Cyber Threat Analysis and Tools
Basically, any evidence-based knowledge we can get from any source is what we use to analyze. That’s working with other intelligence agencies, DoD joint force headquarters for cyber defense, and our own cyber operations center. And vendors…often they detect cyber threats and report them to us.
CIO, Defense Health Agency