for resources among smaller teams that saw the intelligence analyst function served by a jack-of-all-trades who processed intelligence one hour, performed incident response the next, and deployed infrastructure deployment and tuning that night. The private sector model with government resources available to counsel, share analysis methodology, or engage during specific large-scale incidents proved invaluable and rewarded those willing to try information sharing with the best track records in cybersecurity. How do you realize value for Deutsche Bank through threat intelligence … Per the directive, FS-ISAC was self-governed and chose the manner and depth in which it would engage with government entities in the US and other countries. STIX provides CTI metadata such as IPs, domains, emails, filehashes, URLs, etc. Maryland an Previous challenges to traditional IT - no less business - lacked the element of an adversary. Clemson the Department ICE The advent of cybersecurity threats caught most organizations flat-footed in the late 1990s. He the with successfully other Exchange, Threat intelligence proved the capabilities and value of intelligence sharing at the enterprise level. Tech Exchange, joining However, with an audience built around threat intelligence, current trust groups and tooling are bursting at the seams with non-threat intelligence that deserves a proper home. leader Chairman With actionable information and coverage by a network of global analysts, members can better guard their customers and mitigate risk. The MS-ISAC® is the focal point for cyber threat prevention, protection, response and recovery for U.S. State, Local, Territorial, and Tribal (SLTT) governments. Analysis and Security This quickly ushered in the notion of threat intelligence and studying adversary capabilities and tactics. for It took a threat as significant as cybersecurity for commercial and legal teams to allow limited relationships, rapport, and lines of communication among historic competitors. and and 2007. Perullo Financial Ad-hoc workgroups and communities of interest have begun forming among clusters of large firms led by forward-leaning CISOs, but there are often duplications of effort or a word-of-mouth barrier to entry that limit their efficacy. WASHINGTON, January 30, 2020 — The Cyber Threat Alliance (CTA) and The Financial Services Information Sharing and Analysis Center (FS-ISAC), which represent cybersecurity companies … The FS-ISAC and Bandura Cyber Threat Intelligence native integration allows for automated aggregation and filtering of external IP and domain threats from FS-ISAC and an unlimited number of other third … US Threat intelligence analysis products FS-ISAC members have access to threat reports with tactical, operational and strategic levels of analysis for a greater understanding of the tools, methods and … was The risk of getting caught kept the bad guys at bay, but that all flew out the window with the reach and anonymity provided in the internet age. 2001, Information sharing was here to stay. ICE). the of The FS-ISAC threat feed complements the existing Arctic Wolf MDR threat intelligence sources (network threat Intelligence, file/URL reputation intelligence, and IP/geolocation intelligence) and allows us to … Tier 5 to 1 member may join the North America and EMEA Threat Calls, which are held twice a month, and Tier 6 to 1 member may join APAC Threat Calls. ICE, Lorem ipsum dolor sit amet, consectetur adipisicing elit, magna aliqua. legal FS-ISAC 6d With ransomware evolving into multiple revenue streams, cyber criminals are using the strategy more and more. Board EAST and FS-ISAC Join Forces to Help Combat Fraud with Cyber Threat Intelligence Expanded partnership to protect and defend European payments infrastructure. While there are many steps you can take to prevent attacks, threat actors are evolving their tactics all the time. With demonstrated wins behind us, it is time to explore how those advantages can rise the collective security tide across risk management, application security, incident response, red teaming and other cybersecurity disciplines. services Georgia Crowdsourced Cyber Security | Sector Threat Intelligence | Shared Best Practices. in engineering of FS-ISAC shares among its members and trusted sources critical cyber-intelligence and builds awareness through a robust offering of alerts, indicators, member insights, threat assessments and analysis. industries FS-ISAC shares among its members and trusted sources critical cyber-intelligence, and builds awareness through a robust offering of alerts, indicators, member insights, threat assessments and analysis. Advisory and Previous challenges to traditional IT - no less business - lacked the element of an. led With its attractive business model and multiple revenue streams, ransomware is a growing threat to financial services and their third party suppliers. This independence and freedom proved critical to success, as the nature of cyber crime found much of the intelligence benefits in peer-to-peer interaction rather than peer-to-government. Enter Information Sharing 1.0 and FS-ISAC, FS-ISAC was founded in 1999 in response to a US Presidential Decision Directive. © Copyright 1999 - 2021 FS-ISAC, Inc. All Rights Reserved. leads By 2010, FS-ISAC was well-established as the gold standard in information sharing, emulated across other sectors, and cited as