The Cyberthreat Handbook
The cyberthreat landscape is becoming ever more complex, and with exponential growth in the volume or threat related information, it is becoming impossible to manage this complexity without efficient tools and methods. The collaboration between Thales and Verint on this document is of enormous value. In order to make the report a real operational tool, we have selected the groups of cyberthreat that, in our opinion, deserve the most attention. We designed an exclusive scoring methodology and established individual ratings cards for each group of attackers.

As Sun Tzu said: “Know your enemy and know yourself and you can fight a hundred battles without disaster”.
In order to receive the report, please note that the form must be fully completed
an include a PROFESSIONAL EMAIL ADRESS.
Please complete this instructions to download the document :

to receive advertising documentation and messages regarding products and services likely to be of interest to me based on my specific profile as determined by THALES to anticipate my expectations and needs.


* Your personal data are collected and processed by THALES in order to stay in touch with you and send you information about THALES news, products updates and event invitations.
We will make sure you only get what really matters to you based on your previous interaction with us. We will treat your data with respect and in accordance to our privacy policy.
You have a right of access, rectification, opposition, restriction, erasure and portability of your personal data.
If you have a request or complaint, please send an e-mail to support.internet@thalesgroup.com.