Request a Demo

The Diamond Methodology

This white paper reviews how The Diamond Model breaks each cyber event into four vertices or nodes. These vertices represent an Adversary, Capability, Infrastructure, and Victim.