How To Turbo-Charge Incident Response With Threat IntelligenceResilient Systems
Minutes, hours, days - each one counts when responding to a security incident. Yet most firms have a lot of room for improvement.
According to the 2013 Verizon Data Breach Investigations Report, in 66% of cases (up from 56% last year), breaches remained undiscovered for years, and in 22% of cases, it took months to fully contain the incident.
This webinar will review the challenges firms face in trying to create a rapid and decisive incident response (IR) process. It will then highlight the crucial role that timely, contextual threat intelligence can play in turbo-charging incident response, particularly when tightly integrated with the broader IR discipline.
Our presenters will reveal the power of this approach by demonstrating Co3's integrated threat intelligence capabilities including intel from the cyber threat intelligence experts at iSIGHT Partners.
Our featured speakers for this webinar will be:
- Ted Julian, Chief Marketing Officer, Co3 Systems
- Tim Armstrong, Security Incident Response Specialist, Co3 Systems
- Matt Hartley, VP of Product Management, iSIGHT Partners
How To Turbo-Charge Incident Response With Threat IntelligenceResilient Systems
Minutes, hours, days - each one counts when responding to a security incident. Yet most firms have a lot of room for improvement.
According to the 2013 Verizon Data Breach Investigations Report, in 66% of cases (up from 56% last year), breaches remained undiscovered for years, and in 22% of cases, it took months to fully contain the incident.
This webinar will review the challenges firms face in trying to create a rapid and decisive incident response (IR) process. It will then highlight the crucial role that timely, contextual threat intelligence can play in turbo-charging incident response, particularly when tightly integrated with the broader IR discipline.
Our presenters will reveal the power of this approach by demonstrating Co3's integrated threat intelligence capabilities including intel from the cyber threat intelligence experts at iSIGHT Partners.
Our featured speakers for this webinar will be:
- Ted Julian, Chief Marketing Officer, Co3 Systems
- Tim Armstrong, Security Incident Response Specialist, Co3 Systems
- Matt Hartley, VP of Product Management, iSIGHT Partners
Customers today expect relevant, personalized engagement in each and every interaction with your brand, regardless of which channel or channels they are using. Marketers are looking to deliver on those expectations by harnessing customer data. However, for most marketers that data is scattered across disjointed systems making it difficult to connect and use effectively. Join this session for a lively discussion on the data challenge that marketers face, and IBM’s innovations that provide marketers with a holistic view of their customers’ journeys, and the ability to connect experiences across systems and touchpoints.
The Indian Dental Academy is the Leader in continuing dental education , training dentists in all aspects of dentistry and
offering a wide range of dental certified courses in different formats.
Customers today expect relevant, personalized engagement in each and every interaction with your brand, regardless of which channel or channels they are using. Marketers are looking to deliver on those expectations by harnessing customer data. However, for most marketers that data is scattered across disjointed systems making it difficult to connect and use effectively. Join this session for a lively discussion on the data challenge that marketers face, and IBM’s innovations that provide marketers with a holistic view of their customers’ journeys, and the ability to connect experiences across systems and touchpoints.
The Indian Dental Academy is the Leader in continuing dental education , training dentists in all aspects of dentistry and
offering a wide range of dental certified courses in different formats.
1. Michael John Siek Jr.
SSN xxx-xx-xxxx
7508 Regency Glen Dr. Fredericksburg, VA 22407
Work Phone (540) 653-4288
Home Phone (540) 907-2627
michaelsiek2003@yahoo.com
Work Experience
11/25/05 to Department of Defense
Present Joint Warfare Analysis Center(JWAC)
Higley Road
Dahlgren, VA 22448-5500
Intelligence Specialist, GG-0132-13/08
Conduct research and analysis utilizing intelligence and operations methodologies that meet unique
requirements to characterize and isolate adversary physicaland nonphysicalnetworks. For example,
assisted in creating a strategic deterrence model utilizing an analytical tool that incorporates Bayesian
(mathematical) software designed to address strategic policy questions forwhich deterministic models
do not apply.The results of the project garnered a list of prioritized causal drivers to meet the
customer’s desired endstate in affecting an adversary’s cyber network operations (CNO).
