{"id":218155,"date":"2018-11-13T15:07:42","date_gmt":"2018-11-13T14:07:42","guid":{"rendered":"https:\/\/www.intrinsec.com\/?p=218155"},"modified":"2018-11-13T15:07:42","modified_gmt":"2018-11-13T14:07:42","slug":"interview-cyber-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/interview-cyber-threat-intelligence\/","title":{"rendered":"Interview with Clotilde, Head of Threat Intelligence Analysis"},"content":{"rendered":"[et_pb_section fb_built=&quot;1&quot; admin_label=&quot;section&quot; _builder_version=&quot;3.22&quot;][et_pb_row _builder_version=&quot;4.2.1&quot; column_structure=&quot;1_2,1_2&quot;][et_pb_column _builder_version=&quot;4.2.1&quot; type=&quot;1_2&quot;][et_pb_image src=&quot;https:\/\/www.intrinsec.com\/wp-content\/uploads\/2020\/01\/signal-attachment-2020-01-07-094451_005-1.jpeg&quot; _builder_version=&quot;4.2.1&quot; width=&quot;75.2%&quot; hover_enabled=&quot;0&quot; custom_margin=&quot;|90px||||&quot;][\/et_pb_image][\/et_pb_column][et_pb_column _builder_version=&quot;4.2.1&quot; type=&quot;1_2&quot;][et_pb_text _builder_version=&quot;4.2.1&quot; hover_enabled=&quot;0&quot; custom_padding=&quot;|||0px||&quot; custom_margin=&quot;|||-55px||&quot; width=&quot;111.9%&quot;]<p><strong>Hello Clotilde, can you tell us about the Cyber Threat Intelligence solution?<\/strong><\/p>\n<p><strong>Clotilde:<\/strong> In a few words, the\u00a0<strong>Cyber Threat Intelligence<\/strong>\u00a0is a service based on an approach to <strong>cyber intelligence<\/strong>, which allows us to anticipate and detect threats across all layers of the Internet (Surface, Deep and Dark).<\/p>\n<p><strong>The Threat Intelligence cell<\/strong> operates at both strategic and technical levels. On the one hand, it allows for <strong>provide information on the attacker\/attacked contexts<\/strong>\u00a0And <strong>sector-specific monitoring reports<\/strong>, by understanding the specific context of the company.<\/p>\n<p>On the other hand,<strong> It addresses fundamental issues for businesses<\/strong>, By identifying threats with rapid operational leverage: combating data leaks and fraud, protecting information systems, personal data, and ultimately, brand image. This offering goes hand in hand with the SOC, as it allows for the observation and analysis of what is happening outside the information system, with the aim of detecting incidents and helping companies respond.<\/p>\n<p>Beyond the<strong> continuous dimension of the service,<\/strong> This approach can be used on an ad hoc basis to take stock of the situation or to support other initiatives (risk assessment in the context of an acquisition, request for information to support an internal investigation, etc.).<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label= \u00bbrow \u00bb _builder_version= \u00bb3.25\u2033 background_size= \u00bbinitial \u00bb background_position= \u00bbtop_left \u00bb background_repeat= \u00bbrepeat \u00bb][et_pb_column type= \u00bb4_4\u2033 _builder_version= \u00bb3.25\u2033 custom_padding= \u00bb||| \u00bb custom_padding__hover= \u00bb||| \u00bb][et_pb_text admin_label= \u00bbText \u00bb _builder_version= \u00bb4.2.1\u2033 background_size= \u00bbinitial \u00bb background_position= \u00bbtop_left \u00bb background_repeat= \u00bbrepeat \u00bb hover_enabled= \u00bb0\u2033]<p><strong>What types of organizations does it target?<\/strong><strong>\u00a0<\/strong><strong>?<\/strong><\/p>\n<p><strong>Clotilde:<\/strong> Cyber Threat Intelligence is a powerful solution, primarily aimed at organizations with\u00a0<strong>a major exhibition<\/strong><strong>\u00a0<\/strong>: a large technological footprint, information assets to protect, a large number of employees, or a substantial supply chain. Smaller organizations can also find a solution there.\u00a0<strong>insurance interest<\/strong>, where the biggest ones will receive a<strong>\u00a0regular stream of alerts<\/strong>. Feel free to consult\u00a0<a href=\"https:\/\/www.intrinsec.com\/en\/le-groupe-rocher-client-historique-de-la-cyber-threat-intelligence\/\"><u>our feedback from the Rocher Group<\/u><\/a>\u00a0to learn more about our methods.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>What is the added value of Intrinsec&#039;s Cyber Threat Intelligence unit?<\/strong><strong>\u00a0<\/strong><strong>?\u00a0<\/strong><\/p>\n<p><strong>Clotilde:<\/strong> Our experience as a pure player offering an end-to-end approach to cybersecurity issues allows us to integrate this topic into\u00a0<strong>a global strategy<\/strong>\u00a0; The service provided therefore takes into account all our experiences (<strong>both operational and organizational<\/strong>), to propose pragmatic solutions and recommendations.<\/p>\n<p>By supporting organizations of all sizes on this topic since 2014, we have developed a practice that allows us to ensure rapid implementation. Service users receive initial alerts within the first few days of activation, and we support them throughout the service to build their program.\u00a0<strong><a href=\"https:\/\/www.intrinsec.com\/en\/cyber-threat-intelligence\/\">Threat Intelligence<\/a><\/strong>\u00a0and do it<strong>\u00a0evolve with their context<\/strong>.<\/p>\n<p>Finally, by mixing a\u00a0<strong>exclusive technology platform<\/strong>, to a\u00a0<strong>an experienced team of multilingual monitors and analysts\u00a0<\/strong>(particularly in Asia, Russia and Arabic-speaking countries), we guarantee to maintain technological relevance and the ability to address an international context.