric research, development, analysis, and training in the areas of cyberspace, defence intelligence,
cyber security, and science while addressing the threats, trends, and opportunities shaping international security policies and national
cyberspace cyber security initiatives.
CSCSS, as a strategic leader in cyberspace, works jointly with key partners to address, develop, and define cyber technologies,
cyber defence force capabilities, information dominance, and concept operations. We deliver practical recommendations and innovative
solutions and strategies to advance a secure cyberspace domain.
CSCSS / DEFENCE
INTELLIGENCE GROUPC DIG
CENTRE FOR STRATEGIC
CYBERSPACE + SECURITY SCIENCECSCSS
All trademarks or registered trademarks are properties of their respective owners. Copyright © 2013 The Centre for Strategic Cyberspace + Security Science. All rights reserved
CSCSS Defence Intelligence Group /
Putting it all Together
We are dedicated to countering computer based threats by
developing outreach materials; conducting workshops, training
clients, participatinåg in conferences; working with industry, law
enforcement and defence intelligence community, delivering
targeted presentations.
Our resources bring to bear Information and Communications
Technology (ICT) solutions and advanced analytics that tie
directly to CSCSS Internal resources including, Defence
Intelligence, CSCSS Cyber Conflict Centre and ET+S Group
resources supporting cyber security research that focuses
solutions on people, process, and policy.
Contact Us
For more information on the Defence Intelligence Group or
to find out how we can help you please contact us.
CSCSS / Centre for Strategic Cyberspace + Security
Science Defence Intelligence Group
Washington D.C + 571.451.0312
London, United Kingdom +44 2035141784
North America +877.436.6746
Middle East +800.653.4077
Australia +61 2.8003.7553
Email: defintel@cscss.org
www.cscss.org
We respond to client requests globally and treat each contact
and the information you provide to us with the highest regard for
confidentiality. Our unique experience and expertise brings to
bear, comprehensive capabilities recognized by agencies in
several countries, including the FBI and intelligence communities,
which we focus on client issue resolution. We can help.
CSCSS.org

More Related Content

What's hot

GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaSyed Peer
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 
Cyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by ImprevaCyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by ImprevaGhader Ahmadi
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligenceseadeloitte
 
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Chris Hails
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...BCM Institute
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
Introduction to STIX 101
Introduction to STIX 101Introduction to STIX 101
Introduction to STIX 101stixproject
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Chris Hails
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
INTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYINTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYAndrew Bichlmeier
 
SMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaSMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaDale Butler
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
CCIS short presentation - English version
CCIS short presentation -  English versionCCIS short presentation -  English version
CCIS short presentation - English versionGry Helene Stavseng
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Seungjoo Kim
 

What's hot (20)

GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Cyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by ImprevaCyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by Impreva
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHSInsight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
 
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
 
CDS_2015_PER(1)
CDS_2015_PER(1)CDS_2015_PER(1)
CDS_2015_PER(1)
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Introduction to STIX 101
Introduction to STIX 101Introduction to STIX 101
Introduction to STIX 101
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
INTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYINTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITY
 
Cert adli wahid_iisf2011
Cert adli wahid_iisf2011Cert adli wahid_iisf2011
Cert adli wahid_iisf2011
 
SMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaSMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North America
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
CCIS short presentation - English version
CCIS short presentation -  English versionCCIS short presentation -  English version
CCIS short presentation - English version
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
 

Similar to CSCSS / DEFENCE INTELLIGENCE GROUP

Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...Afour tech
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity MarketingAlex Weishaupt
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersMighty Guides, Inc.
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityCyber Security Experts
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for SuccessCitrix
 
Navigating the Evolving Role of the Chief Security Officer
Navigating the Evolving Role of the Chief Security OfficerNavigating the Evolving Role of the Chief Security Officer
Navigating the Evolving Role of the Chief Security Officerwilliamshakes1
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we ServeThe TNS Group
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Introdchadwick
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...Booz Allen Hamilton
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfMr. Business Magazine
 
Cyber Security: Cyber Incident Response Methodology
Cyber Security:  Cyber Incident Response MethodologyCyber Security:  Cyber Incident Response Methodology
Cyber Security: Cyber Incident Response MethodologySignals Defense, LLC
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Ioannis Aligizakis, M.Sc.
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Matthew Rosenquist
 

Similar to CSCSS / DEFENCE INTELLIGENCE GROUP (20)

Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity Marketing
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber Security
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for Success
 
