Date: 04/09/2024

Vendor: Cybersixgill

Technology/Topic: Threat Intelligence Solution

URL: https://cybersixgill.com

TEM Video (milTube): https://www.milsuite.mil/video/watch/video/68543

______________________________________________

DoD365-J Microsoft Teams Link: https://go.disa.mil/disa-em-tem

Dial-In: +1 410-874-6749 (Odenton, MD)

Phone Conference ID: 448 385 868#

______________________________________________

Welcome to the Technical Exchange Meeting (TEM)!

Amid heightened global uncertainties and rapidly evolving threats, cybersecurity experts at federal agencies need faster, easier access to more complete, transparent, and actionable threat intelligence. It can oftentimes be a challenge to collect and extract intelligence from where threat actors communicate and stage their next attacks, such as on encrypting messaging platforms (Telegram), and hard to penetrate and maintain access to deep and dark web sources.

Through automated extraction, processing, and data enrichment, Cybersixgill eliminates the slow and manual analysis that hampers traditional intelligence collection, removing chokepoints and intelligence gaps. Analysts can maintain covert investigations on the deep and dark web with a trusted, safer, and more efficient approach. Recognizing the uniqueness of each mission, Cybersixgill provides the raw intelligence collected directly from the source.

This enables our current federal agency partners, including the Department of Homeland Security’s CISA AND HSI agencies, with different missions to leverage a variety of use cases, including but not limited to tracking e-crime threat actors,  preventing data theft, combating ransomware and malware threats, identifying vulnerabilities utilized by cyber criminals, strengthening incident response, supporting cybercrime investigations, and hunting threats.

Cybersixgill’s capabilities includes:

• Unlimited investigation capabilities – no limitations on access to data, no limitations on number of queries, immediately query billions of intel items at your disposal, and access to historical data even if a source has been shut down and no longer available

• Full Data Source Transparency: All intelligence is linked to underlying data sources (URL included) and access to the raw data is available for investigation teams to validate and conduct further investigations to prove the chain of evidence

• Language Capabilities: Automatic language translations on the fly, in addition to full access of raw intelligence in source language, including for Russian, Arabic, Spanish, Chinese, etc

• Image Analysis: Automated analysis of every image OCR (Optical Character Recognition) technology, extracting text from images, and enabling analysts to search for intelligence even if it’s mentioned inside visual content.

• Case Management System: Efficient Case management allows for collaboration among teams, building investigation files, and exporting data for internal digestion and sharing

• Generative AI Capabilities: Trained on real-time CTI data, Cybersixgill IQ delivers strategic, tactical, and operational outputs including context-rich answers to human language questions and high-level summaries of complex threat intel items

• Flexible Intelligence Consumption – With an investigations portal (UI), out-of-the-box integrations for existing cyber tools, and direct API access, intelligence data is delivered according to the requirements of each unique mission and environment     

______________________________________________

To join the DISA TEM mailing list, please contact: disa.tem@mail.mil

______________________________________________

Disclaimer:

— TEMs do not serve as a marketing venue or request for proposal actions.

— TEMs shall not be interpreted as a commitment by the Government to issue a solicitation or ultimately award a contract.

— TEMs do not serve as an endorsement of any presented technologies or capabilities

— Presentations will not be considered as proposals nor will any awards be made as a result of a TEM session.

— TEMs are public open forums – no proprietary or sensitive information should be presented during TEM sessions. Only publicly facing content is permissible in DISA TEM sessions. 

The owner of this website has made a commitment to accessibility and inclusion, please report any problems that you encounter using the contact form on this website. This site uses the WP ADA Compliance Check plugin to enhance accessibility.