Survey about adversary intelligence
The aim of these questions is to help us provide insights into a range of backgrounds, and talks about the topics, investigate how these influence the current threat landscape. This allows us to provide you with more detailed advice on how to mature cyber threat intelligence.
Sign in to Google to save your progress. Learn more
how would you rate giving insights about top techniques threat actors use?
low
medium
high
effort
valuable
difficult
waste of time
Clear selection
please rate how valuable Threat Actor Techniques are in terms to prevent new threats
low
medium
high
effort
valuable
difficult
waste of time
Clear selection
how would you rate threat profiles knowledge base?
low
medium
high
effort
valuable
difficult
waste of time
Clear selection
what is the usage do you give to APT analysis and TTP extraction?
Clear selection
how would you rate graph data nodes and links from the threat Actors ( Group -> Group Tools -> Group Tool Technique -> group vulnerabilities) ?
low
medium
high
effort
valuable
difficult
waste of time
Clear selection
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy