pdf

DarkReading Mandiant Threat Intel.pdf

Darkreading Mandiant Threat Intel

Presentation covering Threat Intel titled 'Darkreading Mandiant Threat Intel'.

This page contains AI generated content. Errors or omissions may be present. Use human level critical thinking.
  • Q: What is the primary value of Threat Intelligence according to Mandiant?
    A: To shift from reactive to proactive defense.
  • Q: What are the three types of Threat Intelligence?
    A: Tactical, Operational, and Strategic.
  • Q: What is 'Attribution' in the context of Mandiant's intel?
    A: Identifying the specific threat group (e.g., APT29, FIN7) behind an attack.
  • Q: How does Mandiant gather its intelligence?
    A: Through frontline incident response engagements and global sensor networks.
  • Q: What is the 'Attack Lifecycle'?
    A: The stages an attacker goes through, often mapped to the Cyber Kill Chain or MITRE ATT&CK.
  • Q: What is the recommendation regarding 'Indicators of Compromise' (IOCs)?
    A: They are useful for detection but have a short shelf life; behavioral intel is more durable.
  • Q: Who should consume Strategic Intelligence?
    A: Executive leadership and the board.
  • Q: What is 'Operational Intelligence' used for?
    A: To guide ongoing investigations and prioritize alerts.
  • Q: What is the role of 'finished intelligence'?
    A: To provide context, analysis, and actionable recommendations, not just raw data.
  • Q: What sectors are most targeted according to recent trends?
    A: Finance, Healthcare, and Government.

Ask a question

Have a doubt or need clarification?



I’m here to help. Share your question, and I’ll get back to you with the guidance you need regarding the course.

Thank you!

I have received your message and I shall get back to you shortly.