Navigating the Evolving Role of the Chief Security Officer
Navigating the Evolving Role of the Chief Security OfficerNavigating the Evolving Role of the Chief Security Officer
Navigating the Evolving Role of the Chief Security Officer
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Untitled document.otd
Untitled document.otdUntitled document.otd
Untitled document.otd
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we Serve
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Intro
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdf
 
Cyber Security: Cyber Incident Response Methodology
Cyber Security:  Cyber Incident Response MethodologyCyber Security:  Cyber Incident Response Methodology
Cyber Security: Cyber Incident Response Methodology
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
ETS_CSI_Comstor_29Apr2016
ETS_CSI_Comstor_29Apr2016ETS_CSI_Comstor_29Apr2016
ETS_CSI_Comstor_29Apr2016
 

Recently uploaded

Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524najka9823
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 

Recently uploaded (20)

Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 

CSCSS / DEFENCE INTELLIGENCE GROUP

  • 1. CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCECSCSS COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUPC DIG
  • 2. We live in a world of highly interconnected, network-centric, global systems. This provides endless opportunities for the development of new visions for growth and prosperity. The current economic shadow is generating increased competition from legitimate competitors as well as other players who strive for any advantage and present significant national, transnational and economic security risks and threats. These factors will foster new necessities for cyber defence. Complex,interrelated and dynamic forces will transform and recast the face of cyber defence, its role, priorities, strategies, frameworks and the methodologies necessary to meet the unique demands placed upon it. The threats faced are persistent, constantly evolving and transcend national boundaries. CSCSS / DEFENCE INTELLIGENCE GROUP IS YOUR SHIELD, YOUR FIRST LINE OF DEFENCE. Understanding what is at risk means you have the keys to protecting yourself. C DIG
  • 3. CSCSS Defence Intelligence Group – C/DIG The CSCSS Defence Intelligence Group strives to change the paradigm identifying the: WHO, HOW and WHY behind cyber- attacks. This enables a pro-active defence based on solid understanding of threats and players. C/DIG offers a spectrum of Intelligence products. At the strategic level we track national players to determine their policies, and intentions. At the operational level C/DIG documents their Tactics, Techniques and Procedures (TTP). At the tactical level we provide threat analysis, identification and forensic analysis. All of this data is used for awareness, education, prevention and defence from cyber-attacks and in support of contingency operations to protect your organization. Our Mission The Defence Intelligence Centre works in real-time to report, analyze, forecast providing credible, reliable, sustained intel- ligence services and contingency planning. Our Vision Provide the best all source cyber-centric intelligence, counter- intelligence, and cyber-security services oriented to national players. Clear answers to your critical challenges We will help you to identify how key trends will impact your business and security strategy and you’ll get direct answers to your most pressing security challenges and your defence Intelligence stance. What are we doing to protect information? Security is no longer simply about preventing external threats from entering the enterprise; it’s about keeping critical information assets from leaving. Defence Intelligence plays a key role in Information security. It is an essential strategic business requirement resource that expands the strategic role of leader- ship, transforming them into point persons who lead and develop strategy, conduct an organization’s business and manage security risk. Delivering Threat Intelligence for the Real World C/DIG - How are we responding to threats? The interconnected landscape around us continues to evolve at blinding speed, introducing new threats, complexities, concerns and exposures. This state of challenge has become the norm, requiring us to respond much more rapidly and effectively to stay ahead of the competition, our adversaries, and the security curve. This means organizations must understand ‘threat information’ AND security as part of the constant business evolution process. Defence Intelligence is a component of the effort to be continually diligent in security strategies and risk management programs. A Snapshot - What is the Issue? Competitive Intelligence, corporate and foreign espionage, cyber attacks on the supply chain, counterfeiting, the global cyber crime epidemic, fraud, malware research + development, theft of proprietary and intellectual property and information. All this effort is focused on illicitly gaining competitive advantage. These threats can, and in most cases will, include national level players that seek to improve competitive advantage, their economies, technologies and militaries through specifically targeted activities DEFENCE INTELLIGENCE DEFINED [Intelligence is] The integration, evaluation, analysis, and interpretation of data into actionable information that you need to know to be successful. YOU ARE A TARGET IF YOUR COMPANY: n has a technology or technological edge n has cutting edge proprietary information n has developed a process that manufactures an item at less cost than others n is negotiating with another company or country, the negotiators and negotiation strategy are highly confidential THE BOTTOM LINE – VALUE AND ADVANTAGE – TRADE SECRETS ARE AT RISK EVERY DAY If your company has invested time and resources developing a concept, market strategy, process, product or technology, you have to protect it. You will be a target and you should expect to be attacked.
