External Malicious Actor
This adversary is typically well-funded and very sophisticated. Security teams must have visibility into all activity, highlighted by data loss prevention solutions, anomalous and suspicious behavior detection, cyber threat hunting tools, and rapid and automated response capabilities.