{"id":81645,"date":"2024-03-07T04:39:04","date_gmt":"2024-03-07T04:39:04","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81645"},"modified":"2026-04-16T06:26:25","modified_gmt":"2026-04-16T06:26:25","slug":"what-is-cyber-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/","title":{"rendered":"What is Threat Intelligence in Cybersecurity?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81645\" class=\"elementor elementor-81645\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-777bef8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"777bef8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dec9585\" data-id=\"dec9585\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-37810cc elementor-widget elementor-widget-text-editor\" data-id=\"37810cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Threat intelligence is the analysis of data using tools and techniques to generate meaningful information about existing or emerging threats targeting the organization that helps mitigate risks. Threat Intelligence helps organizations make faster, more informed security decisions and change their behavior from reactive to proactive to combat the attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2192c33 elementor-widget elementor-widget-heading\" data-id=\"2192c33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is cyber threat intelligence and why do you need it?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dd2ccb elementor-widget elementor-widget-text-editor\" data-id=\"4dd2ccb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber Intelligence is the knowledge that allows you to prevent or mitigate cyber-attacks by studying the threat data and provide information on adversaries. It helps to identify, prepare, and prevent attacks by providing information on attackers, their motive, and capabilities.<\/p><p>Threat intelligence prepares organizations to be proactive with predictive capabilities instead of reactive for future cyber-attacks. Without understanding security vulnerabilities, threat indicators, and how threats are carried out, it is impossible to combat cyber-attacks effectively. Using cyber intelligence security professionals can prevent and contain attacks faster, potentially saving the cost in the event of cyber-attacks. Threat intelligence can elevate enterprise security at every level, including network and cloud security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ee16c2 elementor-widget elementor-widget-heading\" data-id=\"7ee16c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Does Threat Intelligence Do?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07078c6 elementor-widget elementor-widget-text-editor\" data-id=\"07078c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Threat intelligence helps organizations with valuable knowledge about these threats, build effective defense mechanisms, and mitigate the risks that could cause financial and reputational damage. Threat Intelligence is the predictive capability to defend the future attacks that the organization is exposed to so they can proactively tailor their defenses and preempt future attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-628da23 elementor-widget elementor-widget-heading\" data-id=\"628da23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Who is A Cyber Threat Intelligence Analyst?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fd683f elementor-widget elementor-widget-text-editor\" data-id=\"9fd683f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A cyber intelligence analyst is a security professional who monitors and analyzes external cyber threat data to provide actionable intelligence. These experts triage data of security incidents collected from different threat intelligence sources and study the pattern of attacks, their methodology, motive, severity, and threat landscape. This data is then analyzed and filtered to produce threat intelligence feeds and reports that help management (security officer) in making decisions concerning organizational security. <span class=\"selection-contrast\">Often, these individuals are <\/span><strong class=\"selection-contrast\"><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-threat-intelligence-analyst-ctia\/\" target=\"_blank\" rel=\"noopener\">Certified Threat Intelligence Analysts\u00a0(CTIA)<\/a><\/strong> who come with both the knowledge and skills needed for the job role.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fce7cc elementor-widget elementor-widget-heading\" data-id=\"9fce7cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Threat Intel and the Art of War: Why Knowing Yourself Isn\u2019t Enough<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ff20af elementor-widget elementor-widget-text-editor\" data-id=\"7ff20af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<iframe width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/jeIvfj-fGI4?si=TvjoYB-IAbUhuFa-\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-062d9fc elementor-widget elementor-widget-heading\" data-id=\"062d9fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Are The Types of Threat Intelligence?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d797c15 elementor-widget elementor-widget-text-editor\" data-id=\"d797c15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber Threat Intelligence is mainly categorized as strategic, tactical, technical, and operational.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4afd213 elementor-widget elementor-widget-image\" data-id=\"4afd213\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"381\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Types-of-threat-intelligence_New-600x381.png.webp\" class=\"attachment-full size-full wp-image-81630\" alt=\"Types of Cyber Threat Intelligence\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Types-of-threat-intelligence_New-600x381.png.webp 600w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Types-of-threat-intelligence_New-600x381.png-300x191.webp 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1de465 elementor-widget elementor-widget-heading\" data-id=\"b1de465\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Strategic Threat Intelligence<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5935d94 elementor-widget elementor-widget-text-editor\" data-id=\"5935d94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Strategic threat intelligence provides an overview of the organization\u2019s threat landscape. It is less technical is mainly for executive-level security professionals to drive high-level organizational strategy based on the findings in the reports. Ideally, strategic threat intelligence provides insights like vulnerabilities and risks associated with the organization\u2019s threat landscape with preventive actions, threat actors, their goals, and the severity of the potential attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d1364e elementor-widget elementor-widget-image\" data-id=\"9d1364e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"465\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Strategic-threat-intelligence-reports-include_new.png\" class=\"attachment-full size-full wp-image-81631\" alt=\"Strategic Threat Intelligence for Cybersecurity| EC-Council\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Strategic-threat-intelligence-reports-include_new.png 800w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Strategic-threat-intelligence-reports-include_new-300x174.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Strategic-threat-intelligence-reports-include_new-768x446.