Sign up for our free Threat Hunting Summit June 17 Register Here

Workshop: Threat Actor Profiling: Know Your Enemy

Course Authored by .

“Threat Actor Profiling: Know Your Enemy” is a 4-hour online workshop that teaches security practitioners how to identify, profile, and prioritize the threat actors most likely to come after their organization.

Live Training $25.00

Course Length: 4 Hours

Includes a Certificate of Completion



Next scheduled date: May 15th, 2026 @ 12:00 PM EDT

Description

“Threat Actor Profiling: Know Your Enemy” is a 4-hour online workshop that teaches security practitioners how to identify, profile, and prioritize the threat actors most likely to come after their organization.

Drawing from real-world intelligence frameworks, participants move from understanding adversary types, including financially motivated, nation-state, ideological, and opportunistic actors, to building structured threat actor profiles and scoring adversaries.

Through three hands-on labs, analysts leave with a repeatable process for turning threat intelligence into engineering priorities and boardroom-ready risk narratives.

No exam. Just tools, frameworks, and the mindset to focus your efforts on legitimate, motivated threats, instead of defending against the whole internet.

  • System Requirements
    • A browser and internet connection.

Syllabus

Syllabus 

Module 1 — Who Are Threat Actors? (30 min, Lecture) 

  • The four primary threat actor groups: financially motivated, nation-state, hacktivists, thrill seekers

  • Their motivations, signature behaviors, and common TTPs

  • Cross-group convergence and attack chain fundamentals

Lab 1 — Threat Actor Identification & Categorization (30 min) 

  • Research one actor from each category using public intelligence sources

  • Identify motivations, top TTPs, notable campaigns, and one example of cross-group behavior

Module 2 — Building Threat Actor Profiles (35 min, Lecture) 

  • Profile structure using the Curated Intelligence framework (who, why, how, so what)

  • Profiles as living documents

  • The four targeting lenses: sector, rivals, customers, and region

Lab 2 — Draft a Threat Actor Profile (35 min) 

  • Build a profile for an assigned actor against a financial services scenario

  • Map TTPs to MITRE ATT&CK

  • Apply targeting lenses

  • Write a CISO-ready executive summary

  • Identify one detection gap

Module 3 — Quantifying Threat Actors with Threat Box (40 min, Lecture) 

  • Andy Piazza’s Threat Box model: scoring intent and capability across four attack categories (espionage, destructive, disruptive, cybercrime)

  • Willingness and novelty modifiers

  • Reading the 5×5 matrix and translating scores to defense actions

Lab 3 — Threat Box Scoring Exercise (35 min) 

  • Score the Lab 2 actor across all four attack categories

  • Cite evidence

  • Apply the willingness modifier

  • Plot the matrix

  • Produce three prioritized defense actions for the engineering backlog

Module 4 — From Profiles to Action & Wrap-Up (15 min, Discussion) 

  • The five-step playbook: shortlist, score, translate to engineering work, measure quarterly, keep current

  • Key takeaways and next steps

FAQ

Key Takeaways
  • Identify the types of threat actors and what motivates each one

  • Understand how and why threat actor groups blend, collaborate, and cross boundaries

  • Follow the attack chain from initial access to final impact

  • Build a structured threat actor profile using a real-world template

  • Use targeting lenses to determine which adversaries are most relevant to your organization

  • Score and prioritize threat actors

  • Turn threat actor scores into concrete defense actions and engineering priorities

  • Learn how to effectively present relevant threat actors to managers

Who Should Take This Workshop
  • SOC Analysts

  • Threat Intelligence Analysts

  • Incident Responders

  • Security Engineers

Audience Skill Level 

Beginning to intermediate (practitioner level)

Prerequisites 

Basic understanding of cybersecurity concepts such as:

  • Common attack types (phishing, malware, lateral movement)

  • Security operations or incident response workflows

Familiarity with logs, alerts, or SIEM tools is helpful but not required.

No prior CTI experience is required.

About the Instructor

Pixel splash background
"Wondering in the logs"
Bio

Wade Wells is the Lead Detection Engineer for a Fortune 30 financial company. He has worked for eight years in security operations, performing threat hunting, cyber threat intelligence, and detection engineering, primarily in the financial sector. ​Active in the cybersecurity community, Wade frequently speaks at prominent industry events and is involved with several security-focused organizations.

Register for Upcoming

  • Filter by Product Date
  • Filter by Product Instructor
  • Filter by Product Type

Workshop: Threat Actor Profiling: Know Your Enemy

Pay What You Can

Live Training Wade Wells

Virtual

Includes:
  • Certificate of completion
  • 6 months class recording access via Discord 

    For tuition assistance with this course please send an email to: [email protected]
Content is loading, please wait.
Content is loading, please wait.
$25.00
May 15th, 2026 12:00 PM EDT - 4:00 PM EDT

Registration End Date: 10:00 PM, EDT May 14th 2026

Shopping Cart

No products in the cart.