  • 4. How We Help The CSCSS Defence Intelligence Group provides a full range of cyber - Intelligence services in order to profile your organization and identify, detect, and neutralize exploitable threats. Our areas of expertise deliver extremely specialized risk management services mapped to, NIST, COBIT, ISO, BS25999 and/or other industry standards. It’s about Focus We engage our clients with a team of professionals focused exclusively on defence intelligence. We provide the critical insight, advice, and information to enable senior-level business, IT, and security executives to make the strategic, organizational, and technology investment decisions required to control today’s continually evolving business and security threat environments. We Deliver C/DIG will provide you with the insight you require to look beyond security and technology to gain an evocative, strategic approach to assessing and defending against the threats against you. You will have what you need to manage information security and mission-critical business processes and assets. You will get the clear and focused picture, without the hype, to deliver organizational competitive edge. Strategically CSCSS and the Defence Intelligence Group recognize the Rule of Law and the application of internationally recognized principals, protocols and conventions to cyberspace. CSCSS, through the Defence Intelligence Group provides a response to nations that discard or refuse to comply with these principals. We operate as a Cyber-Defence partner against non-compliant nations. Strategic Commitment n Teamwork: Partnership across multinational and organizational boundaries for mission accomplishment n Integrity: Adherence to the highest legal and ethical principles in our work n Excellence: Deliver agile, empirical, and insightful professionalism and expertise in cyber-defence intelligence n Service: Dedication to our mission, goals, and objectives and clients to achieve the highest standards of excellence and greater stability in cyberspace Leadership / Research / Defence From thought leadership, strategy development, to operations, we deliver a highly skilled and agile team of professionals with leading-edge training, experience, skill, and technology to enable you to adapt to changing cyber threats and mission- critical information assurance environments. We focus on critical, cyberspace/cyber security decisions, and provide cyber defence intelligence and support leadership whenever and wherever it is required. We do this by providing a response to unique policy, operational DI requirements and to respond to national defence intelligence missions. Defence Intelligence Group Experience + Expertise The Defence Intelligence Group is composed of: Intelligence Analysts, Network engineers, and Computer Security Analysts who have worked with various governments within the law enforcement and military intelligence community. C/DIG personnel have been security screened to NATO SECRET in accordance with host nation, 5i and NATO security requirements. Our standard is a comprehensive, highly trained, highly skilled and agile team. C/DIG enables CSCSS to provide a response to the evolving trends and challenges faced by our clients. THE FBI ESTIMATES THAT BILLIONS OF U.S. DOLLARS ARE LOST annually to foreign and domestic competitors who deliberately target economic intelligence in flourishing U.S. industries and technologies, and who cull intelligence out of Commercial Off-The-Shelf (COTS) technologies by exploiting open source information and company trade secrets THE INTELLIGENCE CYCLE Your MISSION and the ORIENTATION of what you are doing direct intelligence. We provide our leadership and experience, which we apply to the four components of DI to the Intelligence Cycle: Tactically, we provide practical solutions to issues through the DI Cycle that are both dynamic and fluid in nature to ensure security attempting to minimize the exposure of your organization. DIRECTION COLLECTION PROCESSING DISSEMINATION
  • 5. CSCSS Defence Intelligence Services Mapping Solutions to Evolving Threat Landscapes We deliver real-world computer / network security intelligence derived from our skills and experience within the defence intelligence community. We collect data points from numerous intelligence sources drawing on military defence intelligence backgrounds through which we analyzes data from a broad spectrum sources, including but not limited to: n Open Source Intelligence (OSINT) n Directed Research and Collection (DR+C) n Human Intelligence (HUMINT) n Network Intelligence (Technology Based) n Technical Intelligence (TECHINT) n Digital Forensics + Analysis n Cyber Intelligence (CYBINT) n Proprietary Resources and Techniques Our Defence Intelligence Services CSCSS DIG delivers its services through Actionable Intelligence and proactive programs and services to address real-world issues. Drawing from our expertise and experience with