Perform both long and short term advanced analytic studies and systemdecomposition of
infrastructure networks of adversaries including Oil and Gas (O&G), Telecommunications
(TELCOM), and Command, Control, Communications, and Computer (C4) Intelligence,
Surveillance, and Reconnaissance (ISR). Analysis promotes J3 modeling efforts in support of
command Joint Intelligence Preparation of the Environment (JIPOE), Target Systems Analysis
(TSA), and Phase Zero - Phase Two Combatant Command (COCOM) operational planning efforts.
Applies critical and creative thinkingprocesses towards comprehending,visualizing,andillustrating
complex ill structured strategic,operational,and tacticalintelligence problemsets and developsapproaches
to solve them.Communicates technicalinsight ofboth initialand completedanalysis ofPolitical,Military,
Economic,Social, Information,and Infrastructure (PMESII) to Operation ResearchAnalysts (ORA)in
orderforthemto calculate mission success orfailure rates utilizing various targeting options.
Advances JWAC analytical capabilities by identifying, researching, and evaluating current and future
methodologies, trends,and software tools used to analyze and evaluate data that serves to enhance both
cross-division and cross-discipline analytical efforts. For example, identified and tested several Open
Source Intelligence (OSINT) and All Source tools that were determined to be advantageous for
operational and tactical level JWAC projects supporting the various deployed COCOM war fighters.
Synthesizes multiple intelligence (e.g., GEOINT, HUMINT, SIGINT, OSINT, and SOCMINT) data
within various types ofstudies and intelligence analysis products.Conducted socialnetwork analysis
of strategic and tactical adversary physicaland nonphysicalnetworks identifying areas and targets of
interest through visualization tools depicting the war fighter’s battlespace.
Proactively developed and institutionalized a quantitative and qualitative intelligence methodology
for HUMINT and tactical interrogation reporting utilized by JWAC. Upon recognizing a command
analytic shortfall, initiated new process to establish a command–level HUMINT analysis training
program enabling J9 (Research &Development) J3 (Operations), and J2 analysts to conduct more
reliable and scientific Human Network Targeting (HNT) analysis in support ofCOCOM missions.
Provided technical direction and administrative oversight in the executionofJ2 senioranalyst lead of
JWAC projects such as Threat Finance, adversary weapons supply-chain, PMESII network and component-
level targeting, and a myriad of operational projects. As lead analyst, recognized intelligence gaps, created
opportunities for mission partnering and established suitable and productive intelligence analysis processes.
Identified, initiated, fostered,and leveraged key external IntelligenceCommunity partnerships in
order to develop and advance command analytical capabilities and methodologies.Direct liaison with
various agencies including NSA, DIA, USCYBERCOM, CIA, FBO, NGIC and COCOM organizations.
Led and coached junior military intelligence professionals and new DOD hires of varying
competency levels and disciplines as one of the command’s most senior intelligence analysts.
2. Volunteered as a member of the Afghanistan Support Team (AST) to deploy twice in support of
JWAC’s partnering effort with Task Force Paladin’s Counter Improvised Explosive Device (C-IED)
mission at Bagram Airfield. Served as both J2 mission partner and imbed scoping,processing,and
directing home station intelligence and operations analysis of suppliers, inputs, process, outputs,
and customers (SIPOC) in the CENTCOM AIOR including both Afghanistan and Pakistan.
Created, attributed,and contributed to JWAC intelligence academic education and technical
knowledge base program. Provisional information and direct actions aided in establishment of
J2 OSINT branch foundational understanding and conceptualmethodology of OSINT analysis.
Supervisor: Mr. Michael Conner (may be contacted) Phone: (540) 653-1965
Hours per week: 40
Salary: $XXX,XXX per annum
02/2004 to DynCorp International, LLC.
