{"id":443,"date":"2023-10-28T22:29:56","date_gmt":"2023-10-29T05:29:56","guid":{"rendered":"http:\/\/improdango.com\/?page_id=443"},"modified":"2023-10-31T22:55:23","modified_gmt":"2023-11-01T05:55:23","slug":"operational-intelligence","status":"publish","type":"page","link":"http:\/\/improdango.com\/?page_id=443","title":{"rendered":"Operational Intelligence"},"content":{"rendered":"\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<p><a href=\"http:\/\/improdango.com\/?page_id=447\" data-type=\"page\" data-id=\"447\">&#x2196; Key Insights<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<p class=\"has-text-align-center has-extra-small-font-size\"><a href=\"http:\/\/improdango.com\/?page_id=445\" data-type=\"page\" data-id=\"445\">Future Directions &#x2197;<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>Course of Action<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Monitor malicious URLs from adversary nations.<\/li>\n\n\n\n<li>Apply filtering methods to filter phishing emails.<\/li>\n\n\n\n<li>Develop response mechanism\/alerting from AI models for automatically detecting network intrusion and isolate compromised devices or systems.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p><strong>Implementation<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Monitor Malicious URLs &#8211; using AI models generated in Phase 3 for real-time&nbsp;monitoring and alerting of malicious URLs from adversary nations.<\/li>\n\n\n\n<li>Phishing Emails &#8211; utilizing text analysis create filters to filter phishing emails from general email traffic.<\/li>\n\n\n\n<li>Network Intrusion &#8211; enable monitoring and alerting to proactively monitor network traffic and alert the IT security team.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">How to Share Discovered Intelligence<\/h2>\n\n\n\n<p><strong>Operational Intelligence<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Malicious&nbsp;URLs from adversary nations<\/li>\n\n\n\n<li>Phishing emails and filters<\/li>\n\n\n\n<li>Network&nbsp;intrusion&nbsp;detection<\/li>\n<\/ol>\n\n\n\n<p><strong>How to Share<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Share this intelligence right away with staff and leaders within&nbsp;the&nbsp;organization&nbsp;via the organization preferred methods for&nbsp;&nbsp;immediate communication. Additionally, share information&nbsp;with peers and regulators, such as the FDIC within the banking industry via TAXII peer to peer approach.&nbsp;Leveraging use of multiple information channels including use of social media will enable share with as many intelligence sharing communities as possible.<\/li>\n\n\n\n<li>Share phishing email awareness&nbsp;information&nbsp;with employees and leaders via daily huddles or emails and with IT staff immediately to ensure that the necessary email filters are put in place. All staff would receive an automated responses of emails classified as phishing.<\/li>\n\n\n\n<li>Network intrusion detection information should be shared with&nbsp;IT staff right away in impromptu huddles or email to allow them to implement proactive monitoring&nbsp;of network flow. The intelligence can be shared with intelligence sharing communities in a structured manner (STIX or TAXII), and can be shared with bank employees at workshops or staff meetings.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>&#x2196; Key Insights Future Directions &#x2197; Course of Action Implementation How to Share Discovered Intelligence Operational Intelligence How to Share<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":8,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-443","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages\/443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/improdango.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=443"}],"version-history":[{"count":5,"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages\/443\/revisions"}],"predecessor-version":[{"id":476,"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages\/443\/revisions\/476"}],"wp:attachment":[{"href":"http:\/\/improdango.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}