<\/p>\n<p>According to Gartner,\u00a0<em>\u00ab<\/em><em>\u00a0<\/em><em>In 2018, 601,300 companies will use Threat Intelligence<\/em><em>\u00a0<\/em><em>\u00bb<\/em>. A practice that has become widespread in the United States, but is still underutilized in France.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>If you too wish to react before being affected and reduce the risks of cyberattacks against your company, our consultants will be happy to answer your questions and offer you a tailor-made solution.<\/em><\/strong><\/p>\n<p><strong><em>Feel free to contact us at\u00a0<\/em><a href=\"mailto:contact@intrinsec.com\"><em>contact@intrinsec.com.<\/em><\/a><\/strong><\/p>\n<p>&nbsp;<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]","protected":false},"excerpt":{"rendered":"","protected":false},"author":13,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-218155","post","type-post","status-publish","format-standard","hentry","category-cyber-threat-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Intrinsec - Interview de Clotilde, Responsable Analyse Threat Intelligence<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/interview-cyber-threat-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Interview de Clotilde, Responsable Analyse Threat Intelligence\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/interview-cyber-threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-13T14:07:42+00:00\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/interview-cyber-threat-intelligence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/interview-cyber-threat-intelligence\\\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/5636e3e5276b952facbd0aadb12a858a\"},\"headline\":\"Interview de Clotilde, Responsable Analyse Threat Intelligence\",\"datePublished\":\"2018-11-13T14:07:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/interview-cyber-threat-intelligence\\\/\"},\"wordCount\":772,\"commentCount\":0,\"articleSection\":[\"Cyber Threat Intelligence\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/interview-cyber-threat-intelligence\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/interview-cyber-threat-intelligence\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/interview-cyber-threat-intelligence\\\/\",\"name\":\"Intrinsec - Interview de Clotilde, Responsable Analyse Threat Intelligence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"datePublished\":\"2018-11-13T14:07:42+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/5636e3e5276b952facbd0aadb12a858a\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/interview-cyber-threat-intelligence\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/interview-cyber-threat-intelligence\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/interview-cyber-threat-intelligence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interview de Clotilde, Responsable Analyse Threat Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/5636e3e5276b952facbd0aadb12a858a\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"caption\":\"Admin\"},\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Intrinsec - Interview with Clotilde, Threat Intelligence Analysis Manager","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/interview-cyber-threat-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"Interview de Clotilde, Responsable Analyse Threat Intelligence","og_url":"https:\/\/www.intrinsec.com\/en\/interview-cyber-threat-intelligence\/","og_site_name":"INTRINSEC","article_published_time":"2018-11-13T14:07:42+00:00","author":"Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/interview-cyber-threat-intelligence\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/interview-cyber-threat-intelligence\/"},"author":{"name":"Admin","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/5636e3e5276b952facbd0aadb12a858a"},"headline":"Interview de Clotilde, Responsable Analyse Threat Intelligence","datePublished":"2018-11-13T14:07:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/interview-cyber-threat-intelligence\/"},"wordCount":772,"commentCount":0,"articleSection":["Cyber Threat Intelligence"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intrinsec.com\/interview-cyber-threat-intelligence\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/interview-cyber-threat-intelligence\/","url":"https:\/\/www.intrinsec.com\/interview-cyber-threat-intelligence\/","name":"Intrinsec - Interview with Clotilde, Threat Intelligence Analysis Manager","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"datePublished":"2018-11-13T14:07:42+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/5636e3e5276b952facbd0aadb12a858a"},"breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/interview-cyber-threat-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/interview-cyber-threat-intelligence\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/interview-cyber-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"Interview de Clotilde, Responsable Analyse Threat Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/5636e3e5276b952facbd0aadb12a858a","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","caption":"Admin"},"url":"https:\/\/www.intrinsec.com\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/218155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=218155"}],"version-history":[{"count":0,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/218155\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=218155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=218155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=218155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}