Summary
In this chapter, we have walked through the various stages of the incident response process, so now you have a good understanding of how to deal with ransomware attacks, at least in general. Of course, we'll keep moving further and further, so you have a more and more detailed understanding.
You have already learned that cyberthreat intelligence is a very important part of incident response, so in the next chapter, we'll discuss it on various levels, focusing on ransomware attacks, of course. We'll look through an open source threat report, and extract various types of intelligence from it, so you have a solid understanding of their differences.