Demetrio Milea4 Principles That Should Define Your Evolving Security Operations ModelI recently had the opportunity to speak at a security conference where I presented the operating models that an organization can embrace…Jul 5, 2020Jul 5, 2020
Demetrio MileaHypothesis in Threat HuntingToday’s threat landscape requires organizations to operate more proactively to keep up with advanced and persistent threats. There is no…Jul 24, 2017Jul 24, 2017
Demetrio MileaThe evolution of a Threat PatternIn an era of agile development and digital transformation, any application is subject to ongoing enhancement and improvement. Indeed…Apr 6, 2017Apr 6, 2017
Demetrio MileaMastering the implementation of a Threat PatternIn previous posts we have discussed two of the most critical phases in the “The Lifecycle of a Threat Pattern”: analysis and design. In the…Jan 30, 2017Jan 30, 2017
Demetrio MileaMulti-layered Analysis of a Threat PatternIf you do not fully know the asset, how can you protect it? This is the first challenge security practitioners face during any activity…Oct 17, 2016Oct 17, 2016
Demetrio MileaContext in Risk-Based Threat PatternsRisks come from various sources that are not always possible to identify and subsequently prevent and mitigate in advance. With the growth…Aug 22, 2016Aug 22, 2016
Demetrio MileaMeasure your Readiness — Threat Intelligence ProgramIn the first part of this series we talked about the journey to undertake building a security monitoring and incident response program…Apr 28, 2016Apr 28, 2016
Demetrio MileaMeasure your Readiness — Security Monitoring ProgramIn the previous post of this series “Measure your Readiness”, I depicted a framework to assess, shape and accelerate a Threat-Driven…Mar 25, 2016Mar 25, 2016
Demetrio MileaMeasure your Readiness — Incident Response ProgramIn today’s threat landscape it is a challenge to prevent the entire spectrum of attack vectors from impacting an organization. This is…Feb 18, 2016Feb 18, 2016
Demetrio MileaFirst principles of a Cyber Threat Intelligence ProgramRecently, as part of the scope in establishing a Security Operation Center for a European telecommunications company, I have been asked to…Jan 28, 2016Jan 28, 2016