all right. So he finally made it to the end of the course. And I just wanted to do a quick recap on the different sections that we covered
in the hopes that it might spark you to, uh, take some of your research into a different direction
and hopefully find some new resource is that are truly useful.
We started off with the threatened trip, their intelligence maturity model,
much like the capability maturity models that you may already be familiar with. Then we moved on to
a little bit of insurance, interesting information about campaigns and some open source threat intelligence tools that are available
tools that can let you do analysis of domains links.
Looking at malware itself, we touched on visual ization of your information and the aggregation of intelligence and then wrapping up that module with what it means actually be
analyzing a campaign. And how is that determined
what kind of communications are required in order to get the right information in front of the right people
to continue and further that type of research than a model three. We touched on sharing
operational threat intelligence
and some of the challenges here, like where's your information actually kept. How do you distinguish between the requirements to do sharing a tactical basis versus an operational basis
and then working up to a strategic level of sharing, which is the longest time line?
And that the organization would be considering for this type of activity?
We also touched on several different tools
that I have many cases. Free resource is available and then finally wrapped up with the analysis of the Strategic Threat Intelligence
first going into some of the ways that our minds may fail us by creating logical errors or
a cognitive bias. And then the remainder of the chapter was dealt was dealing with attribution,
some of the human aspects of doing this kind of work, some of the mistakes that we can make
the challenges of attribution in a
a nation state context and then finishing with
requirements for doing a strategic review
of your capabilities in order to create an active defense trying to better understand who who produces in Tallinn, who consumes it,
and overall focusing on making incremental improvements to the overall process. So hope you enjoy the course
and this is polymath signing up. Thank you