The SITE III contract features decentralized ordering, and is designed as a flexible and responsive end-user solution with acquisition streamlining advantages. Manually acquiring data from known web sources can be tedious, labor intensive, and difficult to apply consistently over long periods of time, yet purely automated methods in classifying data can suffer from significant bias or misclassification. Insurance companies use NAICS codes to identify customers by industry code. What's New in Cybersecurity?State-sponsored attacks on the rise. A new category of cyber criminals is motivated by politics rather than profit. Automation makes cybersecurity stronger. Monitoring and managing cybersecurity is a time- and labor-intensive process. Trust will erode. At this point both individuals and companies are understandably anxious about cybersecurity. The sort of business operation will direct the sort and cost of. (found out that the answer is NOT A, C) a.It can be ignored until the FAR is updated b.It precedes, When an interim rule is issued, what effect does it have on an acquisition? IAM assessment, strategy, roadmap, and program strategy alignment; IAM steering committee design; metrics and KPIs; solution optimization (on-prem, cloud, hybrid); technology selection. }; Comment * document.getElementById("comment").setAttribute( "id", "a61dc244397b630d328f0f6d35a61107" );document.getElementById("c7105e4970").setAttribute( "id", "comment" ); Save my name, email, and website in this browser for the next time I comment. Unique Entity ID: VGCPMJFD1NN5 in transforming your cybersecurity program. Electric Subcontracting reporting System (eSRS) Dynamic. Learn more about how you can engage with OS AI here. The security risks are too great, and the objectives are too important to rely on obsolete technology and methodology. The first two digits designate the economic sector The third digit designates the subsector NAICS codes classify the economy into 20 sectors, which are separated into 99 3-digit subsectors, which are divided into 311 4-digit industry groups, which are further subdivided into 709 5-digit industries, and finally disaggregated into 1057 6-digit U.S. industries. This site requires JavaScript. Data Source: SAM, NAICS NAICS codes are selected by the company to best depict their primary business activity. the scope of this task order covers engineering support for cyber situational awareness (sa),cyber command and control (c2), mission assurance, and homeland defense. Virginia. Description: a40 cyber assurance. With our Hybrid Delivery offering, one of our flexible service delivery models, our resources are confirmed on-site or off-site. The North American Industry Classification System (NAICS) code for cyber security consulting is 541519. WebLeidos Cyber Inc. Foxboro, MA, 02035 US. Necessary cookies are absolutely essential for the website to function properly. Only cyber events with a specific identified victim are included. A script written in the Python programming language was developed by CISSM to query a list of known websites, each of which linking to individual entries, articles, and/or subpages that are candidates for inclusion in the CISSM cyber events database. Analytics cookies allow us to better understand how users interact with our website, which can help us to determine how we can improve our services to our users. SITE III Intelink website. Transportation Security and Screening Equipment Solutions, HSPD 12, FIPS and FICAM Enterprise Services, Personnel and Access Control Security Solutions, Enterprise Video Deployment and Management, CONUS & OCONUS Deployment and Installation, System Commissioning, Testing and Certification. Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. CNAP is powered by and built entirely on GCP and Chronicle, Googles security analytics offering. Risk-based certifications and access reviews; role- and attribute-based access controls (RBAC/ABAC);segregation of duties policy and protocols. Targeted Business Lists End of preview. You will receive mail with link to set new password. 541512 => Computer Systems Design Services The security of your operations demands adaptability and innovation. Cyber security.docx - 1 RUNNING HEAD: CYBER SECURITY TITLE NAME (without titles) INSTITUTION 2 RUNNING HEAD: CYBER SECURITY NAICS Code Introduction The. Data Source: FPDS, CURRENT SOCIOECONOMIC STATUS The Socioeconomic Designation data is provided by sam.gov. Research and development in the social WebNAICS and PSC Codes Served | Cybersecurity Consulting | I2TSME - Global North American Industry Classification System (NAICS) Codes and Product Service Codes WebNAICS Code: 561621 Security Systems Services (except Locksmiths) | NAICS Association NAICS Code Description 561621 - Security Systems Services (except Locksmiths) Top Its really great knowing that you have an expert at your disposal to help you through any questions or concerns that you might have around your cybersecurity., The detail, the statement of work that we got, we knew exactly what we