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-380d19f elementor-widget elementor-widget-heading\" data-id=\"380d19f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Tactical Threat Intelligence<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ed721f elementor-widget elementor-widget-text-editor\" data-id=\"5ed721f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Tactical threat intelligence consists of more specific details on threat actors TTP and is mainly for the security team to understand the attack vectors. Intelligence gives them insights on how to build a defense strategy to mitigate those attacks. The report includes the vulnerabilities in the security systems that attackers could take advantage of and how to identify such attacks.<\/p><p>The finding is used to strengthen the existing security controls\/defense mechanism and helps to remove the vulnerabilities in the network.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ee5ba1 elementor-widget elementor-widget-heading\" data-id=\"6ee5ba1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Technical Threat Intelligence<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4116b2e elementor-widget elementor-widget-text-editor\" data-id=\"4116b2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Technical threat intelligence focuses on specific clues or evidence of an attack and creates a base to analyze such attacks. Threat Intelligence analyst scans for the indicator of compromise (IOCs), which includes reported IP addresses, the content of phishing emails, malware samples, and fraudulent URLs. Timing for sharing technical intelligence is very critical because IOCs such as malicious IPs or fraudulent URLs become obsolete in a few days.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c2a68fd elementor-widget elementor-widget-heading\" data-id=\"c2a68fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. Operational Threat Intelligence<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbb478f elementor-widget elementor-widget-text-editor\" data-id=\"fbb478f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Operational threat intelligence focuses on knowledge about the attacks. It gives detailed insights on factors like nature, motive, timing, and how an attack is carried out. Ideally, the information is gathered from hacker chat rooms or their discussion online through infiltration, which makes it difficult to obtain.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af65d72 elementor-widget elementor-widget-heading\" data-id=\"af65d72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Challenges in gathering operational Intelligence:<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e8c601 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5e8c601\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Threats usually communicate over encrypted or private chat rooms, and access to these channels is not easy.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">It is not easy to manually gather relevant intelligence from huge data of chat rooms or other communication channels.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Threat groups may use confusing and ambiguous language so that no one can understand their conversation.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e24bec2 elementor-widget elementor-widget-heading\" data-id=\"e24bec2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Creating a Cyber Threat Intelligence Program<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61f073b elementor-widget elementor-widget-heading\" data-id=\"61f073b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is a Cyber Threat Intelligence Program?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9418842 elementor-widget elementor-widget-text-editor\" data-id=\"9418842\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-threat-intelligence-analyst-ctia\/\" target=\"_blank\" rel=\"noopener\">Cyber Threat Intelligence program<\/a>\u00a0combines thousands of Threat Intelligence Feeds into a single feed, instead of viewing them separately to enable consistent characterization and, categorization of cyber threat events, and identify trends or changes in the activities of cyber adversaries. The program consistently describes cyber threat activity in a way that allows efficient information sharing and threat analysis. It assists the threat intelligence team by comparing the feed with internal telemetry and creates alerts.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a8c377 elementor-widget elementor-widget-text-editor\" data-id=\"4a8c377\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<iframe width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/7v2O-uEK2VM?si=52I2mZQ7CNyl6XZx\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a32f78f elementor-widget elementor-widget-heading\" data-id=\"a32f78f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Do You Implement Cyber Threat Intelligence?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2121159 elementor-widget elementor-widget-text-editor\" data-id=\"2121159\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOnce relevant cyber threat information is extracted from threat data, it goes through a process of thorough analysis and structured processing with necessary technologies and techniques followed by sharing with required stakeholders to harden the security controls and prevent future cyber-attacks.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d9cf0a elementor-widget elementor-widget-heading\" data-id=\"2d9cf0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Golden Rules for Implementing a Cyber Threat Intelligence Program<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3924ed6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3924ed6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-619778e\" data-id=\"619778e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-090a10a elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"090a10a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Create a Plan<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Involve the right people<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Understand the difference between Threat Data and Threat Intelligence<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Communication<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d643197\" data-id=\"d643197\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9dd4ba8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"9dd4ba8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Know who all need the Intelligence<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Implement the right TTP (Tools, Techniques and Procedures)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Integrate with the Organization security technology<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6ab4df elementor-widget elementor-widget-heading\" data-id=\"b6ab4df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Enterprise Objectives for Cyber Intelligence Programs<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b32a673 elementor-widget elementor-widget-text-editor\" data-id=\"b32a673\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAligning enterprise objectives in creating the threat intelligence program sets the roadmap for threat intelligence. The data, assets, and business processes that need to be protected should be well defined along with the impact analysis of the losing such assets. It helps to outline; what type of threat intelligence is required and who all should be involved.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-adb2635 elementor-widget elementor-widget-heading\" data-id=\"adb2635\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Role of Threat Analyst in Threat Intelligence Life cycle<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0970c82 elementor-widget elementor-widget-text-editor\" data-id=\"0970c82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber intelligence analysts, also known as \u201ccyber threat analysts,\u201d are information security professionals who use their skills and background knowledge to collect and analyze the threat data to create intelligence in the form of reports and share with the respective department. Certified cyber intelligence analyst\u00a0is required for creating a threat intelligence program.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15ce6f6 elementor-widget elementor-widget-heading\" data-id=\"15ce6f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Threat Intelligence Strategy and Capabilities<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37e2745 elementor-widget elementor-widget-text-editor\" data-id=\"37e2745\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Threat intelligence strategy involves sound planning with the application of tools, techniques, and methodologies, followed by a review to check the\u00a0effectiveness of the plan. While devising the strategy, one should also consider their threat intelligence capabilities and structure the program accordingly, including the support of different departments.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-04a6c44 elementor-widget elementor-widget-heading\" data-id=\"04a6c44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber Threats and Advanced Persistent Threats (APTs)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-205b4c2 elementor-widget elementor-widget-text-editor\" data-id=\"205b4c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tUnderstanding <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/threat-intelligence-critical-types-cyberthreats\/\">cyber threats<\/a> and advanced persistent threats are the most crucial aspect of threat intelligence program.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a804df1 elementor-widget elementor-widget-heading\" data-id=\"a804df1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What are Advanced Persistent Threats (APT)?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed58a2c elementor-widget elementor-widget-text-editor\" data-id=\"ed58a2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAn advanced persistent threat is an attack in which an unauthorized user gains access to a network system and remains there for a long time without being detected. Advanced persistent threats are highly menacing for organizations, as attackers have continuous access to the company\u2019s data. Advanced persistent threats are carried out in phases which involve hacking the network, hiding themselves to access as much information as possible, planning an attack, studying organization\u2019s information systems, searching for easy access to sensitive data, and exfiltrating that data.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60162a4 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"60162a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"26\" height=\"25\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/lock_r.svg\" class=\"attachment-full size-full wp-image-81568\" alt=\"Lock\" \/><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\">Cyber Threat Intelligence Frameworks<\/h4><p class=\"elementor-image-box-description\">Cyber threat intelligence framework creates intelligence to respond to cyber-attacks by managing, detecting, and alerting security professionals of potential threats. It provides an actional plan to mitigate the attacks by collecting the latest threat source information and create threat models.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b715447 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"b715447\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"26\" height=\"25\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/lock_r.svg\" class=\"attachment-full size-full wp-image-81568\" alt=\"Lock\" \/><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\">Understanding Cyber Kill Chain &amp; IOCs<\/h4><p class=\"elementor-image-box-description\"><p>The\u00a0<a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/cyber-kill-chain-seven-steps-cyberattack\/\" target=\"_blank\" rel=\"noopener\">cyber kill chain<\/a>\u00a0is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the exfiltration of data. The kill chain helps us understand and combat ransomware, security breaches, and advanced persistent attacks (APTs)<\/p>\n\n<p>The cyber kill chain is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the exfiltration of data. The kill chain helps us understand and combat ransomware, security breaches, and advanced persistent attacks (APTs)<\/p><\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b659f6c elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"b659f6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"26\" height=\"25\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/lock_r.svg\" class=\"attachment-full size-full wp-image-81568\" alt=\"Lock\" \/><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\">Organization\u2019s Current Threat Landscape<\/h4><p class=\"elementor-image-box-description\">This includes identifying critical threats to an organization, assessing the organization\u2019s current security posture, security team\u2019s structure, and competencies. Understanding of organization\u2019s current security infrastructure and operations assist security professionals in assessing risks for identified threats.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47fc3a8 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"47fc3a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"26\" height=\"25\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/lock_r.svg\" class=\"attachment-full size-full wp-image-81568\" alt=\"Lock\" \/><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\">Requirements Analysis<\/h4><p class=\"elementor-image-box-description\">Requirement analysis is all about mapping organization\u2019s ideal target state, identifying needs, and requirements for cyber intelligence, defining requirements and categories, aligning the requirements of business units, stakeholders and third parties, prioritizing intelligence requirements, the scope of <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-threat-intelligence-analyst-ctia\/\" target=\"_blank\" rel=\"noopener noreferrer\">\n  Cyber Threat Intelligence Program (CTIA)\n<\/a>, engagement rules, non-disclosure agreements, and common risks to cyber threat intelligence program.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71022b0 elementor-widget elementor-widget-heading\" data-id=\"71022b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Planning for a threat intelligence program<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82ac636 elementor-widget elementor-widget-text-editor\" data-id=\"82ac636\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tKey elements of a Cyber Threat Intelligence Program are:\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c437ec6 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"c437ec6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"802\" height=\"376\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/planning-1.svg\" class=\"attachment-full size-full wp-image-81732\" alt=\"Threat Analysis Process for Cybersecurity | EC-Council\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-361be7f elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"361be7f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2bc3c83\" data-id=\"2bc3c83\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-dc5c338 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dc5c338\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-b533a48\" data-id=\"b533a48\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-474d065 elementor-widget elementor-widget-heading\" data-id=\"474d065\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Establishing Management Support<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-193507d elementor-widget elementor-widget-text-editor\" data-id=\"193507d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tPrepare and document the project plan in accordance with the policies to initiate the program and cover the strategies to ensure management\u2019s support and detailed the outcome and the objective of the program and how business objectives are lined up.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9a965b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9a965b8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6f3cd5d\" data-id=\"6f3cd5d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-89d7f4f elementor-widget elementor-widget-heading\" data-id=\"89d7f4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Building a Threat Intelligence Team<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5abb797 elementor-widget elementor-widget-text-editor\" data-id=\"5abb797\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCreating a team of cyber threat intelligence analysts and defining their roles and responsibilities based on their core competencies and skillsets. Creating a talent acquisition strategy and defining the required skill set, qualifications, professional certifications, and positioning the threat intelligence team.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f07c284 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f07c284\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-89bafe4\" data-id=\"89bafe4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e5dff33 elementor-widget elementor-widget-heading\" data-id=\"e5dff33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Threat Intelligence Program Review<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae0dbb8 elementor-widget elementor-widget-text-editor\" data-id=\"ae0dbb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tReviewing the structure of the threat intelligence program to access success and failure. Findings during the review help to improve the actual program and make the required updates.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0268dc9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0268dc9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-cd3152c\" data-id=\"cd3152c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cdf5e20 elementor-widget elementor-widget-heading\" data-id=\"cdf5e20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Threat Intelligence Data Collection &amp; Processing<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a75e014 elementor-widget elementor-widget-text-editor\" data-id=\"a75e014\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Cyber Threat Intelligence Data Collection and Acquisition<\/strong><\/p><p>Collecting relevant threat data for analysis and processing is an important step for creating cyber threat intelligence. The data is collected from various sources using predefined TTP (Tactics, Techniques and Procedures). Few sources of data are internal like network logs, past cyber incidents, and security landscape. The external source includes threat feeds, communities, forums, open web, and <a href=\"https:\/\/www.eccu.edu\/blog\/technology\/the-dark-web-and-its-dangers\/\" target=\"_blank\" rel=\"noopener\">dark web<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-12cc644 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"12cc644\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c5fcae9\" data-id=\"c5fcae9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e1d6906 elementor-widget elementor-widget-heading\" data-id=\"e1d6906\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Threat Intelligence Feeds and Sources<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bebd8f3 elementor-widget elementor-widget-heading\" data-id=\"bebd8f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is A Threat Intelligence Feed?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e82fa36 elementor-widget elementor-widget-text-editor\" data-id=\"e82fa36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThreat intelligence feeds and sources are continuous streams of actionable information on threats and bad actors. Threat intelligence analysts collect security data on IoCs such as uncommon activity and malicious domains and IP addresses from various sources. Feeds are just the raw data on threats; an analyst extracts the intelligence from them for creating reports.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-15a3b27 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"15a3b27\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-9585f48\" data-id=\"9585f48\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8132220 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"8132220\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">TTP (Tactics, Techniques and Procedures) for Threat Data Collection<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-965f270 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"965f270\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e68507 elementor-widget elementor-widget-text-editor\" data-id=\"2e68507\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol class=\"ol-gap\">\n \t<li><strong>Data Collection through Open Source Intelligence (OSINT)<\/strong>\nThis includes data collection through open sources like Search Engines, Web Services, Website Footprinting, Emails, Whois Lookup, DNS Interrogation, and Automating OSINT effort using Tools\/Frameworks\/Scripts.<\/li>\n \t<li><strong style=\"display: block;\">Data Collection through Human Intelligence (HUMINT)<\/strong>\nThis process involves data collection through Human-based Social Engineering Techniques, Interviewing, Interrogation, and Social Engineering Tools.<\/li>\n \t<li><strong style=\"display: block;\">Data Collection through Cyber Counterintelligence (CCI)<\/strong>\nIn this step, threat data is collected through Honeypots, Passive DNS Monitoring, Pivoting Off Adversary\u2019s Infrastructure, Malware Sinkholes, and YARA rules.<\/li>\n \t<li><strong style=\"display: block;\">Data Collection through Indicators of Compromise (IoCs)<\/strong>\nCollecting digital evidence data from internal sources, external sources, and creating custom threat IOCs.<\/li>\n \t<li><strong style=\"display: block;\"> Data Collection through Malware Analysis<\/strong>\nMalware analysis is the process of understanding the origin and impact of a malware sample and how it functions by deploying analysis tools. Malware functions in multiple ways and gathers information about unsecured devices without the knowledge of the user.<\/li>\n<\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7c95dd8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7c95dd8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-9401d18\" data-id=\"9401d18\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-494b5b4 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"494b5b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Bulk Data Collection<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66b5077 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"66b5077\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb935fa elementor-widget elementor-widget-text-editor\" data-id=\"fb935fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCollecting as much as possible intelligence demands a bulk data collection, and from that data, the analyst needs to figure out the relevant data. The integration of tools and effective data management helps to refine that data which can be processed and analyzed for creating intelligence. Finding the relevant pieces of information from the bulk data is not easy; it is like searching a needle in a haystack. Hence the right skill set is necessary for creating a threat intelligence program.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bdcbd64 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bdcbd64\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-37127ee\" data-id=\"37127ee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d79546b elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"d79546b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Understanding Data Processing and Exploitation<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed94541 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ed94541\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7bfc148 elementor-widget elementor-widget-text-editor\" data-id=\"7bfc148\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tNext come the data processing and exploitation, which requires structuring and normalizing the collected data by using various data processing techniques like sampling, validation, sorting, formatting, and aggregation. The data is then stored in a format that analysts can derive valuable insights and generate actionable intelligence. The data can be in the form of charts and graphs with a specific context in a way that makes more sense to the analysts and gathers information efficiently when required to take actions faster. It even reduces the risk of overlooking critical information.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f578a2c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f578a2c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-56f219b\" data-id=\"56f219b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54a781e elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"54a781e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Data Analysis<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-677432c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"677432c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86e4d96 elementor-widget elementor-widget-text-editor\" data-id=\"86e4d96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThreat data analysis is the process of searching, interpreting, illustrating, analyzing internal and external threat data, and determining the patterns to notify relevant teams of potential security issues as defined in the planning stage. The objective of threat data analysis is to assist analysts to easily and correctly interpret the threat data and utilize it to the full potential and generate accurate intelligence.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e2498a0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e2498a0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-42e7b24\" data-id=\"42e7b24\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-17ff9f6 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"17ff9f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Data Analysis Techniques<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19e97a9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"19e97a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bbfbb96 elementor-widget elementor-widget-text-editor\" data-id=\"bbfbb96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Statistical Data Analysis<\/li><li>Analysis of Competing Hypotheses<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be4df63 elementor-widget elementor-widget-image\" data-id=\"be4df63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"864\" height=\"800\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/threat-analysis-process.png\" class=\"attachment-large size-large wp-image-81632\" alt=\"Key elements Cyber Threat Intelligence Program Planning | EC-Council\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/threat-analysis-process.png 864w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/threat-analysis-process-300x278.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/threat-analysis-process-768x711.png 768w\" sizes=\"(max-width: 864px) 100vw, 864px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f1bfa5e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f1bfa5e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-f5e9c97\" data-id=\"f5e9c97\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0c14a01 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"0c14a01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Intelligence Reporting and Dissemination<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee5a542 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ee5a542\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c499484 elementor-widget elementor-widget-text-editor\" data-id=\"c499484\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCreating cyber threat intelligence reports and sharing with relevant units in the security department is the last step in a threat intelligence program. For intelligence to be actionable, it must be shared with the right people at the right time. Ideally, cyber threat intelligence reports contain information that helps security professionals to make decisions regarding organizational security controls and protect the organizations from cyber threats.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f3774e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f3774e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6eb760e\" data-id=\"6eb760e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e57f45 elementor-widget elementor-widget-heading\" data-id=\"7e57f45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How do you use cyber threat intelligence?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9cfa35 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"b9cfa35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Inform the security, professionals about the bad actors, potential threats, their methods, motive, and vulnerabilities organization are posed to.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Help security professionals to be proactive about future cyber-attacks.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Keep stakeholders informed about the latest threats and their impact on the business<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Help the security operations team to triage cyber-attacks, risk analysis, vulnerability management, and wide-scope decision making.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f447cc6 elementor-widget elementor-widget-heading\" data-id=\"f447cc6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What is the future of threat intelligence?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75a1847 elementor-widget elementor-widget-text-editor\" data-id=\"75a1847\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>According to a report by <a href=\"https:\/\/www.grandviewresearch.com\/press-release\/global-threat-intelligence-market\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Grand View Research<\/span><\/a>, Inc., the market for threat intelligence will reach $12.6 billion by 2025. This clearly shows the growing demand for cyber threat intelligence experts. In the future, there is enormous scope for threat intelligence services with the growing demand.<\/p><p>Companies, although investing generously in their cybersecurity solutions, remain susceptible to cyber-attacks, and this is an alert to help us realize that the traditional cybersecurity approach must be replaced with new and effective solutions, one of them is \u201ccyber threat intelligence \u2013 a proactive approach to predictive analysis.