Cyber Threat Workshops

Know Yourself: Attack Surface Intelligence

background image

In this Cyber Threat Workshop, we explore using hands-on exercises with RiskIQ Illuminate Internet Intelligence Platform:

Attack Surface
Intelligence

  • See an organization’s attack surface for relevant threats and exposures
  • Identify risks and vulnerabilities
  • Uncover suspected cyber attacks
  • Track and expand defenses globally

Threats Relevant to Your
Attack Surface

  • See an organization’s attack surface for relevant threats and exposures
  • Identify risks and vulnerabilities
  • Uncover suspected cyber attacks
  • Track and expand defenses globally

Threat Investigations:
Active Alerts and Strategic Hunting

  • Research context and intelligence related to active security alerts
  • Identify adversaries by finding fingerprints and threat indicators
  • Explore third-party attack surfaces for an extended scope of threats
  • Find and eliminate global scale attacks and zero-day vulnerabilities

Awareness of your digital attack surface, its composition, and unique placement amid the global attack surface. Having complete visibility into each asset and connection across your digital footprint is vital.

Our team of security experts show how to leverage internet intelligence and smart graphing to pinpoint relationships within the global attack surface: you and others, good and bad, adversaries and allies.

Hands-on exercises give you experience to know yourself utilizing RiskIQ’s Attack Surface Intelligence:

  • Investigate an organization's attack surface to determine their risks and exposures.
  • Investigate malicious infrastructure and where it might still reside in attack surfaces live on the internet.
  • Investigate applications and systems that are exposed on the internet to determine the vulnerabilities and the risks to your organization.

Hands-on labs and exercises show how to expose real-life malicious and/or risky applications.

Watch and Learn:

  • Introduction: Security Intelligence
  • Techniques for cyber threat analysis and management
  • How to leverage attack surface intelligence for faster threat investigations and response
  • Real-world use cases with hands-on exercises, labs, and investigations