Defending the Philippines in Cyberspace with The Teh Group

A unique cybersecurity marketplace providing instant access to a growing catalog of threat intelligence providers, integration partners, and threat analysis tools.
Anomali offers compelling margins, competitive partner support, and new revenue opportunities for partners looking to help their customers boost the efficacy of security infrastructure, improve security visibility and automate operations while saving costs
We believe that creating and investing in an ecosystem of technology partners is imperative in delivering better business outcomes for our customers. Sharing threat intelligence and insights across ISACs, ISAOs, and other communities also depend on this collaboration.
The Anomali Partner Portal is a place to register new sales opportunities and access Anomali resources.
Geoff, I understand that you're currently working for a company called an Anomali as a pioneer in doing cyber intelligence and analysis.
Am I correct?
Yeah.
So it's more about the management of threat intelligence.
JEFFREY TEH: Right.
Because when a nation or an industry decides to benefit from the intelligence of external threats, particularly around cyber, there's just too much information.
So our analysis is basically on all the information.
We actually don't bring much information.
We help validate and narrow down the information such that your nation or your internal analysts know the right information to be working on.
JEFFREY TEH: OK.
You know, like I say, this segment is all about Philippine cyberspace or defending Philippine cyberspace.
In the whole ecosystem of cybersecurity, there's a lot of element.
OK?
There are technical element, operational, management.
And informations are gold right now, data is gold.
Can you walk us through how do you basically plan, or your firm objective to help, I guess, building the cybersecurity space for the Philippine's businesses, law enforcements, or even governments?
So we're an organization on the next phase of security maturity.
So Philippines are a great example of a nation that has already invested well, heavily, and cleverly on defense infrastructure.
And those defense infrastructures are traditional things like firewalls, endpoint detection, email gateways.
And they do two things-- allow traffic or disallow bad traffic.
But with the abundance of badness happening in cyberspace, it's very difficult to get correct, valid, precise information to them, because it's a time problem.
Your analysts in the government need to take such a weight of information and refine it, investigate it, correlate it before they present the information to the existing defenses.
And this is what Anomali does.
It uses machine learning and industry partnerships to say out of these billions of indicators of compromise, we've stack ranked it.
And here are the ones that we're 100% confident you should do something with.
And through automation, present those alerts through existing tooling.
So instead of spending a lot of time trying to find this intelligence, they could just tap on your resource then to find a relevant intelligence or resource that they need to determine the track.
Is that how it works?
So the distinction we like to make is that there's a lot of threat information out there, but it's actually not intelligence.
It's not intelligence until you've looked at it through your perspective.
If there's intelligence information about ATM skimming fraud in Finland, and you don't have ATMs and you don't do business in Finland, that's not intelligence.
JEFFREY TEH: That's right.
No.
So through filtering, machine learning, and some education of the system by your government or by their analysts, it's easier to kind of cull out irrelevant traffic.
So in direct response to your question, the information is actually gold when it becomes intelligence.
And we can help fast track that.
Do you see a cybersecurity professional or find it challenging to determine what is the right intelligence and what is not?
Absolutely.
And that's one of our core premise.
So once you make a decision, as the Philippine government through the security cyber defense papers have made that you want to be intelligence driven, you open up the door and big flood of information comes through to you.
So to make those decisions, you need to be educated by your peers.
So what we've also got in the Anomali Threat Platform is a lot of collaboration and sharing.
So a great example of that would be industry.
And another great example of that is nation.
So we're working in another Southeast Asian nation where one of our partners has set up set up a threat sharing community.
JEFFREY TEH: Yeah.
So if all five of us have decided that we're going to start on this, then the pure weight of numbers say that if we collaborate on a specific event, or we look at a specific vertical, then we can share the information because it's public information already.
And if it's going to attack you, it's going to attack me.
They're going to try.
JEFFREY TEH: Right.
So if we can collaborate on our defenses, then that's how we can get to info-- So by hearing what you just say, so you're very committed-- I mean you and your firm Anomali are very committed into providing, I mean, building this community and sharing intelligence not just for the Philippine market, but essentially for Southeast Asia.
Am I right?
Oh, yeah.
Absolutely.
So we've built a very specific platform.
So the sharing industry is largely referred to as ISAC-- so Information Sharing Analysis Center, ISAC.
So we've built an ISAC platform specifically for the purpose of an anchor tenant, typically a government or a central bank, to say we'll take on board this sharing platform.
And we will be trained by Anomali and partner with Anomali on content.
We will then allow freedom of sharing within the network.
Now the network can only consume information.
We can't integrate it with their systems automatically.
But it can actually benefit from threat bulletins and data and then export specific information as allowed by the Central Manager of the ISAC to then defend their department.
JEFFREY TEH: OK.
So, yeah.
So a purpose-built platform for sharing and collaboration which is stood up industry-wide globally.
And specifically within Southeast Asia, we've got two countries that are running a national ISAC.