Security operations and managementUnderstanding cyber threats, IoCs, and attack methodologyIncidents, events and loggingIncident detection with Security Information and Event Management (SIEM)Enhanced incident detection with threat intelligenceIncident response