There are weaknesses in an organisation’s overall cyber security posture that need to be addressed.
Adversaries who are content to simply leverage exploits that are widely available in order to gain access to, and likely control of, systems.
Adversaries who are willing to invest more time in a target and attack with much effective tools and tricks.
Adversaries who are more adaptive and much less reliant on public tools and techniques.
Strategies for organizations who have reached maturity level 3 but are still at risk.