Threat Perspectives From a consulting and a financial services view Jacky Fox & Gina Dollard Threat perspectives Author name her l ca cti Ta Immediateuse use Long Longterm term Immediate use S use tra te gic What is Cyber TI and how can you use it? Attacker methodologie s and tactics. Architects and Admins Details of specific incoming attacks. Defenders Indicators of specific malware. SOC staff Op er ati o na l HighLevel Level High High Level Te ch