30 Smartest Companies of the Year 2021
CIO Bulletin
Digital technologies lie at the heart of nearly every industry. The automation and greater connectedness they afford have revolutionized the world’s economic and cultural institutions — but they’ve also brought risk in the form of cyber-attacks. Threat intelligence is knowledge that allows you to prevent or mitigate those attacks. Rooted in data, threat intelligence provides context — like who is attacking you, what their motivation and capabilities are, and what indicators of compromise in your systems to look for — that helps you make informed decisions about your security.
BTB Security provides an extensive range of services for information security and digital forensics. Its services encompass all aspects of information security and computer forensics – penetration testing to digital forensic investigations. Each member of BTB Security is trained in industry accepted best practices to protect their customers and to conduct themselves in a professional and ethical manner. Quality control and accountability is paramount to BTB Security. The company and its people work hard and take pride in the work and their company. When you engage BTB Security to achieve your goals, you are entrusting us with very important tasks or projects.
Revolutionary Cybersecurity and Threat Detection Products and Services Offered
BTB Security's Minefield: Designed to identify adversaries on endpoints, it is a series of behavioral indicator “traps” set along various phases of an attack. By creating various behavior indicator patterns on endpoint operating systems, Minefield serves as a warning system for potential anomalies triggered by adversaries or compromised accounts by interacting with operating systems or software on the endpoints. Minefield not only incorporates current tactics and techniques from the MITRE ATT&CK framework, but it also focuses on core operating system and third party software patterns to pinpoint potential malicious behavior patterns. Minefield covers a wide variety of core operating system processes, including but not limited to popular built-in binaries, commonly referred to as LotL (Living off the Land) binaries and development tools leveraged in BYOL (Build Your Own Land) tactics. Minefield does not leverage traditional IOCs such as hash values and IP addresses; instead, it relies on behavior patterns of users and processes on the endpoints. This approach was selected because traditional IOCs are too easy to modify unlike tactics and techniques used by adversaries.
Threat Assessment Services: Threat assessments aid companies by proactively staying in line with information security requirements and best practices. Every organization should be performing regular testing, but most do not have the resources, knowledge, independence or time to do so. Leverage its experienced team to identify and eliminate weak points within your infrastructure to improve your overall security posture. The penetration tests help assess, identify, and minimize (or eliminate) specific vulnerabilities within your security infrastructure. Using ethical hacking, they attempt to infiltrate your organization based on predetermined parameters. The tests demonstrate susceptibility to attacks, and they inform which other specialized threat assessments might be needed to strengthen your security posture. Its experienced team performs targeted testing to assess specific aspects of your infrastructure or application and identify opportunities for improvement.
Incident Response and Forensics: The company expertly analyzes digital evidence using special software, techniques, and procedures. They can reliably determine common factors that are considered in digital investigations. They can deploy resources to capture evidence or seized evidence may be shipped to us for examination. They perform a thorough analysis and provide a detailed report outlining their process and findings to help support investigations that rely on such evidence. The company also conducts forensic analysis of evidence for civil and criminal cases, investigation of company computers to determine employee activity, and preparation of electronic discovery requests.
The Ardent Visionary behind the Success of BTB Security
Ron Schlecht, Jr. is the Founder and Managing Partner of BTB Security. He uses his background in law enforcement, information security, and forensics to help organizations shield their assets, customers, and employees against security breaches. Ron believes in going beyond the basics to develop and deliver unique services that protect and bring true business value to BTB’s diverse customer base. A frequent speaker at industry events, Ron constantly studies IT trends and developments to determine how every ‘next big thing’ in IT will affect BTB and their customers.
Before devoting his work fulltime to BTB Security, Ron developed and lead professional service teams by architecting and driving security organizations as a CISO at firms such as Ernst & Young, Black Rock, and KPMG. He is a certified CISSP, CCE, and is affiliated with InfraGard Philadelphia and ISFCE.
Ron holds Bachelor of Science degrees in Computer Science and Criminal Justice from Juniata College in Huntingdon, Pennsylvania—where he continues to serve on the college’s IT Advisory Board.
Banking-and-finance
Artificial-intelligence
Travel-and-hospitality
Management-consulting
Banking-and-finance
Banking-and-finance
Food-and-beverage
Travel-and-hospitality
Food-and-beverage