The Cyberthreat Handbook
The cyberthreat landscape is becoming ever more complex, and with exponential growth in the volume or threat related information, it is becoming impossible to manage this complexity without efficient tools and methods. The collaboration between Thales and Verint on this document is of enormous value. In order to make the report a real operational tool, we have selected the groups of cyberthreat that, in our opinion, deserve the most attention. We designed an exclusive scoring methodology and established individual ratings cards for each group of attackers.

As Sun Tzu said: “Know your enemy and know yourself and you can fight a hundred battles without disaster”.
In order to receive the report, please note that the form must be fully completed
Please complete this instructions to download the document :

to receive advertising documentation and messages regarding products and services likely to be of interest to me based on my specific profile as determined by THALES to anticipate my expectations and needs.

Your personal data are collected and processed by THALES in order to invite you to events and compile usage statistics to improve the management of events. You have a right of access, rectification, opposition, restriction, erasure and portability of your personal data. If you have a request or complaint, please send an e-mail to