Having this data on threat actors working for you is crucial for you to proactively tailor your defences and pre-empt future attacks. In the words of General and Military Strategist Sun Tzu “Attack is the secret of defence; defence is the planning of Attack”
Our Cyber Threat Intelligence service can help add value to your threat hunting teams, providing them with up to date threat actor tactics, techniques, and procedures (often referred to as TTPs) enabling teams to strengthen their defences before ever being subjected to an active campaign.
Kontex utilises both open and closed source intelligence tools to identify data from the dark web and clean web to alert you to active threats/vulnerabilities that specifically affect you.
The service is designed to be a frictionless addition to your defensive capability with intelligence delivered as either human or machine readable.
We will lead you through the intelligence planning phase, ensuring the right questions are asked from the outset. This eliminates vast amounts of noise and provides you with what you need and nothing you don’t.
Ransomware cost the world $20 billion in 2021. That number is expected to rise to $265 billion by 2031
In 2021, 37 percent of all businesses and organizations were hit by ransomware.
Protect yourself by knowing what data is out there on your organisation.
Service Offering
At Kontex we break our Cyber Threat intelligence service down into the four CTI elements, Strategic, Operational, Tactical and Digital Risk Management (DRM). Breaking CTI down into these elements allows us to tailor our service to each individual client.
Strategic
Threat Assessments
Vulnerability Assessments
Impact Assessments
Malware Actors Assessments
Tactics, Techniques, and Procedures – TTPs
Industry Assessments
Operational
Data collection from Open Source Intelligent Network – OSINT
Dark and Deep Web
CTI Vendor
Operation Technology Environment Assessment
Internet Of Things Environment Assessment
Adversary Evaluation
Evaluation of the best course of action
Tactical
Endpoint monitoring
Log Correlation
Forensic Evidence
Web Traffic Analysis
Attack Surface
Kill Chain
DRM
Social Engineering
Identity Access Management – IAM
Insider Risk Assessment
Public Facing Assessment – HumIntel and Corporate
Physical Security Devices Assessments
Software Assessments
Supply Chain Vendor and Partner Evaluation
Data Leak and Credential Dump
Targeted and Global Campaign Insight
Fraud mitigation and digital identity
Brand Protection
]
Tailored
We provide a tailored and flexible approach which is designed to meet each customer’s individual business security needs across the entire organisation.