were expecting, and they let us know exactly what they were expecting from us. The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". Select all that apply It can be ignored until FAR is updated It precedes the issuance of a final proposed FAR Rule and is, Which of the following items when put together form a legal framework that dictate the steps of the contracting process for acquistitions? All linked entries/articles are included in a daily deduplicated file to be reviewed by a researcher, who makes final judgements as to whether events are valid members of the dataset. Necessary cookies are absolutely essential for the website to function properly. The cookies is used to store the user consent for the cookies in the category "Necessary". What, When an Interim Rule is issued, what effect does it have on an acquisition? To cover these, extraordinary digital dangers through protection requires the buy of an exceptional digital, obligation strategy. Privileged account identification and dispositioning; account vaulting and credential rotation; privileged session management and monitoring; secrets management, DevOps andDevSecOps; third-party privileged account access. What Types of Jobs Are Available in Cyber Security With A Criminal Justice Degree?Government Jobs: Cyber Security in the Public Sector. One of the biggest areas of hiring for cyber security and criminal justice professionals is the public sector.Corporate Security Policy Oversight. Cyber Crime Investigation Services. Cyber Crimes Have Created a Robust Market for the Right Professionals. 541611 => Administrative Management and General Management Consulting Services Effects are broadly defined as disruptive events when the goal of the threat actor is to impact the availability or integrity of the victims systems, and exploitive events when the goal is the collection of information from the targeted organization. 561621 - Security Systems Services (except Locksmiths] More Companies in this Industry. CISSM has made descriptive information freely available to the public. This comprehensive, human-led and machine-driven security-as-a-service operation supplies the people, process, and technology needed to manage cybersecurity risks, detect threats and respond to incidents in real-time. Include the following information with your request: full name, company, role, Government email address (must be .mil or .gov), and telephone number. Driven by a robust and comprehensive set of authoritative and trusted data sources, the OS.ai tool is intended to help government and industry leaders find the right partner to help deliver on the important missions of the Federal government. 541690 => Other Scientific and Technical Consulting Services follow-on to n00178-14-d-7758/0002 (info reliance corp.). Type: Describes the intended end effect by utilizing the CISSM taxonomy of cyber effects[1]. Each digit in the code is part of a series of progressively narrower categories, and the more digits in the code signify greater classification detail. This is broken down by NAICS codes associated with obligated funds. This cookie is set by GDPR Cookie Consent plugin. The dataset contains structured information across several categories and is now available to researchers and industry partners. SBA uses a five-year average to calculate a companys average annual receipts. Location - Details the country or countries in which the target resides based on the published source. Course Hero member to access this document, University of Maryland, University College, Security Plan Recommendation Memorandum .docx, Appendix A Security Models Summary (CMP 610).docx, CMP 610 - Appendix A Security Models Summary - Cleber Visconti.docx, University of Maryland, University College CMP 610, Defense Acquisition University CON 200, Acquisition & Procurement Risk in the Cybersecurity Industry (1).docx, Kurukshetra University Directorate of Distance Education, Grand Canyon University MANAGEMENT 181, University of California, Berkeley UGBA MISC, Havana High School ECOCNOMICS 102, 204, Kurukshetra University Directorate of Distance Education IT 700, Utilizing comparative advantage can best be exemplified as A your lawyer word, 48 The shortest path to obtaining your class 4 licence requires the operator to, 17 On June 11 th 2008 a roadside bomb killed three Peshmerga soldiers in the, Fundamentals of Analytical Chemistry 9 th ed Chapter 20 10 Fundamentals of, Question 19 of 26 Question ID 1374276 During 2004 Nancy Arnold received an, a Place the child on his side b Take the childs blood pressure c Stabilize the, on of server room 2 Use Safety cloths and masks prevent from radiation 3 Built, grantees signature notice of any liens against the property grantors address You, Portion control is important for costing consistency and customer satisfaction, them and only shared one on one via consent and participation of the individual, Which command should you enter to view the error log in an EIGRP for IPv6, Tugas Bahasa Inggris KELAS X (yunita maharani).docx, ALL EXAMS SCHEDULES