The Cyber5 Podcast

Mars’ Andrew Stanley

Episode 8 of the podcast discusses why adversarial context is critical to leverage the proper resources of a security operations team with CISO of Mars Andrew Stanley.

  • (00:25) Introductions
  • (03:43) Question 1 – What types of threats are uninteresting to you? What types lead you to investigate outside of your firewall?
  • (05:17) Question 2 – What are the questions you look to answer?
  • (07:33) Question 3 – What answers do you look for outside of the network?
  • (09:48) Question 4 – How have you built this into your decision-making?
  • (11:47) Question 5 – What are the impacts that you’ve seen in employing this overall strategy?
  • (14:08) RECAP & Takeaways

Episode 8 | July 24, 2020

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights℠ Retainer
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks