Empowering security teams with an agile
threat intelligence methodology
for the modern threatscape
Continuous Investigations/Continuous Protection™ (CI/CP)
The only way for today’s security teams to effectively manage the huge amount of data points they have to digest is by implementing a modern methodology which is continuous, fast, iterative and smart. The cornerstone of the CI/CP framework lies in quickly and intuitively connecting the dots between a singular tactical incident and the broader strategic landscape.
Sixgill pioneers the Continuous Investigations/Continuous Protection™ (CI/CP) approach to security. CI/CP uses automation tools that empower security teams to collect, analyze, research, and respond after each intel development as seamlessly as possible. Focusing on maximum security readiness at any given time, Continuous Protection naturally leads to Continuous Investigation.
Nothing Is Faster Than Real-Time
Real-time collection that enriches your data lake. In order to support a continuous CI/CP process, you must ensure there is a continuous stream of valuable data from the darkest corners of the underground. It is vital that these collection mechanisms be agile enough to seamlessly adjust themselves to the changing nature of the threat actors’ ways of communications.
CI/CP Is All About Context
Data, even in a raw form, is never collected in a vacuum. Every IP has a “story”. Every post has an author. Every product that is sold on the dark web has a customer base. These details matter when you want to create CI/CP driven processes. Any data point that is being collected should be processed, structured and correlated with other data sets in order to connect the dots and complete the bigger picture.
Visibility Into A Threat Actor’s Mindset
By implementing CI/CP, security teams can better understand a threat actor’s mindset; from connections, through expertise, all the way to what motivates them. This deep understanding of threat actors’ M.O.s enables security teams to better anticipate, intercept and respond to incoming threats.
An investigative portal should enable you to discover:
- If they are a human or a Bot
- Expertise – Are they a script- kiddie, novice, or pro
- What tools they use
- Related IPs and Domains
- Targets – Financial organizations, healthcare, gaming, federal entities
- Trends in references – Timeline reference analysis
- Social network – Who are their friends, co-workers, rivals
- Motivations – Is it money, ideology, or state-directive
- Contact information
Iterative And Continuous Implementing
CI/CP driven threat intelligence processes empower you to have a full-cycle of agile responses. As soon as a new data point reaches the data lake, it is pushed to your security platform and is correlated with other indicators you already have. The data is aggregated, and the appropriate playbooks are triggered. After preventing the initial threat, you should now circle back to the data point that triggered the incident and thoroughly investigate it to understand the causes of the incident, and take actions to improve your security posture. CI/CP leverages an investigative portal that allows you to effortlessly deep dive, slice and dice the data and accelerate time-to-insights.