All conflicts occur in relation to space and time. Assess how your perimeter, people, networks, applications, and databases create the ground on which the cyber conflict occurs.
Hostile actors come from a variety of sources with a range of motivations. Understand and analyze where they are coming from and what they are after in order to defend what is important to you.
Overlay your existing security technology and policy with respect to the cyber terrain and threat integration. Identify areas of strength and weakness to better craft your cyber defense strategy.