How to define and build an effective cyber threat intelligence capability

<i><b>Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security</b></i> is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure,...

Descripción completa

Detalles Bibliográficos
Otros Autores: Dalziel, Henry, author (author), Olson, Eric, contributing editor (contributing editor), Carnall, James, contributing editor
Formato: Libro electrónico
Idioma:Inglés
Publicado: Waltham, Massachusetts : Syngress 2015.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629220306719
Tabla de Contenidos:
  • Cover; Title Page; Copyright Page; Table of contents; Author Biography; Contributing Editors' Biography; Chapter 1 - Introduction; Chapter 2 - A Problem Well-Defined is Half-Solved; 2.1 Data feeds vs. intelligence ; 2.2 Defining threat intelligence ; Chapter 3 - Defining Business Objectives or "Start with Why"; 3.1 When defining business objectives, language matters ; Chapter 4 - Common Objectives of a Threat Intelligence Program; 4.1 - Once you have your why...; Chapter 5 - Translating Objectives into Needs, or "Why Drives What"
  • 5.1 Illustration: translating the objective into concrete intelligence needs Chapter 6 - How Technology Models Operationalize Threat Data; 6.1 - How- labor options or "how much do I do myself?" ; 6.2 - Implementation - the best laid plans ; Chapter 7 - Who: Given Why, What, and How, Now You Can Ask Where To Get It; 7.1 - Reporting and management communication ; 7.2 - Defining and articulating budget needs ; Chapter 8 - Conclusion and Recap