Institute of Cyber Threat Management

Know thy self, know thy enemy. A thousand battles, a thousand victories. - Sun Tzu

US Cyber Command (REUTERS)

US Cyber Command (REUTERS)


IOCTM is now part of the Cyberthreat Management Xchange, a community dedicated to security data science, security operations, incident and crisis management. ctmx.org provides an intimate private sharing environment. Visit www.ctmx.org for more info and to connect to the community.


CTM vs. Information Security


 Cyber Threat 
Management
 Information
 Security
 Reactive  Preventative
 Observation data
 driven
 Risk, audit and compliance driven
 Operates assuming
 threats will circumvent controls
 Deploys and monitors control effectiveness
Real-time BigData
driven situational
awareness 
Metrics 
Starts where risk management ends  Integral part of risk management 


IOCTM Cyber Threat Management

Observe --> Orient --> Decide --> Act

Observe-->Orient-->Decide-->Act




Current Projects

Cyber Threat Management Framework TM (CTMF)


CTMF is an authoritative, current and global set of cyber threat management practices. Learn more


SIEM Benchmarks 


Sets of benchmarks for Security Information and Event Management (SIEM) to support effective management of cyber threats. Learn more

 

Membership

There are many opportunities with the IOCTM to learn and grow, join the rapidly growing community of your peers. 

 

Join us

Benefits of CTM

  • Early detection of threats
  • Instant recognition of potential impact
  • Faster decision for expedient, damage limiting actions


Who are CTM Professionals?


 Information Security Engineers  Security Operations Center (SOC) Professionals 
 Incidents Response (IR) Professionals  Network Security Analysts
 Information Security Managers  Security Architects
 Cyber Intelligence Analysts  SIEM Engineers
 Threat Analysts  Forensics Investigators


Email: memberadmin at ioctm.org


Privacy and Security

Copyright © 2015 IOCTM, Inc. All rights reserved.