{"id":1887202,"date":"2025-03-27T13:55:06","date_gmt":"2025-03-27T20:55:06","guid":{"rendered":"https:\/\/www.esri.com\/arcgis-blog\/?post_type=blog&#038;p=1887202"},"modified":"2025-09-09T14:58:20","modified_gmt":"2025-09-09T21:58:20","slug":"arcgis-allsource-new-arsenal-against-cyber-threats","status":"publish","type":"blog","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats","title":{"rendered":"ArcGIS AllSource:  The New Arsenal Against Cyber Threats"},"author":312742,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":""},"categories":[24641],"tags":[],"industry":[],"product":[764612],"class_list":["post-1887202","blog","type-blog","status-publish","format-standard","hentry","category-defense","product-allsource"],"acf":{"related_articles":[{"ID":1730442,"post_author":"312742","post_date":"2024-10-11 14:47:06","post_date_gmt":"2024-10-11 21:47:06","post_content":"","post_title":"ArcGIS AllSource: Revealing Opioid Diversion","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"closed","post_password":"","post_name":"arcgis-allsource-revealing-opioid-diversion","to_ping":"","pinged":"","post_modified":"2025-09-09 14:58:43","post_modified_gmt":"2025-09-09 21:58:43","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.esri.com\/arcgis-blog\/?post_type=blog&#038;p=1730442","menu_order":0,"post_type":"blog","post_mime_type":"","comment_count":"0","filter":"raw"},{"ID":1872382,"post_author":"331272","post_date":"2023-03-15 08:16:59","post_date_gmt":"2023-03-15 15:16:59","post_content":"","post_title":"What is ArcGIS AllSource?","post_excerpt":"","post_status":"publish","comment_status":"open","ping_status":"closed","post_password":"","post_name":"what-is-arcgis-allsource","to_ping":"","pinged":"","post_modified":"2023-06-22 13:44:15","post_modified_gmt":"2023-06-22 20:44:15","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.esri.com\/arcgis-blog\/?post_type=blog&#038;p=1872382","menu_order":0,"post_type":"blog","post_mime_type":"","comment_count":"0","filter":"raw"}],"authors":[{"ID":48671,"user_firstname":"James","user_lastname":"Jones","nickname":"James_Jones","user_nicename":"james_jones","display_name":"James Jones","user_email":"James_Jones@esri.com","user_url":"","user_registered":"2020-06-18 14:33:24","user_description":"Product Owner for ArcGIS AllSource.  Lover of all things python, link analysis, and intelligence analysis.","user_avatar":"<img data-del=\"avatar\" src='https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2020\/07\/James-Jones-213x200.png' class='avatar pp-user-avatar avatar-96 photo ' height='96' width='96'\/>"},{"ID":336182,"user_firstname":"Drew","user_lastname":"Young","nickname":"dyoung","user_nicename":"dyoung","display_name":"Drew Young","user_email":"dyoung@esri.com","user_url":"","user_registered":"2023-03-29 17:49:49","user_description":"Drew is a Product Manager on the ArcGIS AllSource Team with over 20 years of experience supporting a wide variety of GIS solutions and intelligence exploitation systems for the DoD and Intelligence Communities.","user_avatar":"<img data-del=\"avatar\" src='https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/intro1-213x200.jpg' class='avatar pp-user-avatar avatar-96 photo ' height='96' width='96'\/>"}],"short_description":"ArcGIS AllSource adds an incredibly robust, extensible analysis capability to support the ongoing efforts surrounding cyber threat intelligence.","flexible_content":[{"acf_fc_layout":"content","content":"<p><span data-contrast=\"auto\">Threat actors in cyberspace often work indiscriminately to expose and exploit vulnerabilities; these crafty adversaries can compromise, infiltrate, and exfiltrate your most guarded secrets. Information gathered on your cyber pattern of life (PoL) can be used as leverage in malicious ways and the challenges that each individual and organization continues to encounter in the face of an ever-evolving cyber threat grow in complexity daily.\u00a0 <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As teams actively pursue creative methods to mitigate the consequences inflicted upon our communities from cyberattacks, new advances in technological surveillance, detection, and analysis continue to serve as a force multiplier for many outnumbered, task-saturated crews charged with its protection. Adversarial tactics, techniques, and procedures (TTPs) are captured and studied to ensure defense strategies are in place and evolve with threat complexity. Cyberattacks represent a\u00a0 new brand of guerilla warfare whose unfamiliar operational space is constantly being used against us. We must consider new approaches as the consequences of underestimating this threat could bring considerable damage.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">ArcGIS AllSource adds an incredibly robust, extensible analysis capability to support the ongoing efforts surrounding cyber threat intelligence. AllSource can be used in all phases of the Cyber Threat Intelligence Cycle, while leveraging advanced analytics of the ArcGIS Enterprise from backend servers like the Knowledge Server, to identify threat vectors and deploy mitigation strategies to protect an organization\u2019s cyber infrastructure.