<p><i><b>Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security</b></i> is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputat
How to Define and Build an Effective Cyber Threat Intelligence Capability
β Scribed by Henry Dalziel, Eric Olson (editor), James Carnall (editor)
- Publisher
- Syngress
- Year
- 2014
- Tongue
- English
- Leaves
- 43
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental.
Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.
β¦ Table of Contents
Cover
Title Page
Copyright Page
Table of contents
Author Biography
Contributing Editors' Biography
Chapter 1 - Introduction
Chapter 2 - A Problem Well-Defined is Half-Solved
2.1 Data feeds vs. intelligence
2.2 Defining threat intelligence
Chapter 3 - Defining Business Objectives or βStart with Whyβ
3.1 When defining business objectives, language matters
Chapter 4 - Common Objectives of a Threat Intelligence Program
4.1 - Once you have your why...
Chapter 5 - Translating Objectives into Needs, or βWhy Drives Whatβ
5.1 Illustration: translating the objective into concrete intelligence needs
Chapter 6 - How Technology Models Operationalize Threat Data
6.1 - How- labor options or βhow much do I do myself?β
6.2 - Implementation β the best laid plans
Chapter 7 - Who: Given Why, What, and How, Now You Can Ask Where To Get It
7.1 - Reporting and management communication
7.2 - Defining and articulating budget needs
Chapter 8 - Conclusion and Recap
π SIMILAR VOLUMES
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation. Key Features Intelligence processes and procedures for response mechanisms Master F3EAD to drive processes based on intelligence Threat modeling and intelligent frameworks Case studies and how to
<p><b>Your systematic guide to implementing a cyber defense intelligence program in your organization</b></p><h4>Key Features</h4><ul><li>Understand intelligence processes and procedures for response mechanisms</li><li>Work through threat modeling and intelligent frameworks</li><li>Explore real-worl
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation. About This Book Intelligence processes and procedures for response mechanisms Master F3EAD to drive processes based on intelligence Threat modeling and intelligent frameworks Case studies and how to go
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation. About This Book Intelligence processes and procedures for response mechanisms Master F3EAD to drive processes based on intelligence Threat modeling and intelligent frameworks Case studies and how to go
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.Key Features Intelligence processes and procedures for response mechanisms Master F3EAD to drive processes based on intelligence Threat modeling and intelligent frameworks Case studies and how to go abou