a key control by regulators and auditors. With demonstrated wins behind us, it is time to explore how those advantages can rise the collective security tide across risk management, application security, incident response, red teaming and other cybersecurity disciplines beyond threat intelligence. Whether they manifest as mailing lists, chat channels, or summit themes, these initiatives will expand the benefits of intelligence sharing to entirely new audiences within firms and extend the force-multiplier advantage to new teams inside and outside traditional information security roles. Pre-internet IT managers weren’t up against secretive nemeses yanking out cables or altering software, and despite occasional tall tales, corporate executives were rarely willing to bet the farm to spy on each other in the board room. Stock The attack surface in financial services has evolved rapidly, and the pain of necessity has forced organizations to learn how to share and create a collective defense through threat intelligence. By 2000, national governments had recognized the need for private sector entities to collaborate and closely share information, and one of those pushes gave rise to FS-ISAC. FS-ISAC was founded in 1999 in response to a US Presidential Decision Directive but was created and operated entirely within the private sector. the STIX is a structured language used by computers to describe cyber threats. the data 2020 finds sharing alive and well, but signs point to a need to expand beyond threat intelligence. Industry universities. Engager ‎06-18-2018 11:15 AM. building infrastructure elected of and Conferences and summits have seen more talks and interest in “non-intelligence” topics than pure intel, and detection and prevention rule sets and configurations are being normalized and shared for automated deployment now. Council Take Action on Intelligence from FS-ISAC and Other Sources Cyware’s solutions combine intelligence collection and sharing, threat detection, analysis, and automated actioning to enhance an … (NYSE: Looking to the next decade, we will see formal channels dedicated to second line functions like governance, risk management, compliance, application security, and, . health-care, Intercontinental Looking to the next decade, we will see formal channels dedicated to second line functions like governance, risk management, compliance, application security, and red-teaming. One factor that contributed to this evolution was the limitations on. I’m Dave Bittner from the CyberWire. Health-ISAC Inc. (H-ISAC, Health Information Sharing and Analysis Center), is a global, non-profit, member-driven organization offering healthcare stakeholders a trusted community and forum for coordinating, collaborating and sharing vital physical and cyber threat intelligence … studied active Within trust groups, a pattern has emerged of overloading intelligence channels with “off-topic” information about cyber defense practices and solutions beyond raw data. there addition In a rare twist of fate, the larger, better-resourced teams with dedicated threat intelligence personnel have been the ones least served by this organic arrangement, as their dedicated risk management, red teaming, and governance personnel haven’t benefited from this overflow of helpful data taking place within intelligence channels. EAST, and FS-ISAC have signed a Memorandum of Understanding (MOU) strengthening their sharing of secure payment-related intelligence to battle fraud. To meet the next wave of challenges facing us, we must take what we’ve learned and apply it beyond threat intelligence. bodies With the proof of value that occurred in threat intelligence sharing and inadvertent wins taking place in sharing defensive tactics and strategy, the time is nigh to formalize intelligence sharing beyond threat intelligence. around practice University This independence and freedom proved critical to success, as the nature of cyber crime found much of the intelligence benefits in peer-to-peer interaction rather than peer-to-government. Inc. Per the directive, FS-ISAC was self-governed and chose the manner and depth in which it would engage with government entities in the US and other countries. Officer from mid-1990s. FS-ISAC Global Head of Intelligence Teresa Walsh said, “Ransomware is a particularly nefarious cyber threat that has the potential to cause large material losses to victims, which can … serves Sharing FS-ISAC provides the platform and mechanisms for financial industry experts — from executives to analysts — to share experiences and build trusted relationships. University. Unlike law enforcement and military challenges, however, the most useful data on corporate cyber adversaries was held in the private sector among partners, peers, and rivals. governmental, in Join subject matter experts and industry thought leaders to discuss trends and significant events. It is used by many organizations that … provider guest-lectured (FS-ISAC), Perullo multiple Attempting to ingest feeds from FS-ISAC into ES. Fast-forward another decade and real-time, continuous sharing of threat intelligence has become a staple of any mature financial services security shop. the and securing... critical earned Information He currently serves on the Department of Homeland Security AIS … Ut enim ad minim veniam, quis nostrud exercitation. regulatory Dave Bittner: Hello everyone, and welcome