Using Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Intelligence
-
Upload
marah-madden -
Category
Documents
-
view
26 -
download
0
description
Transcript of Using Threat Intelligence
Using Threat Intelligence
Daniel R Pascale, CPPRutgers, The State University of
NJ
Rutgers OEM
InfraGard February 19, 2008
Rutgers Overview
• 50,000students– 38,000 (NB)
• 10,000 faculty/staff– 5,900 (NB)
• 14,200 residents• 45,000 seat stadium (Tier I)• 900+ buildings• Largest University Bus System
– 2nd Largest Private Bus System (Disney)
Rutgers OEM
InfraGard February 19, 2008
Emergencies
Rutgers OEM
InfraGard February 19, 2008
VIP VISITS
Rutgers OEM
InfraGard February 19, 2008
Athletic Events
Rutgers OEM
InfraGard February 19, 2008
Threats
• Civil Disturbance – Protests• Internal Theft• Workplace Violence• Workplace Interruption• High Risk Behavior
Rutgers OEM
InfraGard February 19, 2008
Public resources
• Blogs• Auction Sites• Social Networking Sites
– Myspace– Facebook
• You Tube
Rutgers OEM
InfraGard February 19, 2008 Myspace
Rutgers OEM
InfraGard February 19, 2008
The Face Book
Rutgers OEM
InfraGard February 19, 2008 Ebay
Rutgers OEM
InfraGard February 19, 2008 You Tube
Rutgers OEM
InfraGard February 19, 2008
Using Information
• Educate employees (force multiplier)
• Go surfing• Report findings to security/law
enforcement• Follow up on all threats• Keep records and back up copies