<!DOCTYPE html>
<html>
<head>
        <title>Cyber Threat Hunting Standard Requirements</title>
</head>
<body>
<style type="text/css">#aweber_rem {
              text-align:center;
              font-size:10px;
              color:#333;
              width:600px !important;
              margin:0px auto;
                    font-family:Verdana, Arial, Helvetica, san-serif;
              }
           #aweber_rem a {
              text-decoration:none;
              }
           #aweber_rem a:hover {
              text-decoration:underline;
              }
</style>
<center>
<table cellpadding="0" cellspacing="0" style="font-family:helvetica,verdana,arial,sans-serif; text-align:left; width:600px">
        <tbody>
                <tr>
                        <td style="color:#666666; padding-bottom:5px" valign="bottom" width="400">
                        <div style="font-size:12px; text-align:right"><span style="font-family:verdana"><img align="left" alt="" height="80" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/the_art_of_service_-_we_get_it_transparent_1_1503604503__72937.png" width="200" /></span><br />
                        <span style="font-size:16px"><span style="color:#000000"><em>Join 7-Eleven, Union Pacific and Zara</em></span></span><br />
                        <span style="font-family:verdana"><span style="color:#000000"><strong><span style="font-size:18px">Access Our Best Sellers</span></strong></span><br />
                        <br />
                        <a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/CqzYqalYMrNMokG24b9Hxg/ii6i2yvHp013cJSG0szExw">SUBSCRIBE NOW</a></span></div>

                        <div style="font-size:14px; text-align:right"> 
                        <div style="font-size:12px; text-align:right"> </div>

                        <div style="font-size:12px; text-align:center"> 
                        <hr /> 
                        <p><span style="color:#000000"><span style="font-size:24px"><strong>Cyber Threat Hunting Standard Requirements Toolkit</strong></span></span><br />
                         </p>
                        <span style="color:#000000"><span style="font-family:verdana"><span style="font-size:36px"><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/ahLQ5ZHcO34892F3gCxqQtHQ/ii6i2yvHp013cJSG0szExw"><img alt="" height="50" src="https://artofservice.s3.amazonaws.com/Get_started_button._CB531883441_.png" width="400" /></a></strong></span></span></span></span><br />
                         </div>

                        <p style="text-align:center"><span style="color:#000000"><span style="font-size:20px">Crucial Requirements:</span></span></p>

                        <ul>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">There are two philosophical approaches to implementing cyber security on an intelligent, networked grid: create a checklist of actions to take that address known security problems or prioritize actions based on continually refreshing the answer to the question, What makes my system more secure? Which approach do you take?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Is cyber security protection, detection and response intelligence improved autonomously (e.g., via large-scale machine learning, reinforcement learning) using historical cyber security event data?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">What actions does your organization take that clearly demonstrate to consumers and regulators that your organization has taken anticipatory steps to address cyber security threats?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">What actions can an organization take that clearly demonstrate to consumers and regulators that your organization has taken anticipatory steps to address cyber security threats?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">How effective is your organizations process for using actionable intelligence from external sources ( such as vendor-supplied threat feeds) to predict malicious IP activities?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">How effective is your organizations process for using actionable intelligence from internal sources (such as configuration log activities) to predict malicious IP activities?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Does your organization receive regular intelligence from the Chief Information Officer/Head of Security on who may be targeting your organization, methods and motivations?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">What threats exist to Identity Ecosystems from criminal, civil disobedience or terrorist groups, including the already stated not yet known for engaging in cyber attacks?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">In the past five years, have You experienced a system intrusion, hacking incident, data theft, malicious code attack, cyber extortion threat or denial of service attack?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">When does a cyber threat become real and tangible enough for your organization to stop being reactionary and dedicate sufficient resources and talent to get ahead of it?</span></span><br />
                                 
                                <div style="text-align:left"> </div>
                                </li>
                        </ul>
                        </div>

                        <div style="text-align:center">
                        <p style="text-align:left"><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/ahLQ5ZHcO34892F3gCxqQtHQ/ii6i2yvHp013cJSG0szExw"><img align="right" alt="" height="900" src="https://cdn8.bigcommerce.com/s-ilcoov/images/stencil/1280x1280/products/162387/195753/Cyber_threat_hunting_TKFC__85889.1535924555.jpg?c=2&imbypass=on" style="margin:5px" width="600" /></a>  </span></span></p>

                        <p><span style="color:#000000"><span style="font-family:verdana"><span style="font-size:36px"><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/ahLQ5ZHcO34892F3gCxqQtHQ/ii6i2yvHp013cJSG0szExw"><img alt="" height="50" src="https://artofservice.s3.amazonaws.com/Get_started_button._CB531883441_.png" width="400" /></a></strong></span></span> </span></span></p>
                        </div>

                        <hr />
                        <p style="text-align:center"><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/ahLQ5ZHcO34892F3gCxqQtHQ/ii6i2yvHp013cJSG0szExw" style="font-size: 16px; font-family: verdana;"><img alt="" height="80" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/the_art_of_service_-_we_get_it_transparent_1_1503604503__72937.png" width="200" /></a></span></span></p>

                        <div style="text-align:center">
                        <div><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><span style="color:#000000"><span style="font-size:16px"><strong>To make sure you keep getting these emails, please add service@theartofservice.com to your address book or whitelist us.</strong> </span></span></span><br />
                         </span></span></div>

                        <div style="text-align:center"><br />
                        <span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/CqzYqalYMrNMokG24b9Hxg/ii6i2yvHp013cJSG0szExw"><img alt="" height="200" src="https://artofservice.s3.amazonaws.com/Toolkit_Subscription.png" width="600" /></a></span><br />
                          </span></span>

                        <p><strong>The U.S. Department of Commerce, National Institute of Standards and Technology (NIST) has included</strong> The Art of Service's Cyber Security Self Assessment on their Framework Industry Resources list since The Art of Service's Self Assessment <strong>is deemed qualified, accurate and comprehensive as a Guidance</strong> that Incorporates the Framework:  <a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/sWGceglMEriOBP0cj4utLg/ii6i2yvHp013cJSG0szExw">https://www.nist.gov/cyberframework/industry-resources</a></p>
                        <span style="color:#000000"><span style="font-family:verdana">  </span></span>

                        <hr /></div>

                        <div style="text-align: center;"><br />
                        <span style="color:#000000"><span style="font-size:14px"><span style="font-size:16px">This message was sent to you because you are registered for this newsletter. We respect your privacy. If you no longer wish to receive emails, safely unsubscribe below.</span></span></span>

                        <p> </p>
                        <span style="color:#000000"> </span></div>
                        </div>
                        </td>
                </tr>
                <tr>
                        <td height="3" style="border-top: 3px double #e4e4e4; text-align: center; font-family: Verdana,Arial; font-size: 12px"> 
                        <p> </p>

                        <p>The Art of Service 22B/302 South Pine Road Brendale, Qld 4500 </p>

                        <p> </p>

                        <p><a href="http://zaale.com/unsubscribe/Wy763JeFxE4qMGmhSKRMkAv763BuYMqm5763oGLg5mhclm737S4GXMPll892vRLi9QonSx6n/USYcb2mwW4TN8KykVByKGQ/ii6i2yvHp013cJSG0szExw" >Manage Subscription</a>  </p>

                        <p> </p>
                        </td>
                </tr>
        </tbody>
</table>
</center>
</body>
</html>
<img src="http://zaale.com/t/ii6i2yvHp013cJSG0szExw/J9dyb892892r4VxIWGcw892l7Etw" alt="" style="width:1px;height:1px;"/>