\u00a0\u00a0 <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Direction<\/span><\/b><span data-contrast=\"auto\">: <\/span><\/h3>\n<p><span data-contrast=\"auto\">Before we can develop and implement our threat intelligence strategy successfully, it\u2019s essential to identify what it is we\u2019re setting out to protect in the first place. An organization\u2019s priorities can be captured in ArcGIS AllSource as the starting point for the cyber security program to grow. A clear, specific understanding of the potential impacts to any level of compromise and their role in its prevention is required by all Stakeholders within an organization.\u00a0 In today\u2019s business spaces, our ability to turn data into a competitive advantage is the difference between thriving as a business and shuttering the doors.\u00a0 Ensuring that all Team members understand the organization\u2019s key priorities allows for highly responsive defense in response to or preventing an attack.\u00a0 <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Collection<\/span><\/b><span data-contrast=\"auto\">: <\/span><\/h3>\n<p><span data-contrast=\"auto\">ArcGIS AllSource, as the name would imply, is born for all-source data fusion and holds that as one of its critical functions to ensure analysts can visualize and perform robust analysis workflows on that data to support informed decision making.\u00a0 <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For cybersecurity professionals, collection often comes from open-source intelligence (OSINT) outlets like social media where insights can be gleaned from threat actors touting their skills, or communities of practice using the medium as a common communication pipeline to discuss current cyber activities and trends. Suppose a cyber analyst detects activity based around a certain threat vector like a right-to-left override.\u00a0 In that case, ArcGIS AllSource can be utilized to further investigate and set in motion a series of steps to ensure preemptive mitigation of such an attack. Mapping in data sources like the MITRE ATT&amp;CK framework allows analysts to begin layering information that can be used to extract insights on a particular situation.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Processing: <\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Once our data sources are mapped successfully and information flows into AllSource, it\u2019s often necessary to prepare the data, normalizing it for use within the Enterprise.<\/span><b><span data-contrast=\"auto\">\u00a0\u00a0<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">ArcGIS AllSource has many tools to help us normalize and clean our data. The MITRE ATT&amp;CK dataset has many ways to access the data, such as a JavaScript Object Notation file (JSON), a Python library, and a Microsoft Excel workbook. We will start by downloading the Microsoft Excel workbook and using this to create our necessary products.\u00a0 <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The Excel Workbook comes with many sheets, including fields we can clean up to gain more insight into our analysis. First, we can import each of these sheets into a mobile geodatabase to get the correct field types and allow for a more robust analytical experience. Converting these sheets to a table in a mobile geodatabase is quite simple; we only need to right-click on the sheet and export our data.\u00a0<\/span><\/p>\n"},{"acf_fc_layout":"image","image":{"ID":1887402,"id":1887402,"title":"Screenshot 2023-03-27 at 1.32.40 PM","filename":"Screenshot-2023-03-27-at-1.32.40-PM.png","filesize":2262564,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-1.32.40-PM.png","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats\/screenshot-2023-03-27-at-1-32-40-pm","alt":"","author":"312742","description":"","caption":"Excel workbook of MITRE ATT&amp;CK data set.","name":"screenshot-2023-03-27-at-1-32-40-pm","status":"inherit","uploaded_to":1887202,"date":"2023-03-27 20:32:53","modified":"2023-03-29 22:08:59","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":2556,"height":1396,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-1.32.40-PM-213x200.png","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-1.32.40-PM.png","medium-width":464,"medium-height":253,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-1.32.40-PM.png","medium_large-width":768,"medium_large-height":419,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-1.32.40-PM.png","large-width":1920,"large-height":1049,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-1.32.40-PM-1536x839.png","1536x1536-width":1536,"1536x1536-height":839,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-1.32.40-PM-2048x1119.png","2048x2048-width":2048,"2048x2048-height":1119,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-1.32.40-PM-826x451.png","card_image-width":826,"card_image-height":451,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-1.32.40-PM-1920x1049.png","wide_image-width":1920,"wide_image-height":1049}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<p><span class=\"TextRun