Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are
resourced unlike other types of cyber threat actors. Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and
presentation of a specific APT, which she will assign to the team.
APT30 – File attached
Part 1: Threat Landscape Analysis
o Describe common tactics, techniques, and procedures to include threat actor types.
o What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of?
Part 4: Machine Learning and Data Analytics
o Describe the concepts of machine learning and data analytics and how applying them to cybersecurity will evolve the field.
o Are there companies providing innovative defensive cybersecurity measures based on these technologies? If so, what are they? Would you recommend any
of these to the CTO?
——
May use provided sources and additional sources of information but also describe the concept in layman’s terms.