The document discusses techniques for detecting threats using security analytics. It begins by explaining how a typical attack sequence is too simplistic and can fail to detect real threats. It then advocates for using a threat analysis approach to understand assets, data flows, threats and tactics. This involves profiling assets, mapping components and access points, and identifying threats, sources and techniques. The document shows how to write threat indicators using security analytics tools. It provides examples of anomaly detection rules in Event Processing Language to detect complex scenarios. The goal is to leverage threat analysis to implement risk-based indicators that effectively address residual risks.