The document discusses advanced threat detection through integration with malware analytics services and appliances using sandbox technology. It also discusses automating the investigation and monitoring of indicators of compromise from industry peers, community sources, and commercial threat intelligence services on high-risk assets. The diagram shows the process of detecting threats from new indicators, searching for previous existence, starting monitoring, and driving workflows to investigate and remediate impacted systems.
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Hiding In Plain Sight – Protect Against Bad Hashes
1.
2.
3.
4.
5.
6.
7. Advanced Malware Identification – Identify advanced threats on high risk assets through
integration to malware analytics services and appliances using sandbox technology
Monitoring for Peer & Community Sourced IoCs – Automate the forensics investigation
and proactive monitoring on high risk assets of indicators of compromise sourced from
industry peers and community sources
Monitoring for Commercial Threat Intelligence Service IoCs – Automate the forensics
investigation and proactive monitoring on high risk assets of indicators of compromise
sourced from tailored commercial threat intelligence services