{"id":46733,"date":"2022-05-19T00:00:00","date_gmt":"2022-05-19T00:00:00","guid":{"rendered":"urn:uuid:5e8ac3ef-7f9b-8bae-fc5e-2ae450a098c7"},"modified":"2022-05-19T00:00:00","modified_gmt":"2022-05-19T00:00:00","slug":"cyber-risk-management-attribution-strategies","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/","title":{"rendered":"Cyber risk management: Attribution strategies"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/22\/e\/learn-cyber-attribution-benefits-to-reduce-cyber-risk\/th-cyber-attribution-perspectives-blog-tn.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/22\/e\/learn-cyber-attribution-benefits-to-reduce-cyber-risk\/th-cyber-attribution-perspectives-blog-tn.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>What does cyber attribution really mean? Is it just pointing a finger at the bad guy? This article explores the meaning of cyber attribution, the benefits, and how to leverage security tools to help your attribution efforts.<\/p>\n<p><span class=\"body-subhead-title\">What is cyber attribution?<\/span><\/p>\n<p>Cyber attribution is the process of tracking and identifying the perpetrator of a cyberattack or other hacking exploit, which enables organizations to gain a complete picture of an attack and enhance their cybersecurity strategy for the future.<\/p>\n<p><span class=\"body-subhead-title\">Does cyber attribution really matter?<\/span><\/p>\n<p>Attribution is undeniably important, but it certainly comes with challenges. For example, it can be difficult to drill down into \u201cwhose fingers were on the keyboard in the first place\u201d or \u201cwho directed these people to put their fingers on the keyboard in the first place.\u201d Another challenge is that attribution can take a long time and may not provide immediate value during a cyber incident.<\/p>\n<p>Evidently, there are several barriers to overcome to define attribution, but it is critical for many reasons including taking law enforcement actions, international relationships, and future-proofing your enterprise security strategy.<\/p>\n<p><span class=\"body-subhead-title\">Benefits of cyber attribution<\/span><\/p>\n<p><i>1. Identify if you are a target or collateral damage<\/i><\/p>\n<p>We\u2019ve seen a shift in <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/21\/k\/ransomware-as-a-service-101.html\">ransomware actors<\/a> targeting more lucrative victims instead of hitting as many companies as possible, but that doesn\u2019t mean your organization was the initial intended target. Knowing whether your enterprise was specifically targeted helps develop an attacker profile\u2014why did they pick your organization and what are they after?<\/p>\n<p>For example, right before <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/b\/global-cyberattacks-cyber-risk.html\">Russia\u2019s invasion in Ukraine<\/a>, <a href=\"https:\/\/cyware.com\/news\/hundreds-of-cyberattacks-launched-on-ukraine-microsoft-report-d63ea069\" target=\"_blank\" rel=\"noopener\">it was reported<\/a> that at least six distinct actors launched more than 237 malicious attacks, which namely targeted financial, government, energy, and IT organizations.<\/p>\n<p>As previously mentioned, organizations may be unable to identify the \u201cwho\u201d <i>during<\/i> an attack. However, making the attribution can help in similar situations in the future. For instance, if tensions rise between two countries, security teams should be aware of potential attacks from adversaries and prioritize investigation into their specific techniques, tactics, and procedures.<\/p>\n<p><i>2. Better understand the TTPs used during an attack to enhance detection and response<\/i><\/p>\n<p>During incident response, it\u2019s crucial to quickly understand the \u201chow\u201d of a cyberattack. Furthermore, sussing out the TTPs can help point you toward the \u201cwho\u201d down the road. With an understanding of their preferred methods of attack, you can assess and prioritize your vulnerabilities and react more effectively, which limits the scope of an attack.<\/p>\n<p>For example, the aforementioned attacks against Ukraine were usually \u201cwiper attacks\u201d focused on disrupting, infiltrating, or destroying critical infrastructure. These attacks used phishing, infecting upstream IT service providers, and exploiting unpatched vulnerabilities to gain initial access. In some cases, specific destructive malware was identified such as CaddyWiper, WhisperGate, and Industroyer2. This kind of information is invaluable for security teams, as it guides their investigation and response efforts.<\/p>\n<p><i>3. Help the board see the investment value in new security tools<\/i><\/p>\n<p>Sometimes you may successfully attribute a cyberattack but be unable to limit its scope due to ineffective security tooling. But <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/21\/k\/reduce-friction-between-it-leaders-and-c-suite.html\">convincing the board<\/a> that an investment needs to be made can be its own challenge.<\/p>\n<p>Attribution helps to quell any doubts or uncertainty the c-suite may have. By mapping out the attacker profile and chain of the attack, you can clearly demonstrate to the board how your defenses simply fell short.<\/p>\n<p>Your report should also include any financial losses and how investing in a new unified cybersecurity tool can minimize cyber risk. Potential savings could be allocated toward the organization\u2019s overarching business goals, which shows the board that security is an enabler of business.<\/p>\n<p><span class=\"body-subhead-title\">Next steps<\/span><\/p>\n<p>While attribution can be complex, there are tools and frameworks that can help streamline the process. <a href=\"https:\/\/attack.mitre.org\/resources\/getting-started\/\" target=\"_blank\" rel=\"noopener\">The MITRE ATT&amp;CK Framework<\/a> is effective at identifying TTPs, methodologies, and threat groups, enabling security teams to visualize and prioritize more effectively against specific threat groups.<\/p>\n<p><a href=\"https:\/\/medium.com\/mitre-attack\/getting-started-with-attack-detection-a8e49e4960d0\" target=\"_blank\" rel=\"noopener\">According to MITRE<\/a>, \u201cthe first step to creating and using ATT&amp;CK analytics is to understand what data and search capabilities you have.\u201d To put it simply, you can\u2019t analyze what you can\u2019t see. Comprehensive visibility across the attack surface is critical, especially in hybrid-cloud environments, and unfortunately disconnected point products can lead to data gaps.