How to define and build an effective cyber threat intelligence capability
<i><b>Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security</b></i> is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure,...
Otros Autores: | , , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Waltham, Massachusetts :
Syngress
2015.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629220306719 |
Tabla de Contenidos:
- Cover; Title Page; Copyright Page; Table of contents; Author Biography; Contributing Editors' Biography; Chapter 1 - Introduction; Chapter 2 - A Problem Well-Defined is Half-Solved; 2.1 Data feeds vs. intelligence ; 2.2 Defining threat intelligence ; Chapter 3 - Defining Business Objectives or "Start with Why"; 3.1 When defining business objectives, language matters ; Chapter 4 - Common Objectives of a Threat Intelligence Program; 4.1 - Once you have your why...; Chapter 5 - Translating Objectives into Needs, or "Why Drives What"
- 5.1 Illustration: translating the objective into concrete intelligence needs Chapter 6 - How Technology Models Operationalize Threat Data; 6.1 - How- labor options or "how much do I do myself?" ; 6.2 - Implementation - the best laid plans ; Chapter 7 - Who: Given Why, What, and How, Now You Can Ask Where To Get It; 7.1 - Reporting and management communication ; 7.2 - Defining and articulating budget needs ; Chapter 8 - Conclusion and Recap