Section outline

  • Purpose: Awareness, not technical mastery

    Key Topics

    • How attacks actually happen (step-by-step)
    • Phishing, credential theft, ransomware, insider misuse
    • Why most attacks succeed due to human and process gaps

    Framework Mapping

    • MITRE ATT&CK: Tactics overview
      • Initial Access
      • Credential Access
      • Lateral Movement
      • Impact

    Product Link

    • CHI Threat Exposure Mapping
    • Showing how CHI aligns attack paths with your controls

    Practical Exercise

    • “Could this attack work on my business?”
    • CHI scenario-based risk scoring