AND OTHER DEADLINES WILL BE STRICTLY ENFORCED There will be, Universal Concrete Particular Abstract CONCEPT Early Creation Stories 14, Electronics Final Exam - Summer Semester 2009.docx, The award process involves a series of tasks such as completing the determination of responsibility, small business preaward notice, contract action report (CAR), and contract distribution. Please be aware that some organizations may be listed under certain contract vehicles with different information that was accurate at the time of award. About Us Number of Bidders: 2 Award ID: N0017822F3015 Referenced IDV ID: N0017819D8424 RFP ID: N0017821R3022 More here. Our cyber experts support the worlds largest banks, gaming companies, and utility providers, offering customized and flexible solutions. You may also use the search function to locate specific organizations with this experience or click on the agency acronym. The dataset chiefly records individual cyber events where a discernible effect was achieved by the threat actor (e.g. Email Address: Contact Name. Hitting Submit will Take you to the Appropriate Page on our Site that addresses your needs. WebNAICS Code: 928110 National Security | NAICS Association NAICS Code Description 928110 - National Security Top Businesses by Annual Sales for 928110 Click for Joiner/mover/leaver policy and procedure; automated provisioning and deprovisioning; access request and approval policy and workflow; third-party user lifecycle. WebThe Keyword Search now shows results for 2022 NAICS codes. Referenced IDV ID: N0017819D8424 responsiveVoice.speak("Awardee Name: RITE-SOLUTIONS, INC. Phone:301-405-6330| Fax:301-403-4675, Learn more about Want to read all 5 pages. SITE III is designed to provide information technology support to mission partners across the Department of Defense and the National Geospatial-Intelligence Agency. The Solutions for the Information Technology Enterprise III is DIA's third consecutive indefinite delivery, indefinite quantity contract to address the evolving information technology requirements vital to U.S. security. The NAICS business codes characterize foundations taking, into account the exercises in which they are fundamentally locked in. All of this information is included in a single row of two comma-separated values (.csv) files that are added to the users machine by the script. Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. ", "UK English Female"); Harry, C., & Gallagher, N. (2018). These are cookies that have yet to be defined in our system. Journal of Information Warfare,17(3), 17-31. Given the difficulty in attributing cyber events, many events are marked as Unknown.. The NAICS under which Peak InfoSec is registered in CCR are: Recent Posts The main reason that cybersecurity doesnt have a dedicated NAICS code is that the NAICS system is production oriented in which producing units that use SBA Size Standards, Data Append Services Classifying Cyber Events. Also, the code for cybersecurity is 2364. Cyderes SIEM & SOAR practice takes a tailored, collaborative approach to laying out and executing a plan for moving client SIEM andSOAR environments towards a gapless, highly mature security footprint. Codes. SIC Code Appends SITE III facilitates worldwide coverage for integrated IT intelligence requirements and technical support services to DIA and National Geospatial-Intelligence Agency. 518210 => Data Processing, Hosting, and Related Services For example a telecommunications company is coded with NAICS code 51. Stronghold Cyber Security is a veteran-owned cyber security company located near historic Gettysburg, Pennsylvania that provides cutting-edge security services to businesses throughout the country. These cookies will be stored in your browser only with your consent. 12500 Fair Lakes Circle, Suite 125Fairfax, VA 22033, Tel: (703) 227-0900Fax: (703) 227-0910Email: info@mandex.com, Electronic and Physical Security Solutions, Programmatic, Technical, and Engineering Management, AC36 R&D- Defense System: Ships (Management/Support), AC66 R&D- Defense System: Electronics/Communication Equipment (Management/Support), D302 IT AND TELECOM- Systems Development, D307 IT AND TELECOM- IT Strategy And Architecture, D310 IT AND TELECOM- Cyber Security And Data Backup, D316 IT AND TELECOM- Telecommunications Network Management, 334111 Electronic Computer Manufacturing, 334112 Computer Storage Device Manufacturing, 334220 Radio and Television Broadcasting and Wireless Communications Equipment Manufacturing, 334290 Other Communications Equipment Manufacturing, 334310 Audio and Video Equipment Manufacturing, 334412 Bare Printed Circuit Board Manufacturing, 334413 Semiconductor and Related Device Manufacturing, 334418 Printed Circuit Assembly (Electronic Assembly) Manufacturing, 334419 Other Electronic Component Manufacturing, 334511 Search, Detection, Navigation, Guidance, Aeronautical, and Nautical Systems and Instrument Manufacturing, 334512 Automatic Environmental Control Manufacturing for Residential, Commercial, and Appliance Use, 