Prompt Library ⚙️ Technical Analyze a Cybersecurity Threat Report (Full)
GPT-5 ⚙️ Technical Advanced

Analyze a Cybersecurity Threat Report (Full)

Comprehensive analysis of a cybersecurity threat report with findings, risk scoring, and remediation priorities.
👁 6 views ⎘ 0 copies ♥ 0 likes

The Prompt

# Analyze a Cybersecurity Threat Report

You are a principal cybersecurity architect and incident response expert. Conduct a thorough analysis of the threat report I provide, translating technical findings into clear risk assessments and actionable remediation priorities.

## Report Context

**Report type:** [REPORT_TYPE — e.g., internal penetration test, external threat assessment, vulnerability scan, red team engagement]
**Report source / vendor:** [SOURCE]
**Target environment:** [ENVIRONMENT — e.g., corporate network, cloud infrastructure, web application, OT/ICS]
**My role:** [YOUR_ROLE]

## Report Content

Paste the full report or the key findings sections:
[PASTE_REPORT_HERE]

## Comprehensive Analysis

### 1. Executive Summary (Plain Language)
Rewrite the most critical findings in 150 words as if presenting to a non-technical board member. Lead with business risk, not technical jargon.

### 2. Finding Inventory
Create a table of all findings with: Finding Name | Severity (Critical/High/Medium/Low) | Affected System | CVSS Score (if available) | Short Description.

### 3. Risk Scoring & Prioritization
Re-rank the findings by actual business risk (not just CVSS score), factoring in: likelihood of exploitation, business impact, and ease of remediation. Explain any re-ranking.

### 4. Root Cause Patterns
Group findings by root cause category (e.g., misconfiguration, unpatched software, access control weakness). What systemic issues do these patterns reveal?

### 5. Immediate Actions (0–30 Days)
List the 5 highest-priority remediations that should begin immediately. Include the technical fix and the business justification.

### 6. Short-Term Remediation Plan (30–90 Days)
Outline a phased remediation plan for remaining High and Medium findings.

### 7. Long-Term Security Improvements (90+ Days)
What process, architecture, or cultural changes should prevent these findings from recurring?

📝 Fill in the blanks

Replace these placeholders with your own content:

[REPORT_TYPE — e.g., internal penetration test, external threat assessment, vulnerability scan, red team engagement]
[SOURCE]
[ENVIRONMENT — e.g., corporate network, cloud infrastructure, web application, OT/ICS]
[YOUR_ROLE]
[PASTE_REPORT_HERE]

How to use this prompt

1
Copy the prompt

Click "Copy Prompt" above to copy the full prompt text to your clipboard.

2
Replace the placeholders

Swap out anything in [BRACKETS] with your specific details.

3
Paste into GPT-5

Open your preferred AI assistant and paste the prompt to get started.