<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic What are some effective strategies and best practices against threat actors? in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/What-are-some-effective-strategies-and-best-practices-against/m-p/487#M27</link>
    <description>&lt;P&gt;Threat actors can be from "script kiddies" to APT (Advanced Persistent Threat).&amp;nbsp;What are some effective strategies and best practices againts these actors? How do we measure the effectiveness of the defence?&lt;/P&gt;</description>
    <pubDate>Sun, 08 Oct 2017 16:23:48 GMT</pubDate>
    <dc:creator>nextciso</dc:creator>
    <dc:date>2017-10-08T16:23:48Z</dc:date>
    <item>
      <title>What are some effective strategies and best practices against threat actors?</title>
      <link>https://community.isc2.org/t5/Industry-News/What-are-some-effective-strategies-and-best-practices-against/m-p/487#M27</link>
      <description>&lt;P&gt;Threat actors can be from "script kiddies" to APT (Advanced Persistent Threat).&amp;nbsp;What are some effective strategies and best practices againts these actors? How do we measure the effectiveness of the defence?&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 16:23:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/What-are-some-effective-strategies-and-best-practices-against/m-p/487#M27</guid>
      <dc:creator>nextciso</dc:creator>
      <dc:date>2017-10-08T16:23:48Z</dc:date>
    </item>
    <item>
      <title>Re: What are some effective strategies and best practices against threat actors?</title>
      <link>https://community.isc2.org/t5/Industry-News/What-are-some-effective-strategies-and-best-practices-against/m-p/2437#M233</link>
      <description>An effective approach to addressing the entire range of threat actors is to use an intelligence driven defense approach to cyber security operations. This will help you identify the threat actors targeting you specifically versus the large scale campaigns targeting everyone and develop custom detections and mitigations specific to the threats posing the greatest risk.</description>
      <pubDate>Mon, 30 Oct 2017 09:42:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/What-are-some-effective-strategies-and-best-practices-against/m-p/2437#M233</guid>
      <dc:creator>f1b3ropt1k</dc:creator>
      <dc:date>2017-10-30T09:42:41Z</dc:date>
    </item>
  </channel>
</rss>