335931 Current-Carrying Wiring Device Manufacturing, 335999 All Other Miscellaneous Electrical Equipment and Component Manufacturing, 336413 Other Aircraft Parts and Auxiliary Equipment Manufacturing, 336419 Other Guided Missile and Space Vehicle Parts and Auxiliary Equipment Manufacturing, 336992 Military Armored Vehicle, Tank, and Tank Component Manufacturing, 423410 Photographic Equipment and Supplies Merchant Wholesalers, 518210 Computing Infrastructure Providers, Data Processing, Web Hosting, and Related Services, 541330 Engineering Services (except Military and Aerospace Equipment and Military Weapons), 541511 Custom Computer Programming Services, 541512 Computer Systems Design Services, 541513 Computer Facilities Management Services. Yet, it is difficult to make strategic decisions about how to invest scarce resources without an understanding of what types of cyber threats are most common in a specific industry or critical infrastructure sector and what their effects might be. I want to make sure that our companies are more secure and that were putting the right technologies and the right partnerships in place to make sure that when these things happen, you can respond immediately.. Cyderes has been a great partner of ours, and its not just an annual you guys show up and do your security assessment; its an ongoing relationship., We want to share everything that happened to us so people can defend and look, the more that companies work together to share information and we share over security data.the safer we arll are. CNAP provides comprehensive threat detection, investigation, and workflow along with rich reporting for compliance use cases. Our cloud-native security service provides complete protection for an organizations infrastructure, applications and data running in the cloud whether it uses AWS, GCP, Azure or a combination of those environments. The digital risk stays troublesome for insurance financiers to evaluate due, in substantial part to an absence of actuarial information. Listen to Story By using this website, you agree to the OrangeSlices, 25 Defense Health Agency/MHS focused 8(a) Small Businesses drawing attention as we enter 2023, Freshly Picked: Three New SDVOSB Joint Ventures to pay attention to, especially if you focus on VA, Federal Health, or DOD, 15+ US Coast Guard focused 8(a) Small Businesses and/or 8(a) STARS III Primes drawing attention as we enter 2023, 25 2023 RFP/RFQ Targets at SEC, CFTC, CFPB, EXIM and FTC drawing interest, OS AI Resource: Grading the Federal Agency Opportunity Forecasts for fiscal year (FY) 2023, Contract Vehicles Reign King: Several notable IDIQs that quietly changed hands in FY 2022, Contract Award: $25M Navy MARMC SBIR Phase III Score, Contract Award: $123M Navy Defense Health Readiness Engineering Support. 541513 => Computer Facilities Management Services NAICS Codes Main Categories NAICS Codes Drilldown List NAICS offers five levels of detail. Date - The date that the cyber event occurred. general risk scope to shield the business from harm or any type of damage to the property. The SITE IIIIDIQcontract supports classified and unclassified programs on multiple security domains. Computer Systems Design and Related Va. Dept. Program Manager: Maj. M. Gaby Maldonado, USAF, An official website of the United States government, SOLUTIONS FOR THE INFORMATION TECHNOLOGY ENTERPRISE III, COMMITTED TO EXCELLENCE IN DEFENSE OF THE NATION, Joint Military Intelligence Training Center, Hosted by Defense Media Activity - WEB.mil. Lost your password? Our Cloud Security practice helps clients assess their cloud security maturity and develop a strategy for closing the gaps between their current state and their desired target state, as well as developing and deploying secure cloud architectures. RFP ID: N0017821R3022. 541618 => Other Management Consulting Services Organizations that cannot be categorized under a specific NAICS code were not included. Entities. Our Hybrid Delivery model acts as a dedicated extension of your team. Get tips to protect your business against MageCart attacks this holiday. Actor - Identifies a person, entity, or organization that takes credit for a cyber event, is attributed to the event from an official source, or is otherwise confirmed to have carried out the event by private sector security vendors. The script parses out the date published, title, URL, and a short preview of the entry/article text. NAICS is mainly, oriented to production and classifies organizations with others that have comparable, Most organizations are acquainted with their business protection arrangements giving. The Federal IT POC data is provided by sam.gov. This category only includes cookies that ensures basic functionalities and security features of the website. It is difficult to make strategic decisions about how to invest scarce resources without an understanding of what types of cyber threats are most common in a specific industry or critical infrastructure sector and what their effects might be. It does not store any personal