This report maps internal security posture against the industry based on the threat intelligence research including both internal and external sources of information.
The title page defines the name of the Threat or the Attack.
Table of Contents
Standard Table of Contents to allow for easy navigation of the report.
One page overview of the key findings and recommendations presented within the report.
Sources of Intelligence
Identifies and list all sources of intelligence that the report utilizes, including both internal and external sources.
Explains likelihood of being a target of similar attack(s) and/or evidence of similar attacks already in motion.
Vulnerabilities in the field and how the monitored entities fare against those.
Relevant zero-days and how they affect the monitored estate.
Topics of interest in the Press related to key security areas followed by a brief assessment of how monitored estate fare against those.
Updates on any open data breach – data classified on what information.
Geolocation-based Incident Profile
Specific Business Units impacted (if any), service impact and what severity specific to the corresponding segment of the monitored estate.
Emerging Friendly Tools, Technologies and Techniques
A brief account of emerging technologies and techniques that support efforts to maintain and continuously improve the security posture, e.g. an improvement in the detection capabilities due to a new to a market technology start-up.
Emerging Adversary Tools, Technologies and Techniques
A brief account of emerging technologies and techniques that pose a threat to efforts to maintain and improve the security posture, e.g. an improvement in the attack capabilities of a known adversary due to their access to certain tools, technologies or enhanced skills capability.