the concepts from this video as part of an overall cybersecurity and cyber resilience strategy? • What processes, tools, and techniques do you think would be effective to discover and disrupt a cyber-attack while it's underway? This week's chapter of the course textbook focuses on threats, vulnerabilities, and the management processes needed to address them within the cybersecurity and cyber resilience strategy. Chapter 4 Cyber Threats, Vulnerabilities and Intelligence Analysis (Siegel and Sweeney 2020) https://www.youtube.com/watch?v=zhClg4cLemc%20