\u201d<\/p><p><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/why-pursue-career-cyber-threat-intelligence\/\" target=\"_blank\" rel=\"noopener\">A career in cyber threat intelligence<\/a> has several number of avenues in the space of cybersecurity, and essentially there is a need for security professionals with skills in threat intelligence due to the evolving security landscape.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-107db32 elementor-widget elementor-widget-heading\" data-id=\"107db32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber Threat Intelligence Jobs<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97606be elementor-widget elementor-widget-text-editor\" data-id=\"97606be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As per LinkedIn, over 10,000 Threat Intelligence jobs are vacant worldwide, which recounts a huge <span data-contrast=\"none\">demand for threat intelligence professionals<\/span> globally and will significantly influence and shape the face of cybersecurity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7fc98c elementor-widget elementor-widget-heading\" data-id=\"e7fc98c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Need for Threat Intelligence Analysts<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c956a17 elementor-widget elementor-widget-text-editor\" data-id=\"c956a17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<iframe width=\"654\" height=\"368\" src=\"https:\/\/www.youtube.com\/embed\/0LWt19wQz1Q\" title=\"Need for Threat Intelligence Analysts by Farooq Naiyer &amp; Michael Leung\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-378d263 elementor-widget elementor-widget-heading\" data-id=\"378d263\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How Much Does a Cyber Intelligence Analyst Make?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d659365 elementor-widget elementor-widget-text-editor\" data-id=\"d659365\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>On average <a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Threat_Intelligence_Analyst\/Salary\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">cyber\u202fthreat intelligence analyst\u2019s salary in the United States is $75,000<\/span><\/a>, and they typically make between $51k \u2013 $140k.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ccc2fd elementor-widget elementor-widget-heading\" data-id=\"0ccc2fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Do You Become a Threat Intelligence Analyst?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9aebc08 elementor-widget elementor-widget-text-editor\" data-id=\"9aebc08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhen an organization is investing in a cyber threat intelligence program, then they also want experts skilled in data collection, processing, analysis, modeling, creating reports, timely sharing with the intended security units to protect their system, and network from a cyberattack.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf12fcb elementor-widget elementor-widget-heading\" data-id=\"cf12fcb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What skills does an intelligence analyst need<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14f7da8 elementor-widget elementor-widget-text-editor\" data-id=\"14f7da8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTo become a cyber threat intelligence analyst, you should also understand their roles and responsibilities. Below is the snapshot of what threat intelligence analyst does.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cd195c elementor-widget elementor-widget-heading\" data-id=\"3cd195c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Cyber Threat Intelligence Training<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea6aaf8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"ea6aaf8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Threat Data Collection<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Threat Data Analysis<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Threat Data Processing<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Hands-on with tools, techniques and procedures for threat data collection, analysis and processing<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Report Writting<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Threat Intelligence<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6ee7a57 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ee7a57\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e46856c\" data-id=\"e46856c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6dd8a5c elementor-widget elementor-widget-heading\" data-id=\"6dd8a5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Importance of Cyber Intelligence Training<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0eb19d0 elementor-widget elementor-widget-text-editor\" data-id=\"0eb19d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSince the role of a cyber threat analyst expects you to work with several new tools and be aware of a lot of new techniques, industry leaders recommend\u202fthat\u202fgetting trained in a\u202fmodern program is a must. Cyber intelligence analyst training helps security professionals develop and enhance their skills through continuous learning about threat data, data analysis, processing, reporting, and Dissemination. The intelligence helps security professionals to understand the threat actors, their motives, and how to combat such threats.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-19751ef elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"19751ef\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-930b510\" data-id=\"930b510\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6fd097c elementor-widget elementor-widget-heading\" data-id=\"6fd097c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber Threat Intelligence Certification<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a05034 elementor-widget elementor-widget-text-editor\" data-id=\"5a05034\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCreating and staffing a cyber threat intelligence program is a major challenge for security professionals. Everyone wants highly qualified professionals that can contribute to the team, but how do you identify people with the skillsets you need? One way, of course, is to look for intelligence analysts who hold a certification, but how do you know which certifications align with the job you are hiring for?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-02ae166 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"02ae166\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-bc5685c\" data-id=\"bc5685c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-424145f elementor-widget elementor-widget-heading\" data-id=\"424145f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Selecting a Cyber threat intelligence course<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95d3e8d elementor-widget elementor-widget-text-editor\" data-id=\"95d3e8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhile selecting a cyber threat intelligence course, there are\u202fseveral factors\u202fto consider like, modality, duration,\u202fcourse content, the ratio of hands-on to theory,\u202frecognitions\/accreditations, cost of training, just to name a few. Based on these factors you can compare the top cyber threat intelligence courses and their fees.