Threat Landscape Report

Wiki > Threat Landscape Report

This report maps internal security posture against the industry based on the threat intelligence research including both internal and external sources of information.

Title Page

The title page defines the name of the Threat or the Attack.

Table of Contents

Standard Table of Contents to allow for easy navigation of the report.

Executive Summary

One page overview of the key findings and recommendations presented within the report.

Sources of Intelligence

Identifies and list all sources of intelligence that the report utilizes, including both internal and external sources.

Exposure

Explains likelihood of being a target of similar attack(s) and/or evidence of similar attacks already in motion.

Vulnerability Profile

Vulnerabilities in the field and how the monitored entities fare against those.

Zero-day Attacks

Relevant zero-days and how they affect the monitored estate.

News Topics

Topics of interest in the Press related to key security areas followed by a brief assessment of how monitored estate fare against those.

Data Breaches

Updates on any open data breach – data classified on what information.

Geolocation-based Incident Profile

Specific Business Units impacted (if any), service impact and what severity specific to the corresponding segment of the monitored estate.

Emerging Friendly Tools, Technologies and Techniques

A brief account of emerging technologies and techniques that support efforts to maintain and continuously improve the security posture, e.g. an improvement in the detection capabilities due to a new to a market technology start-up.

Emerging Adversary Tools, Technologies and Techniques

A brief account of emerging technologies and techniques that pose a threat to efforts to maintain and improve the security posture, e.g. an improvement in the attack capabilities of a known adversary due to their access to certain tools, technologies or enhanced skills capability.