-
Q: What is the primary value of Threat Intelligence according to Mandiant?A: To shift from reactive to proactive defense.
-
Q: What are the three types of Threat Intelligence?A: Tactical, Operational, and Strategic.
-
Q: What is 'Attribution' in the context of Mandiant's intel?A: Identifying the specific threat group (e.g., APT29, FIN7) behind an attack.
-
Q: How does Mandiant gather its intelligence?A: Through frontline incident response engagements and global sensor networks.
-
Q: What is the 'Attack Lifecycle'?A: The stages an attacker goes through, often mapped to the Cyber Kill Chain or MITRE ATT&CK.
-
Q: What is the recommendation regarding 'Indicators of Compromise' (IOCs)?A: They are useful for detection but have a short shelf life; behavioral intel is more durable.
-
Q: Who should consume Strategic Intelligence?A: Executive leadership and the board.
-
Q: What is 'Operational Intelligence' used for?A: To guide ongoing investigations and prioritize alerts.
-
Q: What is the role of 'finished intelligence'?A: To provide context, analysis, and actionable recommendations, not just raw data.
-
Q: What sectors are most targeted according to recent trends?A: Finance, Healthcare, and Government.
Ask a question
Have a doubt or need clarification?
I’m here to help. Share your question, and I’ll get back to you with the guidance you need regarding the course.
Thank you!
I have received your message and I shall get back to you shortly.