Continuous Investigation/Continuous Protection™ (CI/CP)

Empowering security teams with an agile threat intelligence methodology for the modern threatscape.

The only way for today’s security teams to effectively manage the huge amount of data points they have to digest is by implementing a modern methodology which is continuous, fast, iterative and smart. The cornerstone of the CI/CP framework lies in quickly and intuitively connecting the dots between a singular tactical incident and the broader strategic landscape.

Cybersixgill pioneers the Continuous Investigation/Continuous Protection™ (CI/CP) approach to security. CI/CP uses automation tools that empower security teams to collect, analyze, research, and respond after each intel development as seamlessly as possible. Focusing on maximum security readiness at any given time, Continuous Protection naturally leads to Continuous Investigation.



Nothing Is Faster Than Real-Time

Real-time collection that enriches your data lake. In order to support a continuous CI/CP process, you must ensure there is a continuous stream of valuable data from the darkest corners of the underground. It is vital that these collection mechanisms be agile enough to seamlessly adjust themselves to the changing nature of the threat actors’ ways of communications.

icon share

CI/CP Is All About Context

Data, even in a raw form, is never collected in a vacuum. Every IP has a “story”. Every post has an author. Every product that is sold on the dark web has a customer base. These details matter when you want to create CI/CP driven processes. Any data point that is being collected should be processed, structured and correlated with other data sets in order to connect the dots and complete the bigger picture.

icon visible

Visibility Into A Threat Actor’s Mindset

By implementing CI/CP, security teams can better understand a threat actor’s mindset; from connections, through expertise, all the way to what motivates them. This deep understanding of threat actors’ M.O.s enables security teams to better anticipate, intercept and respond to incoming threats.

An investigative portal should enable you to discover:

  • If they are a human or a Bot
  • Expertise – Are they a script- kiddie, novice, or  pro
  • What tools they use
  • Related IPs and Domains
  • TTPs
  • Targets – Financial organizations, healthcare, gaming, federal entities
  • Trends in references – Timeline reference analysis
  • Social network – Who are their friends, co-workers, rivals
  • Motivations – Is it money, ideology, or state-directive
  • Contact information
icon iterative

Iterative And Continuous Implementing

CI/CP driven threat intelligence processes empower you to have a full-cycle of agile responses. As soon as a new data point reaches the data lake, it is pushed to your security platform and is correlated with other indicators you already have. The data is aggregated, and the appropriate playbooks are triggered. After preventing the initial threat, you should now circle back to the data point that triggered the incident and thoroughly investigate it to understand the causes of the incident, and take actions to improve your security posture. CI/CP leverages an investigative portal that allows you to effortlessly deep dive, slice and dice the data and accelerate time-to-insights.

Provides Synergistic Value

When implementing CI/CP, you have to make sure that the data enables you to respond seamlessly with each intel development. CI/CP advocates integrating threat intelligence feeds with your security platform—whether it is a SIEM, SOAR, EPP or VM—in a way that each meaningful data point will trigger an action on your end to mitigate the threat.

Seamless Protection

Implementing CI/CP threat intelligence means teams are constantly and proactively responding to the most updated intelligence picture, generating fresh, relevant intel to take incident detection, prevention and response to the next level, with minimum business interruption, breaking security siloes and maximizing the performance of security teams, platforms and processes.

The world is shifting left.
It’s time threat intelligence does the same.