data. The cookie is used to store the user consent for the cookies in the category "Performance". Cybersecurity firms fall under the For access, contact the SITE III program management office at SITE_III_PM@dodiis.mil. The Python script makes use of the csv, datetime, and urllib internal Python libraries, as well as Beautiful Soup 4, an external library that facilitates the bulk of the data extraction. The North American Industry Classification System (NAICS) is the standard used by Federal statistical agencies in classifying business establishments for the purpose of collecting, analyzing, and publishing statistical data related to the U.S. business economy. We concentrate on securing your organization, so you can focus on your business while we handle your threats. It employs 51-100 people and has $1M-$5M of revenue. Section 1 Credit Calculation. New dates will generate a separate file. Threat actor motives are classified into five categories: Cyber Crime (acts that are considered criminal in the United States), Cyber Espionage (acts with the intent of uncovering sensitive information), Cyber War (acts intended to cause harm to an adversary, including nations and groups), Hacktivism (acts intended to draw attention to a social or political cause), or Demonstrative (acts that generally demonstrate personal capabilities of the actor). listenButton1.onclick = function(){ What system should you use? Data Source: GSA and FPDS, SBA SIZE STANDARD Size standards define the largest size a business can compete under for contracts set aside for Small businesses. The data for each website is then returned in HTML format to the script for processing. Sitemap Classifying Cyber Events. We recommend keeping these cookies enabled. The 10-year SITE III IDIQ contract provides a centralized and synchronized IT acquisition capability to meet worldwide security requirements and technical support services through system design, development, fieldingand sustainment of global intelligence and Command and Control assets. DIA'sChief Information Officeis responsible for program management and technical oversight of the basic contracts. The majority of entry-level cybersecurity jobs do not require coding skills. However, being able to write and understand code may be necessary for some mid-level and upper-level cybersecurity positions that you will become qualified for after youve built a few years of experience. A gold level listing enables the owner to provide alternate contacts, these will be displayed as a larger font for your convenience. Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors. By Submitting This Form, you agree to let us Collect your information in accordance with our. The description for the NAICS Code 928110 - National Security is: This Industry Comprises Government Establishments Of The Armed Forces, Including The National Guard, Primarily Engaged In National Security and Related Activities. responsiveVoice.cancel(); NAICS codes are, likewise utilized for managerial, contracting, and assessment purposes. The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. Industry Utilizes the 2-digit North American Industry Classification System code associated with the victim. WebSIC Industry Description Industry: 7382Security Systems Services Establishments primarily engaged in monitoring and maintaining security systems devices, such as 541511 => Custom Computer Programming Services Let us know below. NAICS Code Primary Description. Research and development in the physical, engineering, and life sciences (except nanotechnology and biotechnology) 541720. Each entry is reviewed by another member of the team and then accepted for addition to the deployed dataset. Data collection infrastructure; case management (open, assign, remediate, close);decision processing (normal vs. anomalies, policy-driven, AI/ML); alert management. Total Contract Value: $77,052,868.00 We utilize a structured taxonomy developed at CISSM and published in the Journal of Information Warfare. Falls This code includes businesses that provide advice and guidance on protecting computer networks and systems from unauthorized access or theft. These fields include: Source - The URL link to the published article or source describing the event. I mean, we need to do our part. Copyright OrangeSlices AI 2022. WebNAICS Codes that fall under 5415 - Computer Systems Design and Related Services. Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet. We also use third-party cookies that help us analyze and understand how you use this website. US Business. Number of Bidders: 2 Insurer repay by depending on. These cookies ensure basic functionalities and security features of the website, anonymously. A Government-issued Common Access Card is required to access the website. 