This case study collection attempts to connect the dots between CSA Top Threats when it comes to security analysis by using nine real-world attacks and breaches cited in the Top Threats Deep Dive for its foundation. Each of the nine examples are presented in the form of
(1) a reference chart and
(2) a detailed narrative.