View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
July 29, 2016updated 21 Oct 2016 4:25pm

Deloitte expands cyber managed services

Indicators of compromise promise predictive modelling

By Sam

Deloitte Advisory expanded its cyber risk managed services through a deal with ThreatConnect through which it will integrate the threat intelligence platform (TIP) into its analytics services.

“We’re dedicated to providing a portfolio of tightly integrated cyber operations services that are focused on organisation-specific threats so each can get in front of its own cyber risk and can innovate with confidence,” said Adnan Amjad, cyber threat risk management practice leader for Deloitte Advisory cyber risk services and partner at Deloitte & Touche LLP.

The TIP centralises known indicators of compromise (IOCs) by aggregating a variety of data and enabling predictive modeling.

TIP keeps up with the automated parts of the cybersecurity process to establish a faster, more streamlined process. It also automatically ingests all of the threat data, normalises it and enriches it with data from partners and intelligence services. The platform is scalable and integrates the entire security infrastructure, from engaged teams to their processes, to their tools and systems. Organisations can automatically share IOCs to the relevant tool or system, right in the platform.

Adam Vincetn, CEO of ThreatConnect said, “We understand that many organisations rely heavily on managed security service providers for cybersecurity support.”

The partnership promises:

 

Content from our partners
Green for go: Transforming trade in the UK
Manufacturers are switching to personalised customer experience amid fierce competition
How many ends in end-to-end service orchestration?

Uniting people, processes and technologies behind a cohesive, intelligence-driven defense against threats, automating aggregation, normalisation, enrichment and distribution of intelligence.

Pivoting easily from one data point to another, uncovering patterns and gaining a full picture of cyber adversaries’ TTPs.

Managing a faster, more agile team by enabling better utilisation of existing tools and processes.

Contributing to and drawing from trusted communities to build a shared knowledge resource of common threat actors and tactics.

Executives and directors expect their cybersecurity operations to be adapted to the specific risks that arise from their business strategies, such as digital or IoT innovations, or business events such as M&A.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU