The Inner Workings of Cyber Defenders

Real-life examples of how defenders collaborate to mitigate key threats.


You’ve probably encountered a wave of threat intelligence reports outlining attack campaigns in 2020. Although these reports are helpful, many don’t show you how different teams should work together to detect, respond and mitigate the attacks that threaten their businesses.

We've created a new type of report we break down:

  • Real examples of how individual teams collaborated from L1 and L2 analysts, to DFIR, Threat Intelligence, and Security Engineers etc.
  • The steps these teams took to effectively detect and respond to some of the most persistent threats
  • The techniques used by attackers throughout the incident lifecycle
  • Key recommendations for SOC teams to more collaboratively and effectively respond to threats

We use cookies to optimize your experience, enhance site navigation, analyze site usage, assist in our marketing efforts. Privacy Policy