Summary
In this chapter, you learned about the various threat actor types, uncovered some of the most damaging real-world cyber-attacks and how they were performed, and looked at the importance of the MITRE ATT&CK Framework, which provides a detailed profile of the typical cyber attack stages, and the applicable TTPs, with which organizations can learn better about the way threat actors operate, thus being better informed on how to bolster their cyber resilience.
In the next chapter, we will look at how we can identify and assess organizational weaknesses.