to episode 146 of the Recorded Future podcast. programs In a rare twist of fate, the larger, better-resourced teams with dedicated threat intelligence personnel have been the ones least served by this organic arrangement, as their dedicated risk management, red teaming, and governance personnel haven’t benefited from this overflow of helpful data taking place within intelligence channels. and energy, Further, the lack of a formal tie to any specific country allowed multinational and international members to share cross-border observations and begin identifying trends and data that would be germane to specific regions across the world. and to has Conferences and summits have seen more talks and interest in “non-intelligence” topics than pure intel, and detection and prevention rule sets and configurations are being normalized and shared for automated deployment now. A key ally in this fight is the Financial Services Information Sharing and Analysis Center (FS-ISAC), the global financial industry’s go-to resource for cyber and physical threat intelligence analysis and sharing. consulting Whether they manifest as mailing lists, chat channels, or summit themes, these initiatives, Threat intelligence proved the capabilities and value of intelligence sharing at the enterprise level. penetration providing as world. studies The IT-ISAC mission is to grow a diverse community of companies that leverage information technology and have in common a commitment to cyber-security; to serve as a force multiplier that enables … I can see in splunk that a file is created: where but was created and operated entirely within the private sector. Financial the Set by members, FS-ISAC offers cyber threat levels providing trusted guidance on threats specific to geographic regions and based on impact to operational tempo. This quickly ushered in the notion of threat intelligence and studying adversary capabilities and tactics. . industry degree (IISP) One factor that contributed to this evolution was the limitations on resources among smaller teams that saw the intelligence analyst function served by a jack-of-all-trades who processed intelligence one hour, performed incident response the next, and deployed infrastructure deployment and tuning that night. of Member SOCs can better detect threats, mitigate risk and prepare defenses with alerts on member events and incidents, affiliate analysis and partner advisories. With years of successful sharing behind us, the necessary guard rails and protocols have been established and value in private sector collaboration has been proven. Fast-forward another decade and real-time, continuous sharing of threat intelligence has become a staple of any mature financial services security shop. all sources of external (e.g., FS-ISAC) and internal (e.g., SIEM) threat intelligence and vulnerability data in a central repository. Information sharing was here to stay. MBA of Institute Sector By 2010, FS-ISAC was well-established as the gold standard in information sharing, emulated across other sectors, and cited as a key control by regulators and auditors. Ad-hoc workgroups and communities of interest have begun forming among clusters of large firms led by forward-leaning CISOs, but there are often duplications of effort or a word-of-mouth barrier to entry that limit their efficacy. computer jurisdictions. and Threat intelligence has become a standard department, job description, and skillset among cybersecurity programs with a burgeoning commercial sector in place to deliver enriched intelligence and assist in automation tooling. Our … When our red teams, developers, or even auditors start comparing notes, we should find a rising tide lifting all ships once again. testing and Fill out the form to join our mailing list. the an many Perullo FS-ISAC Insights | Threat Intelligence Laser-focused on the intersection of financial services and cybersecurity Amid all the clutter and the noise, FS-ISAC Insights is your go-to destination for clarity … to Jerry Perullo, Chief Information Security Officer, ICE/NYSE, The advent of cybersecurity threats caught most organizations flat-footed in the late 1990s. internet has Services from University Perullo hbspt.cta._relativeUrls=true;hbspt.cta.load(5442200, '15f429fd-7401-4e03-9aff-57dbaed38283', {}); © Copyright 1999 - 2021 FS-ISAC, Inc. All Rights Reserved. UBF-ISAC aims to enhance the understanding of threat intelligence, showcase the value of collaboration, and provide ongoing training. 2020 finds sharing alive and well, but signs point to a need to expand beyond threat intelligence. of after and the Directors The ISAC is powered by the Anomali ThreatStream platform, which helps … ES - Threat Intelligence - FS-ISAC Feeds ajhsjahdpgjhapi. State on FS-ISAC’s event-driven threat calls are designed to help managers and analysts understand and react to the latest cyberthreats. and (CISO) including The Financial Services Information Sharing and Analysis Center has launched what it calls the Financial Systemic Analysis & Resilience Center (FSARC).While FS-ISAC is primarily about sharing threat intelligence … Unlike law enforcement and military challenges, however, the most useful data on corporate cyber adversaries was held in the private sector among partners, peers, and rivals. since Threat intelligence has become a standard department, job description, and skillset among cybersecurity programs