Building Your Bullet Proof Incident Response Plan

Ari Eitan

Cyber security is constantly evolving, and therefore rife with challenges. Whether hobbyist hackers or state-sponsored threat actors are targeting organizations, internal security operations center (SOC) teams must proactively assemble a robust incident response plan in order to strategically manage and ultimately eradicate attacks.

Security teams at even the largest organizations can be overwhelmed by the large number of attacks that need to be investigated. Meanwhile, sensitive information is at risk of being compromised by the proverbial needle in the haystack: malware hiding in plain sight among false positives.

Malware hiding in plain sight among false positives

It’s critical to accurately detect and analyze these threats. However, discovering and fully understanding attacks continues to be difficult for even the most experienced and well equipped cyber security professionals.

Supercharge your incident response

But what if organizations had a tool in their arsenal that could accomplish all of this quickly as part of their incident response plan?

Now they do, with Intezer Analyze™–the only malware analysis solution to apply code reuse detection.

Powered by Code Intelligence™ technology, Intezer Analyze™ is a malware analysis solution built by incident response professionals for incident response professionals. It easily integrates processes and automations, saving time and simplifying operations, and most importantly, provides an accurate and definitive report on the nature of any current attacks on an organization. Classification is now possible in the same breath, empowering teams to begin remediation efforts immediately. With nearly 70% of organizations reporting malware as the root cause of investigated incidents, Intezer Analyze™ is poised to change the odds for security leaders.

In any organization, removing the massive distraction of false positives is only half the battle. The other lies in capitalizing on available time and staff attention to address attacks before they wreak havoc on businesses. Intezer Analyze™ equips security professionals to do all of this and more, intelligently bolstering defenses and providing immunity against future threats.

Ari Eitan

Ari manages the team responsible for the genetic algorithm behind Intezer’s code genome database. In his role as VP of Research, Eitan leads the company’s malware hunting and investigation operations, analyzing threats and publishing information about new APTs. Eitan began his career as a security researcher for the Israeli Defense Force (IDF). He quickly became Head of the IDF’s cyber incident response team (IDF CERT), honing his expertise in incident response, malware analysis, and reverse engineering. Eitan has presented his research at several government and information security events, including AVAR, BSidesTLV, CyberTech, Hack.lu, Hacktivity, Infosec, IP EXPO, Kaspersky SAS, and the Forum of Incident Response and Security Teams (FIRST).

In this article

Share this article
Recommended Blogs
ASL@Nasdaq blog post cover
5MIN READ

AI SOC Live at Nasdaq: Real conversation about modern security operations

The SOC is broken. Not because of a lack of talent or effort, but because human capacity does not scale. At AI SOC Live NASDAQ, we are bringing together the security leaders who are doing something about it.
blog cover for AI SOC: When to buy and when to DIY
5MIN READ

AI SOC: When to buy and when to DIY

The question worth asking isn't "build or buy?" It's a more precise one. Which parts of this problem are worth your engineers' time, and which parts aren't?
Illustration of multiple risk gauge meters representing varying security threat levels
5MIN READ

AI SOC for teams outgrowing MDR

For teams that have outgrown their MDR, the answer isn’t a better MDR. It’s a different operating model.