Sarah SantucciWeek 5: Threat Modeling (2.0)Threat modeling starts by assessing the value and identifying potential hazards. Author Adam Shostack argues that threat modeling is in…4 min read·Dec 23, 2022----
Sarah SantucciWeek 5: Threat ModelingThreat modeling starts by assessing the value and identifying potential hazards. Author Adam Shostack argues that threat modeling is in…4 min read·Dec 10, 2022----
Sarah SantucciWeek 4: CTI SharingWhat is Cyber Threat Intelligence Sharing? What is an ISAC and how is it beneficial to an organization? Choose an ISAC that represents your…4 min read·Nov 28, 2022----
Sarah SantucciWeek 2: CTI in the SOCHow can Cyber Threat Intelligence be used to inform SOC Operations?3 min read·Nov 27, 2022----