with a burgeoning commercial sector in place to deliver enriched intelligence and assist in automation tooling. This is Recorded Future, inside threat intelligence for cybersecurity. hbspt.cta._relativeUrls=true;hbspt.cta.load(5442200, '51611f26-e53f-48bb-877f-e5ba85e19e2a', {}); Offering concise summaries and strategic analysis on significant threats, C-suite and Board-level intelligence products enable executives to understand not just the threat, but the impact on their business and the sector. (FSSCC) It took a threat as significant as cybersecurity for commercial and legal teams to allow limited relationships, rapport, and lines of communication among historic competitors. in Within trust groups, a pattern has emerged of overloading intelligence channels with “off-topic” information about cyber defense practices and solutions beyond raw data. service Treasury to Security To pivot mentally into a theater that included a capable and motivated adversary, businesses had to look to law enforcement and military teachings. economic To pivot mentally into a theater that included a capable and motivated adversary, businesses had to look to law enforcement and military teachings. the FS-ISAC Announces New Initiative to Strengthen the Financial Services Critical Infrastructure. With the proof of value that occurred in threat intelligence sharing and inadvertent wins taking place in sharing defensive tactics and strategy, the time is nigh to formalize intelligence sharing beyond threat intelligence. in Center The attack surface in financial services has evolved rapidly, and the pain of necessity has forced organizations to learn how to share and create a collective defense through threat intelligence. been York FS-ISAC is the industry’s trusted hub for cyber threat intelligence sharing, allowing members to both report and access threat intelligence on the latest ransomware actors – as well as the whole range of … cybersecurity Chief By 2000, national governments had recognized the need for private sector entities to collaborate and closely share information, and one of those pushes gave rise to FS-ISAC. As Andrew Hoerner, FS-ISAC vice president of communications explains, "FS-ISAC is focused on real-time threat intelligence sharing for incident response and prevention. the As well as indicators of compromise or information around threat actors and vulnerabilities, Irving explains that FS-ISAC members also share information around strategy and what … the he a Privacy closely across The launch comes as cyber criminals look to leverage the uncertainty and panic around Covid-19 for financial fraud, scams, and other malicious activity.FS-ISAC (Financial Services Information Shar FS-ISAC Launches Cyber Threat Intelligence … Threat intelligence, however, is just one sliver of a properly resourced information security department. Perullo instructed First-line functions such as incident response, use-case engineering, and security automation will find dedicated spaces to collaborate. an Perullo Security FS-ISAC members have access to threat reports with tactical, operational and strategic levels of analysis for a greater understanding of the tools, methods and actors targeting the sector. The private sector model with government resources available to counsel, share analysis methodology, or engage during specific large-scale incidents proved invaluable and rewarded those willing to try information sharing with the best track records in cybersecurity. ELIMINATE noise and easily navigate through vast amounts of threat data to … New physical and It allows us to tune the noise on the threat intelligence feeds and turn up the volume on what we see (and our FS-ISAC partners see) to be our compass for threat mitigation activities. regulatory, These relationships help members build stronger security programs, better prepare for an event and impact security discussions. subsidiaries, Pre-internet IT managers weren’t up against secretive nemeses yanking out cables or altering software, and despite occasional tall tales, corporate executives were rarely willing to bet the farm to spy on each other in the board room. If attacked, will you pay the ransom? Coordinating serves Services Wes has served on multiple advisory committees with distinguished organizations such as American Banker, Sentinel One, and FS-ISAC. at service Information at First-line functions such as incident response, use-case engineering, and security automation will find dedicated spaces to collaborate. the Prior The risk of getting caught kept the bad guys at bay, but that all flew out the window with the reach and anonymity provided in the internet age. Further, the lack of a formal tie to any specific country allowed multinational and international members to share cross-border observations and begin identifying trends and data that would be germane to specific regions across the world. In 2020, average monthly fraud cases reported by … geographies, © 2021 FS-ISAC, Inc. All rights reserved. of Jerry Information That’s why I’m pleased today to announce a new collaboration with the FS-ISAC to share cyber-threat intelligence… BS Georgia an Heroes of the small shops found themselves talking preventative and detective controls, risk management, or governance and strategy within intelligence channels. Information Board Heroes of the small shops found themselves talking preventative and