SCXW219041623 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW219041623 BCX0\">Once that is <\/span><span class=\"NormalTextRun SCXW219041623 BCX0\">complete<\/span><span class=\"NormalTextRun SCXW219041623 BCX0\">, we can adjust some of the field types. One thing we can do is change the <\/span><\/span><span class=\"TextRun SCXW219041623 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW219041623 BCX0\">Created<\/span><\/span><span class=\"TextRun SCXW219041623 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW219041623 BCX0\"> and <\/span><\/span><span class=\"TextRun SCXW219041623 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW219041623 BCX0\">Last Modified<\/span><\/span><span class=\"TextRun SCXW219041623 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW219041623 BCX0\"> fields that are present in each table from text fields to date fields. ArcGIS AllSource includes many tools to help you clean your data, including the useful <\/span><\/span><span class=\"TextRun SCXW219041623 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW219041623 BCX0\">Convert Time Field<\/span><span class=\"NormalTextRun SCXW219041623 BCX0\">;<\/span><\/span><span class=\"TextRun SCXW219041623 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW219041623 BCX0\"> this tool allows you to convert many field types to a date field or any other field type of your choice.<\/span><\/span><\/p>\n"},{"acf_fc_layout":"image","image":{"ID":1887222,"id":1887222,"title":"Screenshot 2023-03-27 at 11.00.04 AM","filename":"Screenshot-2023-03-27-at-11.00.04-AM-e1679949807476.png","filesize":359109,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-11.00.04-AM-e1679949807476.png","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats\/screenshot-2023-03-27-at-11-00-04-am","alt":"","author":"312742","description":"","caption":"Geoprocessing Tool","name":"screenshot-2023-03-27-at-11-00-04-am","status":"inherit","uploaded_to":1887202,"date":"2023-03-27 18:00:16","modified":"2023-03-29 22:09:13","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":302,"height":349,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-11.00.04-AM-e1679949807476-213x200.png","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-11.00.04-AM-e1679949807476-226x261.png","medium-width":226,"medium-height":261,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-11.00.04-AM-e1679949807476.png","medium_large-width":302,"medium_large-height":349,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-11.00.04-AM-e1679949807476.png","large-width":302,"large-height":349,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-11.00.04-AM-e1679949807476.png","1536x1536-width":302,"1536x1536-height":349,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-11.00.04-AM-e1679949807476.png","2048x2048-width":302,"2048x2048-height":349,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-11.00.04-AM-402x465.png","card_image-width":402,"card_image-height":465,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Screenshot-2023-03-27-at-11.00.04-AM-933x1080.png","wide_image-width":933,"wide_image-height":1080}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<h3><b><span data-contrast=\"auto\">Analysis and Production:<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Now that the data is prepared for use, we can leverage the advanced analysis functionality provided by the backend ArcGIS Knowledge Server deployed within the Enterprise to provide additional understanding about the right-to-left override threat vector we\u2019d encountered.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">After hearing that a right-to-left threat vector had been employed recently, we can drill down into the data to further understand the number, cadence, and location<\/span> <span data-contrast=\"auto\">of similar attacks that have been reported over a specified period. With a substantial uptick of use in a particular area, we can leverage additional insights from social media to see increased negative rhetoric from threat actors out of a specific region. Expanding the resultant knowledge graph displayed in AllSource from the MITRE ATT&amp;CK dataset, we can find a handful of organizations that are particularly prone to this kind of attack. Selecting the organization, Entity1, we learn this is a terror organization.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n"},{"acf_fc_layout":"image","image":{"ID":1887412,"id":1887412,"title":"a370efe0-65cd-411b-9b3f-486658758bc1","filename":"a370efe0-65cd-411b-9b3f-486658758bc1.jpg","filesize":26873,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/a370efe0-65cd-411b-9b3f-486658758bc1.jpg","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats\/a370efe0-65cd-411b-9b3f-486658758bc1","alt":"","author":"312742","description":"","caption":"Link chart for threat vectors.","name":"a370efe0-65cd-411b-9b3f-486658758bc1","status":"inherit","uploaded_to":1887202,"date":"2023-03-27 20:33:30","modified":"2023-03-29 