<\/p>\n<p>Trend Micro Vision One\u2122, part of our unified cybersecurity platform <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/one-platform.html\">Trend Micro One<\/a>, uses market-leading <a href=\"https:\/\/www.trendmicro.com\/explore\/forrester-wave-edr\" target=\"_blank\" rel=\"noopener\">extended detection and response (XDR)<\/a> capabilities to collect and correlate deep threat data across endpoints, networks, clouds, workloads, and email. XDR helps security teams connect the dots of the attack surface lifecycle, making attribution more efficient. It also leverages threat knowledge from our global Trend Micro Research team in combination with the Trend Micro\u2122 Smart Protection Network to provide deep insight into evolving cyberattacks.<\/p>\n<p>Trend Micro Vision One features <a href=\"https:\/\/www.youtube.com\/watch?v=YzPHhpXTnb4\" target=\"_blank\" rel=\"noopener\">MITRE ATT&amp;CK Mapping<\/a> to help security teams understand and respond to the tactics, techniques, and procedures used in an attack. It also enables them to drill down into specific nodes of the attack, so they can respond and remediate vulnerabilities faster.<\/p>\n<p>New to Trend Micro Vision One is the <a href=\"https:\/\/www.youtube.com\/watch?v=xZayBzO-S-w&amp;t=529s\" target=\"_blank\" rel=\"noopener\">Executive Dashboard<\/a> \u2013 built with CISOs for CISOs to help them understand, communicate, and manage cyber risk using a risk scoring framework. This comprehensive score is based on the dynamic and continuous assessment of risk factors, including threat exposure, attack risk, and security configuration risk. The reporting features helps security leaders present critical information to the board in a succinct and understandable way.<\/p>\n<p>For more information about the benefits of a <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/one-platform.html\">unified cybersecurity platform<\/a>, check out the following resources:<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/e\/cyber-attribution-benefits.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover the importance of cyber attribution, the benefits, and the right tools to assist your efforts so you can better manage cyber risk across your digital attack surface. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46734,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9528,9549,9550,9527,9529],"class_list":["post-46733","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-ciso-article","tag-trend-micro-ciso-cloud","tag-trend-micro-ciso-detection-and-response","tag-trend-micro-ciso-expert-perspective","tag-trend-micro-ciso-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber risk management: Attribution strategies 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber risk management: Attribution strategies 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-19T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/22\/e\/learn-cyber-attribution-benefits-to-reduce-cyber-risk\/th-cyber-attribution-perspectives-blog-tn.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-attribution-strategies\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-attribution-strategies\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cyber risk management: Attribution strategies\",\"datePublished\":\"2022-05-19T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-attribution-strategies\\\/\"},\"wordCount\":921,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-attribution-strategies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cyber-risk-management-attribution-strategies.jpg\",\"keywords\":[\"Trend Micro CISO : Article\",\"Trend Micro CISO : Cloud\",\"Trend Micro CISO : Detection and Response\",\"Trend Micro CISO : Expert Perspective\",\"Trend Micro CISO : Risk Management\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-attribution-strategies\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-attribution-strategies\\\/\",\"name\":\"Cyber risk management: Attribution strategies 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-attribution-strategies\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-attribution-strategies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cyber-risk-management-attribution-strategies.jpg\",\"datePublished\":\"2022-05-19T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-attribution-strategies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-attribution-strategies\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-attribution-strategies\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cyber-risk-management-attribution-strategies.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cyber-risk-management-attribution-strategies.jpg\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-management-attribution-strategies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro CISO : Article\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-ciso-article\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber risk management: Attribution strategies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber risk management: Attribution strategies 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/","og_locale":"en_US","og_type":"article","og_title":"Cyber risk management: Attribution strategies 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-05-19T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/22\/e\/learn-cyber-attribution-benefits-to-reduce-cyber-risk\/th-cyber-attribution-perspectives-blog-tn.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cyber risk management: Attribution strategies","datePublished":"2022-05-19T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/"},"wordCount":921,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/cyber-risk-management-attribution-strategies.jpg","keywords":["Trend Micro CISO : Article","Trend Micro CISO : Cloud","Trend Micro CISO : Detection and Response","Trend Micro CISO : Expert Perspective","Trend Micro CISO : Risk Management"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/","url":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/","name":"Cyber risk management: Attribution strategies 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/cyber-risk-management-attribution-strategies.jpg","datePublished":"2022-05-19T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/cyber-risk-management-attribution-strategies.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/cyber-risk-management-attribution-strategies.jpg","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-management-attribution-strategies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro CISO : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-article\/"},{"@type":"ListItem","position":3,"name":"Cyber risk management: Attribution strategies"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46733","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46733"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46733\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46734"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}