cydea.tools

↖ View all cydea.tools

Threat Personas

We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, technology and business teams. Free cyber threat actor examples for you to pick-up, tailor, and use in your organisation!

Open

Share this on: Twitter · LinkedIn · Facebook