22:12:11","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":800,"height":436,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/a370efe0-65cd-411b-9b3f-486658758bc1-213x200.jpg","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/a370efe0-65cd-411b-9b3f-486658758bc1.jpg","medium-width":464,"medium-height":253,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/a370efe0-65cd-411b-9b3f-486658758bc1.jpg","medium_large-width":768,"medium_large-height":419,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/a370efe0-65cd-411b-9b3f-486658758bc1.jpg","large-width":800,"large-height":436,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/a370efe0-65cd-411b-9b3f-486658758bc1.jpg","1536x1536-width":800,"1536x1536-height":436,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/a370efe0-65cd-411b-9b3f-486658758bc1.jpg","2048x2048-width":800,"2048x2048-height":436,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/a370efe0-65cd-411b-9b3f-486658758bc1.jpg","card_image-width":800,"card_image-height":436,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/a370efe0-65cd-411b-9b3f-486658758bc1.jpg","wide_image-width":800,"wide_image-height":436}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<p><span class=\"TextRun MacChromeBold SCXW46939710 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW46939710 BCX0\">Entity1<\/span><\/span><span class=\"TextRun SCXW46939710 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"> <span class=\"NormalTextRun SCXW46939710 BCX0\">is known to utilize additional<\/span><span class=\"NormalTextRun SCXW46939710 BCX0\">\u00a0threat vectors in their attacks. Using AllSource, we can identify such attacks and drill down on their mitigation steps. Seeing that this <\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW46939710 BCX0\">particular organization<\/span><span class=\"NormalTextRun SCXW46939710 BCX0\"> matched well with the description of activities found in our OSINT collections, we could recommend to leadership with a marked level of confidence that deploying the steps involved with mitigating the effects of such an attack could increase our security posture in the face of such an adv<\/span><span class=\"NormalTextRun SCXW46939710 BCX0\">ersary<\/span><span class=\"NormalTextRun SCXW46939710 BCX0\">.\u00a0\u00a0<\/span><\/span><span class=\"EOP SCXW46939710 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n"},{"acf_fc_layout":"image","image":{"ID":1887422,"id":1887422,"title":"54d1d0db-c5e8-4b3b-8bda-49d27ebf9ec2","filename":"54d1d0db-c5e8-4b3b-8bda-49d27ebf9ec2.jpg","filesize":29597,"url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/54d1d0db-c5e8-4b3b-8bda-49d27ebf9ec2.jpg","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats\/54d1d0db-c5e8-4b3b-8bda-49d27ebf9ec2","alt":"","author":"312742","description":"","caption":"Link chart for threat vectors.","name":"54d1d0db-c5e8-4b3b-8bda-49d27ebf9ec2","status":"inherit","uploaded_to":1887202,"date":"2023-03-27 20:34:03","modified":"2023-03-29 22:12:18","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.esri.com\/arcgis-blog\/wp-includes\/images\/media\/default.png","width":800,"height":435,"sizes":{"thumbnail":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/54d1d0db-c5e8-4b3b-8bda-49d27ebf9ec2-213x200.jpg","thumbnail-width":213,"thumbnail-height":200,"medium":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/54d1d0db-c5e8-4b3b-8bda-49d27ebf9ec2.jpg","medium-width":464,"medium-height":252,"medium_large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/54d1d0db-c5e8-4b3b-8bda-49d27ebf9ec2.jpg","medium_large-width":768,"medium_large-height":418,"large":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/54d1d0db-c5e8-4b3b-8bda-49d27ebf9ec2.jpg","large-width":800,"large-height":435,"1536x1536":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/54d1d0db-c5e8-4b3b-8bda-49d27ebf9ec2.jpg","1536x1536-width":800,"1536x1536-height":435,"2048x2048":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/54d1d0db-c5e8-4b3b-8bda-49d27ebf9ec2.jpg","2048x2048-width":800,"2048x2048-height":435,"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/54d1d0db-c5e8-4b3b-8bda-49d27ebf9ec2.jpg","card_image-width":800,"card_image-height":435,"wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/54d1d0db-c5e8-4b3b-8bda-49d27ebf9ec2.jpg","wide_image-width":800,"wide_image-height":435}},"image_position":"center","orientation":"horizontal","hyperlink":""},{"acf_fc_layout":"content","content":"<p><span data-contrast=\"auto\">Once all the relevant data has been collected, we can export each relevant field to .png files to support a final product consisting of our recommended way forward. This will provide all the relevant stakeholders\/decision makers with the full scope of the current operational landscape.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Dissemination: <\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Now it\u2019s time to share the information with those critical stakeholders.\u00a0 This is done seamlessly through various methods\/formats shown here under the \u201cDissemination\u201d heading on the AllSource ribbon bar. The cybersecurity teams will move out from decisions made to ensure mitigation actions are set in place, any additional preemptive measures necessary to prevent or insulate the architecture from follow-on attacks are implemented.