• Demo
  • Sign-Up for Flex
  • Login to Flex
  • CTEM
  • Platform
    • Platform
    • Platform Overview
    • AttackIQ Command Center
    • AttackIQ Enterprise
    • AttackIQ Ready!
    • AttackIQ Flex
  • Platform
    • Platform
    • Platform Overview
    • AttackIQ Command Center
    • AttackIQ Enterprise
    • AttackIQ Ready!
    • AttackIQ Flex
  • Solutions
    • Solutions
    • CTEM
    • Security Control Validation
    • MITRE ATT&CK
    • Cloud Security Optimization
    • Compliance Optimization
    • PREACT™ Security Optimization Program
  • Solutions
    • Solutions
    • CTEM
    • Security Control Validation
    • MITRE ATT&CK
    • Cloud Security Optimization
    • Compliance Optimization
    • PREACT™ Security Optimization Program
  • Partners
  • Academy
  • Resources
    • Blog
    • All Posts
    • Cyberattack
    • Ransomware
    • Threat-informed defense
    • Breach and Attack Simulation
    • Cloud Security
    • Resources
    • All Resources
    • CISO Guides
    • Case Studies
    • eBooks
    • Guides
    • Dummies Guides
    • Webinars
    • Additional Resources
    • Adversary Research Team
    • Think Bad, Do Good Podcast
    • Community
    • Glossary
  • Resources
    • Blog
    • All Posts
    • Cyberattack
    • Ransomware
    • Threat-informed defense
    • Breach and Attack Simulation
    • Cloud Security
    • Resources
    • All Resources
    • CISO Guides
    • Case Studies
    • eBooks
    • Guides
    • Dummies Guides
    • Webinars
    • Additional Resources
    • Adversary Research Team
    • Think Bad, Do Good Podcast
    • Community
    • Glossary
  • Demo
  • Sign-Up for Flex
  • Login to Flex
See All Posts

Threat-informed defense

Episode 1: APT29 and Threat Informed Defense (Pilot)

Published July 28, 2020


Contributors

  • Jonathan Reiber
    Jonathan Reiber

More by this author

Center for Threat-Informed Defense

A Year of Impact: AttackIQ’s Applied Research in Threat-Informed Defense

Read More
Adversary Emulation

Testing with Realism: Attack Flows and AttackIQ Attack Graphs  

Read More
Ransomware

The trick to handling ransomware: prepare  

Read More

TAGS:

APT29 , Purple Teaming , Threat-Informed Defense

About the Author

  • Jonathan Reiber
    Jonathan Reiber
    Jonathan Reiber is Vice President for Cybersecurity Strategy and Policy at AttackIQ, where he leads the company’s narrative and content creation programs and directs key strategic issues in research and analysis, communications, and security planning. During the Obama administration he served as Speechwriter and Chief Strategy Officer for Cyber Policy in the Office of the Secretary of Defense, where he authored the first two national cyberdefense strategies of the United States. His commentary has appeared in TIME Magazine, Foreign Policy, Lawfare, and The Atlantic Monthly among others, and his research has been supported by the Smith Richardson Foundation, Watson Foundation, and Berkeley’s Center for Long-Term Cybersecurity. He is the author of A Public, Private War, the findings of which were adopted by the U.S. Cybersecurity Solarium Commission and the National Defense Authorization Act of 2021 and led to the creation of CISA’s Joint Cyber Defense Collaborative. He is a graduate of Middlebury College, where he majored in Religious Studies, and The Fletcher School of Law and Diplomacy, where he studied U.S. Diplomatic History and International Security Policy. You can follow him on Twitter @jonathanreiber Learn More
  • Twitter
  • LinkedIn
  • YouTube

171 Main Street, Suite 656
Los Altos, CA 94022
+1 (888) 588-9116

  • CTEM
  • MITRE ATT&CK
  • Adversary Research Team
  • Blog
  • Who We Are
  • AttackIQ Community
  • Customers
  • Support
  • Contact
  • Careers
Privacy EULA
©2026 AttackIQ. All right reserved.