<p>As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective.</p><p>Tod
The Intelligence Handbook: A Roadmap for Building an Intelligence-Led Security Program
โ Scribed by CyberEdge Group, LLC
- Publisher
- CyberEdge Group, LLC
- Year
- 2022
- Tongue
- English
- Leaves
- 198
- Edition
- 4
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The Intelligence Handbook: A Roadmap for Building an Intelligence-Led Security Program.
โฆ Table of Contents
The Intelligence Handbook, Fourth Edition
Acknowledgements
Table of Contents
Foreword to the Fourth Edition
Introduction
Section 1: What Is Intelligence for Security Teams?
Chapter 1: What Is Intelligence for Security Teams?
Visibility Into Threats Before They Strike
Intelligence: Actionable Facts and Insights
Intelligence: The Process
Who Benefits From Intelligence?
Chapter 2: Types and Sources
Two Types of Intelligence
The Role of Threat Data Feeds
The Role of Private Channels and the Dark Web
Chapter 3: The Intelligence Life Cycle
The Six Phases of the Intelligence Life Cycle
Tools and People
Section 2: Applications of Intelligence for Security Teams
Chapter 4: SecOps Intelligence Part 1 โ Triage
Responsibilities of the SecOps Team
The Overwhelming Volume of Alerts
Context Is King
Shortening the โTime to Noโ
Chapter 5: SecOps Intelligence Part 2 โ Response
Continuing Challenges
The Reactivity Problem
Minimizing Reactivity in Incident Response
Strengthening Incident Response With Intelligence
SecOps Intelligence in Action
Essential Characteristics of SecOps Intelligence for Incident Response
Chapter 6: Vulnerability Intelligence
The Vulnerability Problem by the Numbers
Assess Risk Based on Exploitability
The Genesis of Intelligence for Security Teams: Vulnerability Databases
Vulnerability Intelligence and Real Risk
Sources of Intelligence
Use Cases for Cross-Referencing Intelligence
Bridging the Risk Gaps Among Security, Operations, and Business Leadership
Chapter 7: Threat Intelligence Part 1 โ Knowing Attackers
Our Definition of โThreat Intelligenceโ
Understand Your Enemy
Criminal Communities and the Dark Web
Connecting the Dots
Use Case: More Comprehensive Incident Response
Use Case: Proactive Threat Hunting
Use Case: Advance Warning of Payment Fraud
Chapter 8: Threat Intelligence Part 2 โ Risk Analysis
The FAIR Risk Model
Intelligence and Threat Probabilities
Intelligence and the Financial Cost of Attacks
Chapter 9: Third-Party Intelligence
Third-Party Risk Looms Large
Traditional Risk Assessments Fall Short
What to Look for in Third-Party Intelligence
Monitor Third Parties for These Five Critical Risks
Responding to High Third-Party Risk Scores
Chapter 10: Brand Intelligence
A Different Kind of Detection
Uncovering Evidence of Brand Impersonation and Abuse
Uncovering Evidence of Breaches on the Web
Critical Qualities for Brand Intelligence Solutions
Chapter 11: Geopolitical Intelligence
What Is Geopolitical Risk?
Geopolitical Intelligence
Who Uses Geopolitical Intelligence?
Data Collection With Geofencing
Data and Information Sources
Automation, Analytics, and Expertise
Interacting With Geopolitical Intelligence
Geopolitics and Cyber Threats
Chapter 12: Fraud Intelligence
Fraud Intelligence and Risk Assessment
Monitor Card Portfolio Exposure and Leaked Credentials
Identify Compromised Common Points of Purchase
Monitor Websites for Magecart and Other Attacks
Identify Signals
The ROI of Fraud Intelligence
Chapter 13: Identity Intelligence
Protecting Authentication
A Plan to Protect Identities
Sources for Stolen Identities
High-Volume Triage
Using Identity Information
Chapter 14: Attack Surface Intelligence
Your Digital Attack Surface Is Bigger Than You Think
Discovering Internet-Facing Assets
Analyzing the Exposed Assets
Continuously Monitoring the Attack Surface
Who Uses Attack Surface Intelligence?
Chapter 15: Intelligence for Security Leaders
Risk Management
Mitigation: People, Processes, and Tools
Investment
Communication
Supporting Security Leaders
The Security Skills Gap
Chapter 16: Intelligence for Prioritizing Emerging Threats
Planning for Next Year Today
Using Attack Life Cycles to Assess Risks
Deepfakes: Fraudโs Next Frontier
Insider Recruitment for Fraud
Databases and Network Access for Sale
Section 3: Creating and Scaling Your Intelligence Program
Chapter 17: Analytical Frameworks for Intelligence
The Lockheed Martin Cyber Kill Chainยฎ
The Diamond Model
The MITRE ATT&CKโข Framework
Chapter 18: Intelligence Data Sources and Types: A Framework
A Framework for Intelligence Data
Initial Access
Lateral Movement, Escalation, and Reconnaissance
Data Exfiltration
Ransomware Payload Drop
A Flexible Framework
Chapter 19: Your Intelligence Journey
Donโt Start With Threat Feeds
Clarify Your Intelligence Needs and Goals
Key Success Factors
Start Simple and Scale Up
Chapter 20: Developing Your Core Intelligence Team
Dedicated, but Not Necessarily Separate
Core Competencies
Collecting and Enriching Threat Data
Engaging With Intelligence Communities
Conclusion: Using Intelligence to Disrupt Adversaries
Key Takeaways From the Book
Back cover
๐ SIMILAR VOLUMES
<p><p>This book investigates the emergence of an EU strategic intelligence community as a complex multi-dimensional networked construction. It examines the constitution, structure and performance of EU intelligence arrangements as part of security policies of the European Union. </p><p>Intelligence
<p>This practical guide to artificial intelligence and its impact on industry dispels common myths and calls for cross-sector, collaborative leadership for the responsible design and embedding of AI in the daily work of businesses and oversight by boards.</p><p><li> Provides a strategic framework fo
<p>Since the September 11 terrorist attacksโconsidered one of the worst intelligence failures in US historyโthe many agencies that constitute the homeland security enterprise have aggressively developed their intelligence capabilities and activities. Jeffrey Dailey and James Phelps provide a compreh
Supply Market Intelligence: A Managerial Handbook for Building Sourcing Strategies charts the course to success for executives who are seeking to lead their organizations to supply-chain maturity. This volume is intended for supply-chain executives who struggle with the challenges of an uncertain su