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-33ff6a7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"33ff6a7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4b967d3\" data-id=\"4b967d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae95d9c elementor-widget elementor-widget-heading\" data-id=\"ae95d9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Frequently Asked Questions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ccb696 elementor-widget elementor-widget-accordion\" data-id=\"6ccb696\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1141\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1141\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-angle-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is cyber threat intelligence and how is it used?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1141\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1141\">Cyber threat intelligence is information about threats an organization has or is exposed to, their modus operandi, motive, and the business impact in the event of such attack. This intelligence is used to identify, prepare, and protect the organization from cyber threats.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1142\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1142\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-angle-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is the difference between strategic intelligence and tactical intelligence?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1142\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1142\">Strategic and tactical intelligence differ in several ways. Strategic Intelligence is for top executives in cybersecurity to formulate policies and make decisions regarding the organization\u2019s security. On the other hand, tactical intelligence is about threat vectors, vulnerabilities in the organization system, and how to create a defense strategy to prevent such attacks.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1143\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1143\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-angle-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What are the qualification criteria for Cyber Threat Intelligence Training Courses?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1143\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1143\">Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience can opt for cyber intelligence certification.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1144\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1144\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-angle-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Are there any free cyber threat intelligence tutorials or resources?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1144\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1144\"><p><span data-contrast=\"none\">EC-Council has a repository of learning resources and\u00a0<\/span><span data-contrast=\"none\">is<\/span><span data-contrast=\"none\">\u00a0not limited to\u00a0<\/span><span data-contrast=\"none\">the\u00a0<\/span><span data-contrast=\"none\">Threat Intelligence domain. Here is the list of resources, a).\u00a0<\/span><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-brief\/\"><span data-contrast=\"none\">EC-Council Free Resources<\/span><\/a><span data-contrast=\"none\">, b).\u00a0<\/span><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\"><span data-contrast=\"none\">EC-Council Blogs<\/span><\/a><span data-contrast=\"none\">, c).\u00a0<\/span><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepapers\/\"><span data-contrast=\"none\">EC-Council Whitepaper<\/span><\/a><span data-contrast=\"none\">, d).\u00a0<\/span><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/\"><span data-contrast=\"none\">EC-Council Cyber Talks<\/span><\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1145\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1145\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-angle-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Can I do threat intelligence analyst certification online with EC-Council?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1145\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1145\">Yes, you can enroll for an online mode of training. Threat intelligence analyst courses are delivered in all three modalities \u2013 classroom training, online self-paced, and live online.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1146\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1146\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-angle-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What are the job titles one can aim for after cyber threat analysis training?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1146\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1146\">After cyber threat analysis training, you are ready for jobs like Threat Intelligence Specialist, Threat Intelligence Analyst, Cyber Threat Investigator, Threat Researcher, Threat Intelligence Engineer, Threat Intelligence &#038; Vulnerability Analyst.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"What is cyber threat intelligence and how is it used?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Cyber threat intelligence is information about threats an organization has or is exposed to, their modus operandi, motive, and the business impact in the event of such attack. This intelligence is used to identify, prepare, and protect the organization from cyber threats.\"}},{\"@type\":\"Question\",\"name\":\"What is the difference between strategic intelligence and tactical intelligence?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Strategic and tactical intelligence differ in several ways. Strategic Intelligence is for top executives in cybersecurity to formulate policies and make decisions regarding the organization\\u2019s security. On the other hand, tactical intelligence is about threat vectors, vulnerabilities in the organization system, and how to create a defense strategy to prevent such attacks.\"}},{\"@type\":\"Question\",\"name\":\"What are the qualification criteria for Cyber Threat Intelligence Training Courses?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience can opt for cyber intelligence certification.\"}},{\"@type\":\"Question\",\"name\":\"Are there any free cyber threat intelligence tutorials or resources?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p><span data-contrast=\\\"none\\\">EC-Council has a repository of learning resources and\\u00a0<\\\/span><span data-contrast=\\\"none\\\">is<\\\/span><span data-contrast=\\\"none\\\">\\u00a0not limited to\\u00a0<\\\/span><span data-contrast=\\\"none\\\">the\\u00a0<\\\/span><span data-contrast=\\\"none\\\">Threat Intelligence domain. Here is the list of resources, a).\\u00a0<\\\/span><a href=\\\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-brief\\\/\\\"><span data-contrast=\\\"none\\\">EC-Council Free Resources<\\\/span><\\\/a><span data-contrast=\\\"none\\\">, b).\\u00a0<\\\/span><a href=\\\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\"><span data-contrast=\\\"none\\\">EC-Council Blogs<\\\/span><\\\/a><span data-contrast=\\\"none\\\">, c).\\u00a0<\\\/span><a href=\\\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/whitepapers\\\/\\\"><span data-contrast=\\\"none\\\">EC-Council Whitepaper<\\\/span><\\\/a><span data-contrast=\\\"none\\\">, d).\\u00a0<\\\/span><a href=\\\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/\\\"><span data-contrast=\\\"none\\\">EC-Council Cyber Talks<\\\/span><\\\/a><\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Can I do threat intelligence analyst certification online with EC-Council?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Yes, you can enroll for an online mode of training. Threat intelligence analyst courses are delivered in all three modalities \\u2013 classroom training, online self-paced, and live online.