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Feedback<\/span><\/b><span data-contrast=\"auto\">: <\/span><\/h3>\n<p><span data-contrast=\"auto\">Finally, an analysis of the efficacy of our defenses to prevent an attack or lessen its severity is necessary to ensure that our security posture evolves with the threat itself. In a post-reflection session, stakeholders can use ArcGIS AllSource to capture critical insights and adjust mitigation steps accordingly to ensure any new requirements in defensive tactics are captured and cataloged. This continued refinement of tactics to defend organizational priorities is an ever-evolving process to posture your team best for combat against threat actors looking to impose their will.\u00a0 <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The sheer volume of data supporting cyber threat intelligence can be overwhelming. Making sense of that data by extracting insights and bringing context to activities in the space is where you\u2019ll see ArcGIS AllSource excel to reach its fullest expression of capability.\u00a0 The sophisticated threat lurking in the shadows requires a great deal of planning, intimate knowledge of the tools at hand, and domain expertise by your cyber security cadre to challenge properly.\u00a0 AllSource allows organizations to move forward confidently, prepared to engage and protect what is most valuable.\u00a0 <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To learn more about <a href=\"https:\/\/www.esri.com\/en-us\/arcgis\/products\/arcgis-allsource\/overview\">ArcGIS AllSource<\/a> contact your <a href=\"https:\/\/www.esri.com\/en-us\/arcgis\/products\/arcgis-allsource\/overview#contact\">Esri representative<\/a>.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n"}],"card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Untitled-design-4-3.png","wide_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Untitled-design-4-4.png"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ArcGIS AllSource: The New Arsenal Against Cyber Threats<\/title>\n<meta name=\"description\" content=\"Advance your intelligence and investigative analysis workflows for cyber threats with ArcGIS AllSource\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ArcGIS AllSource: The New Arsenal Against Cyber Threats\" \/>\n<meta property=\"og:description\" content=\"Advance your intelligence and investigative analysis workflows for cyber threats with ArcGIS AllSource\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats\" \/>\n<meta property=\"og:site_name\" content=\"ArcGIS Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/esrigis\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-09T21:58:20+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ESRI\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats\"},\"author\":{\"name\":\"Julia Smyth\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/bb49011ef6f0a9331032082525f1c2c3\"},\"headline\":\"ArcGIS AllSource: The New Arsenal Against Cyber Threats\",\"datePublished\":\"2025-03-27T20:55:06+00:00\",\"dateModified\":\"2025-09-09T21:58:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats\"},\"wordCount\":8,\"publisher\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#organization\"},\"articleSection\":[\"Defense and Intelligence\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats\",\"name\":\"ArcGIS AllSource: The New Arsenal Against Cyber Threats\",\"isPartOf\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#website\"},\"datePublished\":\"2025-03-27T20:55:06+00:00\",\"dateModified\":\"2025-09-09T21:58:20+00:00\",\"description\":\"Advance your intelligence and investigative analysis workflows for cyber threats with ArcGIS AllSource\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esri.com\/arcgis-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ArcGIS AllSource: The New Arsenal Against Cyber Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#website\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/\",\"name\":\"ArcGIS Blog\",\"description\":\"Get insider info from Esri product teams\",\"publisher\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esri.com\/arcgis-blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#organization\",\"name\":\"Esri\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png\",\"contentUrl\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png\",\"width\":400,\"height\":400,\"caption\":\"Esri\"},\"image\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/esrigis\/\",\"https:\/\/x.com\/ESRI\",\"https:\/\/www.linkedin.com\/company\/5311\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/bb49011ef6f0a9331032082525f1c2c3\",\"name\":\"Julia Smyth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2022\/10\/Unknown-5-213x200.jpeg\",\"contentUrl\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2022\/10\/Unknown-5-213x200.jpeg\",\"caption\":\"Julia Smyth\"},\"description\":\"Julia is a Product Marketing Manager on the Operational Intelligence team at Esri, primarily working with ArcGIS Mission and ArcGIS AllSource.