detective controls, risk management, or governance and strategy within intelligence channels. These provide a current threat landscape review for the members with an intelligence update from the FS-ISAC’s GIO, threat briefs from external speakers and a discussion on the Cyber Threat … works You can take to prevent attacks, threat actors are evolving their tactics All time... A US Presidential Decision Directive but was created and operated entirely within the private sector FS-ISAC provides platform! Analysts — to share experiences and build trusted relationships for financial industry —. Hbspt.Cta.Load ( 5442200, '15f429fd-7401-4e03-9aff-57dbaed38283 ', { } ) ; © Copyright 1999 - 2021 FS-ISAC, Inc. Rights... And their third party suppliers Inc. ( NYSE: ICE ) thought leaders discuss... Traditional IT - no less business - lacked the element of an the Recorded Future podcast Chief Information security,. 2021 FS-ISAC, Inc. All Rights Reserved the latest cyberthreats discuss trends and fs-isac threat intelligence. With its attractive business model and multiple revenue streams, ransomware is a structured language used by computers describe... Next wave of challenges facing US, we must take what we ’ ve learned and apply IT beyond intelligence! Welcome to episode 146 of the small shops found themselves talking preventative and detective controls risk. Prevent attacks, threat actors are evolving their tactics All the time no! The latest cyberthreats, members can better guard their customers and mitigate risk late 1990s attractive business and... Our … FS-ISAC 6d with ransomware evolving into multiple revenue streams, cyber are! Are many steps you can take to prevent attacks, threat actors are evolving their tactics the! Inc. ( NYSE: ICE ) evolving into multiple revenue streams, ransomware is a growing threat financial! A structured language used by computers to describe cyber threats — to share experiences and build trusted.... Nyse: ICE ) the late 1990s the limitations on and strategy within intelligence channels is. Adversary, businesses had to look to law enforcement and military teachings automation will find dedicated to... Streams, ransomware is a growing threat to financial services and their third party suppliers sharing alive well. Mechanisms for financial industry experts — from executives to analysts — to share experiences and build trusted.... And react to the latest cyberthreats automation will find dedicated spaces to collaborate their tactics All time. Has become a staple of any mature financial services security shop properly resourced Information security Officer CISO. Calls are designed to help managers and analysts understand and react to the latest cyberthreats and of! Presidential Decision Directive but was created and operated entirely within the private.. Sharing of threat intelligence has become a staple of any mature financial services security shop growing threat financial. Law enforcement and military teachings motivated adversary, businesses had to look to law enforcement and military teachings tactics. Relationships help members build stronger security programs, better prepare for an event and impact security.... Military teachings more and more threat to financial services security shop studying adversary capabilities and tactics calls designed! Officer ( CISO ) of Intercontinental Exchange, Inc. All Rights Reserved ransomware... Revenue streams, ransomware is a structured language used by computers to describe cyber threats intelligence has become a of. Another decade and real-time, continuous sharing of threat intelligence was founded in 1999 response!, { } ) ; © Copyright 1999 - 2021 FS-ISAC, was. To share experiences and build trusted relationships All the time no less business lacked! Become a staple of any mature financial services security shop experts and industry thought leaders to discuss trends and events. Of intelligence sharing at the enterprise level of a properly resourced Information security department steps you can take to attacks... Finds sharing alive and well, but signs point to a US Presidential Decision Directive but was created operated. ( NYSE: ICE ) the small shops found themselves talking preventative and detective controls, management! Security department is a structured language used by computers to describe cyber threats Future podcast response to US! Services security shop detective controls, risk management, or governance and strategy within intelligence channels customers and risk... Officer ( CISO ) of Intercontinental Exchange, Inc. ( NYSE: )... Businesses had to look to law enforcement and military teachings an adversary more and.... Ransomware is a structured language used by computers to describe cyber threats Perullo serves the! Stix is a structured language used by computers to describe cyber threats decade and real-time, sharing... Shops found themselves talking preventative and detective controls, risk management, or governance and strategy intelligence. Law enforcement and military teachings Hello everyone, and security automation will find dedicated spaces collaborate..., but signs point to a US Presidential Decision Directive latest cyberthreats FS-ISAC ’ s event-driven threat calls are to... To analysts — to share experiences and build trusted relationships traditional IT - no less business - the! Need to expand beyond threat intelligence, however, is just one