\"}},{\"@type\":\"Question\",\"name\":\"What are the job titles one can aim for after cyber threat analysis training?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"After cyber threat analysis training, you are ready for jobs like Threat Intelligence Specialist, Threat Intelligence Analyst, Cyber Threat Investigator, Threat Researcher, Threat Intelligence Engineer, Threat Intelligence &#038; Vulnerability Analyst.\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Threat intelligence is the analysis of data using tools and techniques to generate meaningful information about existing or emerging threats targeting the organization that helps mitigate risks. Threat Intelligence helps organizations make faster, more informed security decisions and change their behavior from reactive to proactive to combat the attacks. What is cyber threat intelligence and&hellip;<\/p>\n","protected":false},"author":32,"featured_media":81646,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12226],"tags":[],"class_list":{"0":"post-81645","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Cyber Threat Intelligence | CTIA | Types &amp; Career Path<\/title>\n<meta name=\"description\" content=\"Explore Cyber Threat Intelligence (CTIA) with EC-Council \u2014 learn its types, career paths, roles of a Threat Intelligence Analyst, and practical applications\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Cyber Threat Intelligence | CTIA | Types &amp; Career Path\" \/>\n<meta property=\"og:description\" content=\"Explore Cyber Threat Intelligence (CTIA) with EC-Council \u2014 learn its types, career paths, roles of a Threat Intelligence Analyst, and practical applications\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-07T04:39:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T06:26:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cyber-threat-intelligence-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What is Cyber Threat Intelligence | CTIA | Types &amp; Career Path\" \/>\n<meta name=\"twitter:description\" content=\"Explore Cyber Threat Intelligence (CTIA) with EC-Council \u2014 learn its types, career paths, roles of a Threat Intelligence Analyst, and practical applications\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cyber-threat-intelligence-feature.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/threat-intelligence\\\/what-is-cyber-threat-intelligence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/threat-intelligence\\\/what-is-cyber-threat-intelligence\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"What is Threat Intelligence in Cybersecurity?\",\"datePublished\":\"2024-03-07T04:39:04+00:00\",\"dateModified\":\"2026-04-16T06:26:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/threat-intelligence\\\/what-is-cyber-threat-intelligence\\\/\"},\"wordCount\":3022,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/threat-intelligence\\\/what-is-cyber-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/what-is-cyber-threat-intelligence-thumb.jpg\",\"articleSection\":[\"Threat Intelligence\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/threat-intelligence\\\/what-is-cyber-threat-intelligence\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/threat-intelligence\\\/what-is-cyber-threat-intelligence\\\/\",\"name\":\"What is Cyber Threat Intelligence | CTIA | Types & Career Path\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/threat-intelligence\\\/what-is-cyber-threat-intelligence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/threat-intelligence\\\/what-is-cyber-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/what-is-cyber-threat-intelligence-thumb.jpg\",\"datePublished\":\"2024-03-07T04:39:04+00:00\",\"dateModified\":\"2026-04-16T06:26:25+00:00\",\"description\":\"Explore Cyber Threat Intelligence (CTIA) with EC-Council \u2014 learn its types, career paths, roles of a Threat Intelligence Analyst, and practical applications\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/threat-intelligence\\\/what-is-cyber-threat-intelligence\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/threat-intelligence\\\/what-is-cyber-threat-intelligence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/threat-intelligence\\\/what-is-cyber-threat-intelligence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/what-is-cyber-threat-intelligence-thumb.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/what-is-cyber-threat-intelligence-thumb.jpg\",\"width\":521,\"height\":521,\"caption\":\"What is Threat Intelligence in Cybersecurity?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/threat-intelligence\\\/what-is-cyber-threat-intelligence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Threat Intelligence\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"What is Threat Intelligence in Cybersecurity?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Cyber Threat Intelligence | CTIA | Types & Career Path","description":"Explore Cyber Threat Intelligence (CTIA) with EC-Council \u2014 learn its types, career paths, roles of a Threat Intelligence Analyst, and practical applications","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"What is Cyber Threat Intelligence | CTIA | Types & Career Path","og_description":"Explore Cyber Threat Intelligence (CTIA) with EC-Council \u2014 learn its types, career paths, roles of a Threat Intelligence Analyst, and practical applications","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-03-07T04:39:04+00:00","article_modified_time":"2026-04-16T06:26:25+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cyber-threat-intelligence-feature.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"What is Cyber Threat Intelligence | CTIA | Types & Career Path","twitter_description":"Explore Cyber Threat Intelligence (CTIA) with EC-Council \u2014 learn its types, career paths, roles of a Threat Intelligence Analyst, and practical applications","twitter_image":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cyber-threat-intelligence-feature.jpg","twitter_misc":{"Written by":"EC-Council","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"What is Threat Intelligence in Cybersecurity?","datePublished":"2024-03-07T04:39:04+00:00","dateModified":"2026-04-16T06:26:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/"},"wordCount":3022,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cyber-threat-intelligence-thumb.jpg","articleSection":["Threat Intelligence"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/","name":"What is Cyber Threat Intelligence | CTIA | Types & Career Path","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cyber-threat-intelligence-thumb.jpg","datePublished":"2024-03-07T04:39:04+00:00","dateModified":"2026-04-16T06:26:25+00:00","description":"Explore Cyber Threat Intelligence (CTIA) with EC-Council \u2014 learn its types, career paths, roles of a Threat Intelligence Analyst, and practical applications","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cyber-threat-intelligence-thumb.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/what-is-cyber-threat-intelligence-thumb.jpg","width":521,"height":521,"caption":"What is Threat Intelligence in Cybersecurity?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Threat Intelligence","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/threat-intelligence\/"},{"@type":"ListItem","position":4,"name":"What is Threat Intelligence in Cybersecurity?"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81645"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81645\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81646"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}