This paper discusses an innovative, four-step process developed by IntSights for using readily available threat intelligence as the foundation of an effective program for deterring and preventing common and nation-state sponsored cyber attacks. The four steps are:
1. Present a less attractive target.
2. Think like your attacker.
3. Monitor the clear, deep and Dark Web.
4. Identify attackers’ weapons at the surface.