NC4 Cyber Threat Exchange Trusted Communities as a Defense against Cyber Threats An Abbreviated Evolution of Cyber Defense 1) Attacks against individual companies and agencies Cyber attacks Cyber attacks Cyber attacks Corporate and Government IT Systems An Abbreviated Evolution of Cyber Defense 2) Individual Organizations and vendors try to build a Fortress to protect public and private sector IT systems Software security Cyber attacks Cyber attacks Consulting & Implementation Corporate and Government IT Systems Hardware Security IT Security Vendors Cyber attacks Managed Services Threat Services IT Systems Protected by Internal IT Security staff An Abbreviated Evolution of Cyber Defense 3) Attacks against groups of companies and industries Finance, Defense, Retail, etc. Corporate and Government IT Systems Cyber attacks Corporate and Government IT Systems Corporate and Government IT Systems White House and Congress Cyber attacks Cyber attacks 2015 Federal Focus Corporate and Government IT Systems Corporate and Government IT Systems - Corporate and Government IT Systems State of the Union Cyber Summit Legislation An Abbreviated Evolution of Cyber Defense 4) Cyber Threat Information Sharing among members of “Trusted Communities” IT Systems Cyber attacks IT Systems IT Systems IT Systems Rise of trusted community sharing Cyber attacks Cyber attacks IT Systems Cyber Information Sharing IT Systems DHS: US-CERT Industry: ISAC’s, then ISAOs What is the NC4 Cyber Threat Exchange? Company C Cyber attacks Company D Company B Company E Cyber attacks Cyber attacks Company A NC4 CTX Company F NC4’s Cyber Threat Exchanges are secure information sharing and collaboration networks. They are used by both public and private organizations to share cyber threats with members of a trusted community. NC4 Cyber Threat Exchange for US-CERT Organization C Cyber attacks US-CERT – United States Computer Emergency Readiness Team Company D Company B Organization E Cyber attacks Cyber attacks Company A NC4 CTX Company F US-CERT leads efforts to strengthen US defense posture. Aggregates Protected Critical Infrastructure Information (PCII) from the private sector NC4 Cyber Threat Exchange for Financial Services Company C Cyber attacks FS-ISAC – Financial Services Information Sharing and Analysis Center Company D Company B Company E Cyber attacks Cyber attacks Company A NC4 CTX Company F Thousands of Financial Services members sharing Cyber threat information NC4 Cyber Threat Exchange for the Defense Industry DSIE – Defense Security Information Exchange Company C Cyber attacks Company D Company B Functions as the DIB-ISAO Company E Cyber attacks Cyber attacks Company A NC4 CTX Company F Pioneered threat sharing methods and techniques Highly effective cyber defenders protecting critical interests NC4 Cyber Threat Exchange for the Retail Industry Company C Cyber attacks R-CISC – Retail Cyber Intelligence Sharing Center Company D Company B Company E Cyber attacks Cyber attacks Company A NC4 CTX Helping retailers establish trusted sharing relationships Preventing data breaches Company F Protecting millions of American customers and saving millions of dollars NC4 Operates Cyber Threat Exchanges for the Key Communities in the United States CTX CTX CTX Defense Security Information Exchange CTX NC4 Cyber Threat Exchange NC4 Operates over 30 Cyber Threat Exchanges Serving over 3,000 Companies and 16,000 Security Professionals Cyber attacks Cyber attacks Cyber attacks NC4 Cyber Threat Exchange Why do 30 communities and 3,000 companies use Cyber Threat Exchanges? Bottom Line – High Costs of Cyber Attacks • $70B+ companies Sony and Target affected at board level Intellectual Property • Remediation and investigation cost Sony over $15M • Anthem data breach could cost anywhere from $4B to over Customers Private Data (PII) $15.6B • Chipotle Twitter account hack spewed racists tweets to over Confidential Data 600,000-plus followers, potentially damaging reputation • Average cyber attack costs $12M with 31 days to remediate • Loss of sensitive business information and potential stock market manipulation Brand Reputation Missed Revenue The NC4 Cyber Threat Exchange Solutions Features and Benefits NC4 Cyber Threat Exchange Cross-Company Organizational Benefits Protocols that promote circles of trust in an environment that accelerates a culture of sharing Collaboration tools that lead to crowdsourced generation of trusted intelligence Tools that enable essential human decision-making on top of shared threat data An ecosystem for sharing best practices, maturing cyber defenses, and increasing effectiveness Technically enables development of an effective community collaboration process Company C Company D Company B Company A Company E NC4 CTX Company F TRUSTED SHARING COMMUNITY NC4 Cyber Threat Exchange A Trusted Operating Environment for Communities of Trust Company C Redundant SCIF-level data centers built to strictest security requirements Company D Company B Meets or exceeds NIST 800-53 requirements for federal certification and accreditation processes Audits available on-demand to customers/communities Physical separation of community data and other infrastructure decisions made to mitigate risk Company A Company E NC4 CTX Company F TRUSTED SHARING COMMUNITY NC4 Cyber Threat Exchange Cyber Threat Exchange Features Centralized management of trust circles and custom compartmentalization Secure social collaboration to transform information into intelligence Document management and knowledge management tools along with author-controlled permissioning and essential handling protocols like Traffic Light Protocol (TLP) Anonymous and user-attributed submission of IOCs, TTPs, RFIs and other information Analyst workflow support with automated input and output Alert profiling to manage volume and ensure relevancy Highly flexible system of custom roles to realize any organizational structure and sharing needs On-the-fly configuration to support collaboration in real time Robust auditing framework NC4 Cyber Threat Exchange Summary – Cyber Threat Exchange • • • • • • A proven and trusted operational infrastructure that optimizes the human interaction component, allowing cyber professionals to exchange risk information in real-time with their trusted communities A turnkey operational service which provides immediate availability, requiring no development Removes obstacles to collaboration, reducing the friction in sharing information with the right people and making it “hard to make a mistake” Unlike other threat sharing environments, you control your data and decide how and with whom to share through circles of trust that you control Out-of-band communication in a separate security domain from your environment supports you in the event your infrastructure is breached Deep audit tracking to support your insight into who has touched your data and when
© Copyright 2025