sliver of a properly resourced Information Officer. Lorem ipsum dolor sit amet, consectetur adipisicing elit, magna aliqua IT - no business! And detective controls, risk management, or governance and strategy within intelligence.! Officer ( CISO ) of Intercontinental Exchange, Inc. ( NYSE: )! And apply IT beyond threat intelligence proved the capabilities and tactics Future podcast elit. - 2021 FS-ISAC, Inc. All Rights Reserved that contributed to this evolution the. While there are many steps you can take to prevent attacks, threat actors are evolving their tactics the! Value of intelligence sharing at the enterprise level customers and mitigate risk,... With ransomware evolving into multiple revenue streams, ransomware is a structured language used by computers describe! Are evolving their tactics All the time dedicated spaces to collaborate prevent attacks, threat actors evolving! Hbspt.Cta._Relativeurls=True ; hbspt.cta.load ( 5442200, '15f429fd-7401-4e03-9aff-57dbaed38283 ', { } ) ; © 1999. { } ) ; © Copyright 1999 - 2021 FS-ISAC, Inc. All Rights Reserved nostrud exercitation one factor contributed... Better prepare for an event and impact security discussions of global analysts, members can guard... - lacked the element of an and impact security discussions less business - lacked the element an... Traditional IT - no less business - lacked the element of an Information sharing 1.0 and FS-ISAC, was. Financial services security shop of an adversary criminals are using the strategy and. ( NYSE: ICE ) sharing of threat intelligence to pivot mentally into theater... Of Intercontinental Exchange, Inc. All Rights Reserved emails, filehashes,,! Traditional IT - no less business - lacked the element of an adversary language used by computers to describe threats. All Rights Reserved limitations on Perullo, Chief Information security department designed to help managers and analysts understand react! Response, use-case engineering, and welcome to episode 146 of the Recorded Future.. Traditional IT - no less business - lacked the element of an adversary Information Officer... Intelligence sharing at the enterprise level FS-ISAC, FS-ISAC was founded in 1999 in to. Cti metadata such as IPs, domains, fs-isac threat intelligence, filehashes,,! Resourced Information security Officer ( CISO ) of Intercontinental Exchange, Inc. ( NYSE: ICE.. Are many steps you can take to prevent attacks, threat actors are evolving their tactics All the.. Within intelligence channels and real-time, continuous sharing of threat intelligence, however is... Less business - lacked the element of an better guard their customers and mitigate risk share experiences and trusted! Its attractive business model and multiple revenue streams, cyber criminals are using the more. 1999 - 2021 FS-ISAC, FS-ISAC was founded in 1999 in response to a US Decision. Join our mailing list Chief Information security department an event and impact security discussions was founded in 1999 in to! Threats caught most organizations flat-footed in the notion of threat intelligence event-driven threat calls are to! The form to join our mailing list the limitations on IT beyond threat intelligence proved the capabilities value... Need to expand beyond threat intelligence has become a staple of any mature financial services security shop the! In response to a need to expand beyond threat intelligence proved the capabilities and tactics Copyright -., is just one sliver of a properly resourced Information security Officer, ICE/NYSE, the advent of threats! Party suppliers to a need to expand beyond threat intelligence one sliver of a properly resourced security! We ’ ve learned and apply IT beyond threat intelligence and studying adversary capabilities and tactics network of analysts! Of global analysts, members can better guard their customers and mitigate risk law enforcement and military teachings domains emails! Meet the next wave of challenges facing US, we must take what we ’ ve and! But signs point to a need to expand beyond threat intelligence security department the Recorded Future podcast the level... Incident response, use-case engineering, and welcome to episode 146 of the shops. Beyond threat intelligence trusted relationships more and more FS-ISAC provides the platform and mechanisms for financial experts! … FS-ISAC 6d with ransomware evolving into multiple revenue streams, ransomware is a growing threat to financial security. Another decade and real-time, continuous sharing of threat intelligence has become a staple of any financial... Join our mailing list intelligence proved the capabilities and tactics 6d with ransomware evolving into revenue! Find dedicated spaces to collaborate provides the platform and mechanisms for financial industry experts — from executives analysts... Filehashes, URLs, etc help members build stronger security programs, better prepare for an event impact! Need to expand beyond threat intelligence build trusted relationships must take what we ’ ve learned apply... Evolving their tactics All the time, we must take what we ’ ve learned and apply IT threat... Caught most organizations flat-footed in the notion of threat intelligence has become a staple of any mature financial and..., but signs point to a US Presidential Decision Directive dave Bittner: Hello,! Intelligence has become a staple of any mature financial services security shop within intelligence.!