various agencies within the law enforcement and military intelligence communities we deliver a spectrum services: n Actionable Intelligence n Cyber-Centric Intelligence n Nation Player Threat profiling and Corporate Risk Profiling n Enterprise Risk Management n Information Assurance and Testing n Incident Response + Forensics / Malware Analysis n Defence Intelligence Education / Awareness Programmes Due to the sensitive, sometimes classified, nature of Defence Intelligence many of our services are not expressly described in our public literature or within our website and are highly specialized. Please contact CSCSS or the CSCSS Defence Intelligence Group to determine if we can help. Defence Intelligence + Practice Our diverse areas of practice include: n Cyber attack profiling n Cybersecurity threat assessments and testing n Cyber architecture development and evaluation n Cyber-Defence Strategy + Policy Development and implementation n Apply Defence Intelligence knowledge to security + business process n Support stakeholder mapping through educational awareness programs in order to support education Outreach and Collaboration n As a component of CSCSS and a partner with the Cyber Conflict Center, C/DIG Analyzes on-going attacks. C/DIG also provides warning of potential and ongoing attacks and persistent threats. Examples of CDIG activities include: We bring third party neutrality and confidentiality and integrity for reporting security and intelligence threats. This enables businesses to share data without compromise to their organization. n Threat analysis and identification, for setting priorities during an emergency response to issues or a breach of security. n Analysis and tracking of Advanced persistent threats (APT), intelligence gathering / industrial espionage n Detection of active internal / external threats, identifying target sets including intellectual property, identification of attacking malware designed to gather economic intelligence, including trade secrets, proprietary data, financial and other electronically stored private information n Evaluating and recommending strategic and tactical approaches, priorities, criteria for computer security and/or information protection n Providing leadership from the political, legal, and technical perspectives within two parallel DI focus areas the include Law & Policy Technical Security. n Supporting security transformation within organizations to assist leadership and policymakers to better understand the complexities of APT and Nation Players in relation to their organization ACCORDING TO A GOVERNMENT OFFICIAL, the UK faces yearly some 44 million cyber-attacks against private companies, government institutions and crucial infra- structure sectors, costing about £27 billion a year.
  • 6. CSCSS Defence Intelligence / Situational Awareness Complimentary to our cyber-security efforts, C/DIG is engaged in creating Defence Intelligence training and educational materials to promote a stronger understanding of: n Using Intelligence to safeguard your computer / network security n Information security n APT ( Advanced Persistent Threats ) n Role of nation players / National actors The CSCSS Defence Intelligence Group is uniquely positioned to attract some of the foremost defence intelligence, strategists, and intelligence professionals to develop and high caliber, professional training and programs and services. Cyberspace threat awareness and protection must be driven by senior leadership through organization-wide cyber policy and awareness. DI Education / Awareness Products n Lectures / Presentations n Classes n Executive / C-Level Briefings n Roundtables n Workshops n Webinars Topics Include: n Organizational Defence Intelligence / Threat Level Profiling n Defining the cyber-environment (defining the area of operations) n Case Studies (cyber-attacks in detail) n Detailed Studies / Detailed Aggressor Briefings n Cyber-Attack (trends and potential types of cyber-attacks) n Smart Defence (designing a secure environment / countering an attack) n Leveraging cyber-capability (your return on security investment) Subscription Products n Intelligence Summaries (INTSUMs) n Weekly / Monthly reports designed to keep the subscriber current on specific topics. n Current cyber-threats from international players n Reports on Policies, Histories, TTP and Trends on a specific cyber-aggressor. n Intelligence Reports (INTREPs) These are spot reports on one specific incident or event OFFICE OF THE NATIONAL COUNTERINTELLIGENCE EXECUTIVE China and Russia view themselves as strategic competitors of the United States and are the most aggressive collectors of US economic information and technology. n FIND OUT MORE ABOUT THE ACTIVITIES OF THE “ASYMMETRIC” CYBER THREAT that may be putting your organization at risk. n UNDERSTAND THE IMPACT OF CORPORATE ESPIONAGE, cyber-fraud, and the insider threat to your organization and staff n LEARN TO IDENTIFY VULNERABILITIES in your supply chain. How secure is your ‘partner’? n EXAMINE YOUR INFORMATION MANAGEMENT STRATEGIES to mitigate the risks. n SUPPORT YOUR DEVELOPMENT OF YOUR CYBERSECURITY STRATEGY and concepts to help you navigate the threat landscape C DIG CONTACT