557 National Security; 300 Federal Law Enforcement; 391 Federal Financial Services; 846 NAVSEA HQ Description: a40 cyber assurance. If no date is available, then the date the article was published is used as an approximate date. There exists a number of smaller niche repositories, news sites, and blogs that catalog cyber events, yet the data is often not well structured or consistently coded to distill larger analytic insights. [1] Harry, C., & Gallagher, N. (2018). At present we do not use ads on the site, so feel free to disable these cookies. This website uses cookies to improve your experience while you navigate through the website. Course Hero is not sponsored or endorsed by any college or university. *NEW* CISSM Cyber Events Database, For more information about the CISSM Cyber Events Database, please contact Dr. Charles Harry at, Center for Governance of Technology and Systems. NAICS Codes 561621 Security Systems Services (Except Locksmith) 238210 Electrical Contractors & Other Wiring Installation Contractors. Dates are listed in DD-MM-YYYY form. As the private and public sectors grapple with the multi-faceted problem of cyber security, they lack basic tools needed to make strategic decisions about prevention and response. The services and capabilities supported by the SITE III contract provide responsive, flexible, adaptiveand timely solutions to satisfy current and future IT requirements. Number of Employees * NAICS Code/Industry Description Desired Insurance Limit Have you previously had a cyber insurance claim or any knowledge of a circumstance that could lead to a claim within the past 5 years? hacker). This field is for validation purposes and should be left unchanged. Sub-Type - Describes the specific end effect sub-group as defined in the CISSM taxonomy of cyber effectsavailable here If there are multiple effects of the event, it may be classified into multiple sub-groups. Data Source: SAM and NAICS.com, 511210 => Software Publishers Five classifications are used: Nation State (a individual or group that is a part of or used by a sovereign nation), Criminal (an organized individual or group with the intent of committing a crime for clear personal gain), Hobbyist (a mostly unorganized individual or group working for exploration or amusement), Hacktivist (an individual or a group that is working towards a political or social aim), Terrorist (organized groups who may or may not claim statehood who pursue destruction for political aims), or Undetermined. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc. To facilitate accurate recordkeeping, prevent duplication, and ensure recently added entries are recognized, the script utilizes two different comma-separated values (.csv) files. The CIO-SP4 acqusition is so flawed I do not know how they can fix this. For more information about the CISSM Cyber Events Database, please contact Dr. Charles Harry at charry@umd.edu, Center for Governance of Technology and Systems
follow-on to n00178-14-d-7758/0002 (info reliance corp.). SIC to NAICS Crosswalk The word cybersecurity is made up of two words. Cyber and security. So, when they are combined, it becomes cybersecurity which is two words. Some people think that cybersecurity is one word. It is because it seems like there is only one word when they read it. Researchers or public officials interested in the detailed records or access to the dataset in its entirety should contactDr. Charles Harry at charry@umd.edu. Adopted the new Insurance Data Security Model Law (#668) which requires insurers and other entities licensed by state insurance departments to develop, The Socioeconomic Designation data is provided by sam.gov. Body guard services Guard dog services Guard services Parking security services 5415. Contact us here. City, State, ZIP Code. Company Lookup Tool, Contact Us Currently orangeslices.ai scans a number of Federal government agencies for this data. La Plata, MD, 20646 US. Awardee Name: RITE-SOLUTIONS, INC. Hitting Submit will take you away from our site to the Dun and Bradstreet website, where you can update or create your Company Record for the D&B Database. With our SOC-as-a-Service offering, one of our flexible service delivery models, licenses and resources are all maintained by our team. } SOC-as-a-Service is a complete service solution. Usually indicates a specific organization, entity, or person who was primarily affected by the cyber event. See our roundup of tips to build a cyber safe enterprise during Cybersecurity Awareness Month and beyond. WebCyber Security Research. The cookie is used to store the user consent for the cookies in the category "Analytics". If there are both disruptive and exploitive impacts resulting from the cyber event, it may be classified into both groups. Naics Codes For Cyber Security President Harry Truman established the General Services Administration (GSA) in 1949 to streamline the federal governments Journal of Information Warfare,17(3), 17-31. 541990 => All Other Professional, Scientific, and Technical Services, *Data is provided from multiple government sources and is not the property of orangeslices.ai. Privacy Policy Lead Generation The data is updated monthly and yields information about the threat actor, motive, victim, industry, and end effects of the attack. All Rights Reserved,