Putting it all Together into Threat-Informed Defense

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:01
welcome to the fifth and final lesson of module three,
00:04
putting it all together and to threaten from defense.
00:10
In this lesson, we will highlight and appreciate how attack helps us make better cybersecurity decisions.
00:20
As we previously discussed,
00:22
cybersecurity is hard,
00:23
but it can be a lot easier when we coordinate, communicate
00:27
and work together towards a common goal.
00:33
And one of the central themes of this module has been not to forget. While we do this,
00:38
particularly
00:40
every action and decision we make
00:42
needs to reflect back to how it's going to improve our ability to defend against our threats and their behaviors.
00:53
As we've shown,
00:54
attack gives us a quantifiable way of understanding, tracking, communicating and addressing what are threats are doing.
01:02
We can use this knowledge to gain strategic and operational advantages
01:06
by identifying and understanding what our adversaries are doing
01:10
and working towards defending it as a community.
01:17
And with that, we restart knowledge check for less than five
01:21
threatened from defense involves
01:23
please positive video and take a second to select the correct answer before proceeding.
01:33
In this case, the correct answer was E
01:38
threat. Informed defense
01:38
involves the people processes in any other action or decision,
01:44
it truly is a team effort.
01:49
And with that, we reached the end of less than five
01:52
in summary
01:53
attack.
01:55
Specifically through our understanding of threats and their behaviors
01:57
can help us make and communicate threatened, formed and better decisions across all aspects of cybersecurity operations.
02:09
And with that,
02:10
we reached the end of module three.
02:14
In summary,
02:15
we explore the various ways of operational izing the knowledge capture with an attack
02:20
and how this accumulates into the idea of threatened from defense.
02:23
We're applying an understanding of her adversary tradecraft and their behaviors
02:28
to prevent, detect
02:29
and respond to cyberattacks.
02:35
For more great information.
02:36
Definitely check out our attack e book
02:38
as well as don't forget to check out the rest of the miter Attack defender learning courses.
Up Next