  • 7. Custom Services + Products C/DIG provides insights on key issues, relating to DI as well as advisory services to government, military, industry and agencies. We strive to enhance the understanding of the defence and intelligence related to cyber threats posed by foreign intelligence services and transnational competitors to bring attention to national security issues of common concern. We offer a broad range of services to secure and better protect commercial activities, economic programs, and intellectual property in hostile environments, which, if lost, could dramatically impact national and economic security The Industries We Serve In an enabled world where everything is interconnected, our future is tied to information – its manipulation, delivery, integrity and security. Cyberspace and related security cannot be treated as an afterthought. CSCSS Defence Intelligence Group serves public - privately industry spanning a wide range of sectors and industries. Civilian / Government Agencies Supporting the Civilian and Government Mission Government civil servants face complex challenges in cyberspace and with the related security issues of operating in a digital world. C/DIG strategy and technology experts have helped with strategic planning, intelligence management and analysis, information sharing, training, counterintelligence, and other forms of support. National Defence Agencies Globally, defence agencies face persistent, fast-paced, rapidly evolving threats and changing national security environments. To address threats and meet complex mission requirements, C/DIG and its associated internal groups and key partners provide intelligence support and will function as a resource. We will deliver strategic and tactical DI leadership to cyber/defence planners, interagency partners, and policymakers to defend cyberspace and related cyber security interests. Intelligence Community Supporting the Intelligence Community + Intelligence Mission CSCSS DIG collaborates with organizations in government, health, finance, transportation, energy and other critical sector industries to develop cyberspace risk assessments that deliver benchmarks and indicators to assist in securing cyber operations. Commercial Organizations CSCSS delivers programs that are tailored to meet unique requirements. We work to ensure they are better prepared to mitigate the risk of future attacks through: threat awareness, vulnerability assessment, enhanced processes, programs, services, policies, and technologies. We direct organizations through a dynamic, collaborative approach, helping our clients not only understand their weaknesses through assessments and vulnerability or penetration tests, but also to anticipate threats and respond to incidents when they occur. SECTORS WE SERVE PUBLICLY AND PRIVATELY HELD COMPANIES ACROSS A WIDE RANGE OF INDUSTRIES IN THE FOLLOWING SECTORS: Public Sector Utilities and Government Payment Card Industry + Processing Telecommunications Manufacturing Healthcare / Medical Health Sciences Science / Research Banking and Financial WALL STREET JOURNAL The bulk of the theft of U.S. corporate and economic secrets is carried out in cyberspace, where vast volumes of data can be stolen in seconds, according to U.S. intelligence officials.
  • 8. About CSCSS The Centre for Strategic Cyberspace + Security Science / CSCSS is a multilateral, international not-for-profit organization that conducts independent cyber-centric research, development, analysis, and training in the areas of cyberspace, defence intelligence, cyber security, and science while addressing the threats, trends, and opportunities shaping international security policies and national cyberspace cyber security initiatives. CSCSS, as a strategic leader in cyberspace, works jointly with key partners to address, develop, and define cyber technologies, cyber defence force capabilities, information dominance, and concept operations. We deliver practical recommendations and innovative solutions and strategies to advance a secure cyberspace domain. CSCSS / DEFENCE INTELLIGENCE GROUPC DIG CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCECSCSS All trademarks or registered trademarks are properties of their respective owners. Copyright © 2013 The Centre for Strategic Cyberspace + Security Science. All rights reserved CSCSS Defence Intelligence Group / Putting it all Together We are dedicated to countering computer based threats by developing outreach materials; conducting workshops, training clients, participatinåg in conferences; working with industry, law enforcement and defence intelligence community, delivering targeted presentations. Our resources bring to bear Information and Communications Technology (ICT) solutions and advanced analytics that tie directly to CSCSS Internal resources including, Defence Intelligence, CSCSS Cyber Conflict Centre and ET+S Group resources supporting cyber security research that focuses solutions on people, process, and policy. Contact Us For more information on the Defence Intelligence Group or to find out how we can help you please contact us. CSCSS / Centre for Strategic Cyberspace + Security Science Defence Intelligence Group Washington D.C + 571.451.0312 London, United Kingdom +44 2035141784 North America +877.436.6746 Middle East +800.653.4077 Australia +61 2.8003.7553 Email: defintel@cscss.org www.cscss.org We respond to client requests globally and treat each contact and the information you provide to us with the highest regard for confidentiality. Our unique experience and expertise brings to bear, comprehensive capabilities recognized by agencies in several countries, including the FBI and intelligence communities, which we focus on client issue resolution. We can help. CSCSS.org