Corporate Information Reconnaissance Cell (CIRC).

Slides:



Advertisements
Similar presentations
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
Advertisements

Sensors and location technologies – the front end of ISR
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Accelerate Business Success With CRM CRM Interoperability.
Mike Goffin Who am I? Mike Goffin Lead DeveloperProject Manager Senior Cyber Security Research Engineer The MITRE Corporation.
Introduction to Building a BI Solution 권오주 OLAPForum
Chapter 2: Business Intelligence Capabilities
Optimizing Business Operations Business Priorities Presentation.
By Siva Ramadasu ( ). ...Is a blue print created to define the solution.
The big Data security Analytics Era Is Here Reporter : Ximeng Liu Supervisor: Rongxing Lu School of EEE, NTU
1 The Discovery Informatics Framework Pat Rougeau President and CEO MDL Information Systems, Inc. Delivering the Integration Promise American Chemical.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Organizational Memory: Issues in Design & Implementation Sree Nilakanta May 1, 2000.
Resources to Support Training Programs for CSIRTs.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Web Analytics Unit 4-1(2005 Fall) Managing the Digital Enterprise By Professor Michael Rappa.
The Changing World of Endpoint Protection
SiteWiz – RiT ’ s CAM Solution. Daily IT Challenges Overload of infrastructure information Numerous daily changes Many departments involved No clear picture.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Intelligent Performance Management Empowering Your Enterprise Duane E. Presti, CEO PARIS Technologies, Inc.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
Enterprise Architecture HOW COMPANIES ARE EXPLOITING INFORMATION TO THROUGH IT.
Pertemuan 16 Materi : Buku Wajib & Sumber Materi :
Why BI….? Most companies collect a large amount of data from their business operations. To keep track of that information, a business and would need to.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware iCARE : A Framework for Big Data Based.
© Nous Infosystems Pvt. Ltd. – Confidential Social Engagement for Banks and Financial Services Leveraging 19 years of expertise in global software services.
1 Copyright © Oracle Corporation, All rights reserved. Business Intelligence and Data Warehousing.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
How to Make Cyber Threat Intelligence Actionable
Proactive Incident Response
CKAN Go! How to discover, catch and evolve your data.
Palantir as Intelligence Infrastructure
Information Systems in Organizations 4
Microsoft Operations Management Suite Insight and Analytics
Data and Analytics Diagram Template
DISA Global Operations
Track and measure Social Media and Darknet through
Information Technology (Spz.)
Information Technology (Spz.)
Information Technology (Spz.)
Information Technology (Spz.)
Information Technology (Spz.)
Information Technology (Spz.)
Information Technology (Spz.)
Information Technology (Spz.)
Information Technology (Spz.)
Information Technology (Spz.)
Information Technology (Spz.)
Information Technology (Spz.)
Information Technology (Spz.)
Information Technology (Spz.)
Information Technology (Spz.)
Information Technology (Spz.)
Information Systems in Organizations 4
PowerONE Secure Information On-Demand Delivering…
Threat landscape financial sector
Information Systems in Organizations 4
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Hybrid Search Phased Approach.
DeFacto Planning on the Powerful Microsoft Azure Platform Puts the Power of Intelligent and Timely Planning at Any Business Manager’s Fingertips Partner.
Information Systems in Organizations 4
Information Systems in Organizations 4
Information Systems in Organizations 4
Improve Patient Experience with Saama and Microsoft Azure
Business Intelligence
Information Systems in Organizations 4
IT Management Services Infrastructure Services
Information Systems in Organizations 4
Presentation transcript:

Corporate Information Reconnaissance Cell (CIRC)

 Develop a corporate information reconnaissance service to aid legal investigations through the open source collection of information on target groups and individuals that appear organized to extort specific concessions through online slander campaigns.

 Develop collection solutions for information on individuals and groups of interest  Standardize and store information in common DB for structured analysis  Analyze digital artifacts and social links within common visual framework  Report correlated information in individual and organizational profiles

 Analytical consulting and information technology development services for customers across the IC, DOD, and DHS  All-source intelligence fusion  Data integration  Enterprise architecture  Computer Network Operations  Digital forensics automation  Knowledge discovery  Tactical mobile applications

 Information Operations  Influence Operations  Social Media exploitation  New Media Development  Threat Intelligence and Open Source Analysis  Vulnerability Research/Exploit Development  Incident Response  Malware Analysis and Reverse Engineering

 Extensible enterprise targeting and analytical intelligence platform  Integrated backend database and server architecture with intuitive visual analysis UI.  Manage structured and unstructured data from multiple disparate data repositories and source all at once.

Palantir Integration Collection Analysis Fusion Production Targeting

Phase 1: Problem Definition/Establish Infrastructure (H + 30 days) Phase 2: Data Collection/Integration (H + 60 days) Phase 3: Analytical Capability (H + 90 days)