10/2005 Diplomatic Security Service President Karzai Protective Detail
Fredericksburg, VA 22406
Intelligence and Threat Specialist
Contractor/GS-12 Equivalent
Provided critical, dynamic, and fusion intelligence analytic products such as Target Intelligence
Packages (TIP), travel route studies,and adversary IED tactics, techniques and procedures (TTP) in
support of U.S. State Department mission of President Hamid Karzai’s Protective Detail (KPD)
operations as well U.S. As Ambassador Support when DSS requested.
Organized, authored, and briefed local and regional threat intelligence products to senior U.S.
Embassy Regional Security Officer (RSO), special agents, othergovernment agencies, U.S. Military
Attaché,and assigned U.S. Marine Corps security personnelon a daily basis.
Supervisor: Special Agent Christopher Murray (Unknown location or phone number)
Hours per week: 60+
Salary: $132,000 per annum
09/1999 to United States Air Force
09/2005 AFOSI Detachment 242
San Antonio,TX 78626
Special Agent,AntiterrorismSpecialty Team
Highly skilled member of a specially trained rapid deployment Antiterrorism Team, providing
Counterintelligence and Antiterrorism collections and analysis as well as investigative services
for the DOD in support of both peacetime and combat operations in Central Command’s AOR.
Collected authored, and disseminated intelligence from HUMINT sources including Foreign
Intelligence Services (FIS), foreign military members, local nationals and other intelligence
sources. Personally investigated,analyzed and produced intelligence reports on time sensitive
threat information affecting military operations at forward operating locations .
Developed, assigned,and managed training schedules for 30 special agents.Maintained logistics
and equipment inventories for the detachments $1 million supply account.Tested and analyzed new
equipment before purchase and operational deployment to the field.
Investigated diverse types of felony crimes committed by DOD personnel,authored reports of
investigation, gathered and preserved various types of evidence including digital evidence,
conducted interviews and interrogations of victims, witnesses,and suspects,developed and
supervised confidential informants, and testified for courts-martials.
Supervisor: Special Agent John Fine (Unknown location or phone number)
Hours per week: 40+
SSgt/E5: $28,000 per annum
07/1989 to United States Air Force
09/1999 Various Duty Assignment
Supply System Analyst and
Inventory Management Specialist
AFSCs 2So72 and 64550
Honorable Discharge
Veteran’s Preference, 5-Point
Authored,analyzed, and executed mainframe and local area network (LAN) systemsecurity, daily
processing,program writing, software upgrades and releases, help desk and data recovery programs for
USAF logistics. Assisted in mainframe migration to a large micro- computer LAN. Responsible for
conducting advanced LAN administrator duties for a Microsoft Windows -based serversystem.
Support base logistics by conducting inventories and ordering mission critical aircraft and vehicle parts
3. Professional Skills
Outstanding researching, briefing, written,and verbalcommunications skills.
Working knowledge of Microsoft Office products including Visio as well as various intelligence
database and presentation tools such as Palentir, TAC, Babble Street, and Analyst Notebook.
Honors/Awards/Special Accomplishments
Various USAF and DOD awards and citations including four USAF Commendation, two National
Defense, and two USAF Achievement Medals
2005 received A+, Network +, and Security + Certifications from New Horizons Learning Center
2006 Joint Civilian Service Achievement Award
2006 Secretary of Defense Civilian Medal for the Global War on Terrorism Medal
Joint Meritorious Unit Award, 2006 and 2010.
JWAC 2010 Excellence in Service Group
JWAC 2014 Award of Merit for Group Achievement
Achieved Dean’s List status 2014-2017 American Military University
Member of Pi Gamma Mu Honor Society
Education
04/2014 to American Military University
Present Charles Town,WV 25414
Currently pursuing BA Intelligence Studies with a Cyber Concentration (352
hours complete) Current GPA 3.86
07/1989 to Department ofthe Air Force
09/2003 Community College of the Air Force Center
Montgomery, AL, 36114- 3011
Supply Systems Analyst / Inventory Management Specialist / Special Investogations
Received 72 academic credits towards AA/AS degree