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/julia-smyth\/\"],\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/author\/julia-smyth\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ArcGIS AllSource: The New Arsenal Against Cyber Threats","description":"Advance your intelligence and investigative analysis workflows for cyber threats with ArcGIS AllSource","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats","og_locale":"en_US","og_type":"article","og_title":"ArcGIS AllSource: The New Arsenal Against Cyber Threats","og_description":"Advance your intelligence and investigative analysis workflows for cyber threats with ArcGIS AllSource","og_url":"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats","og_site_name":"ArcGIS Blog","article_publisher":"https:\/\/www.facebook.com\/esrigis\/","article_modified_time":"2025-09-09T21:58:20+00:00","twitter_card":"summary_large_image","twitter_site":"@ESRI","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats#article","isPartOf":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats"},"author":{"name":"Julia Smyth","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/bb49011ef6f0a9331032082525f1c2c3"},"headline":"ArcGIS AllSource: The New Arsenal Against Cyber Threats","datePublished":"2025-03-27T20:55:06+00:00","dateModified":"2025-09-09T21:58:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats"},"wordCount":8,"publisher":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#organization"},"articleSection":["Defense and Intelligence"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats","url":"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats","name":"ArcGIS AllSource: The New Arsenal Against Cyber Threats","isPartOf":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#website"},"datePublished":"2025-03-27T20:55:06+00:00","dateModified":"2025-09-09T21:58:20+00:00","description":"Advance your intelligence and investigative analysis workflows for cyber threats with ArcGIS AllSource","breadcrumb":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esri.com\/arcgis-blog\/"},{"@type":"ListItem","position":2,"name":"ArcGIS AllSource: The New Arsenal Against Cyber Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.esri.com\/arcgis-blog\/#website","url":"https:\/\/www.esri.com\/arcgis-blog\/","name":"ArcGIS Blog","description":"Get insider info from Esri product teams","publisher":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esri.com\/arcgis-blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esri.com\/arcgis-blog\/#organization","name":"Esri","url":"https:\/\/www.esri.com\/arcgis-blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png","contentUrl":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png","width":400,"height":400,"caption":"Esri"},"image":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/esrigis\/","https:\/\/x.com\/ESRI","https:\/\/www.linkedin.com\/company\/5311\/"]},{"@type":"Person","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/bb49011ef6f0a9331032082525f1c2c3","name":"Julia Smyth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/image\/","url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2022\/10\/Unknown-5-213x200.jpeg","contentUrl":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2022\/10\/Unknown-5-213x200.jpeg","caption":"Julia Smyth"},"description":"Julia is a Product Marketing Manager on the Operational Intelligence team at Esri, primarily working with ArcGIS Mission and ArcGIS AllSource.","sameAs":["https:\/\/www.linkedin.com\/in\/julia-smyth\/"],"url":"https:\/\/www.esri.com\/arcgis-blog\/author\/julia-smyth"}]}},"text_date":"March 27, 2025","author_name":"Multiple Authors","author_page":"https:\/\/www.esri.com\/arcgis-blog\/products\/allsource\/defense\/arcgis-allsource-new-arsenal-against-cyber-threats","custom_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/03\/Untitled-design-4-4.png","primary_product":"ArcGIS AllSource","tag_data":[],"category_data":[{"term_id":24641,"name":"Defense and Intelligence","slug":"defense","term_group":0,"term_taxonomy_id":24641,"taxonomy":"category","description":"","parent":0,"count":162,"filter":"raw"}],"product_data":[{"term_id":764612,"name":"ArcGIS AllSource","slug":"allsource","term_group":0,"term_taxonomy_id":764612,"taxonomy":"product","description":"","parent":36981,"count":37,"filter":"raw"}],"primary_product_link":"https:\/\/www.esri.com\/arcgis-blog\/?s=#&products=allsource","_links":{"self":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/blog\/1887202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/users\/312742"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/comments?post=1887202"}],"version-history":[{"count":0,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/blog\/1887202\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/media?parent=1887202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/categories?post=1887202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/tags?post=1887202"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/industry?post=1887202"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/product?post=1887202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}