The Threat Intelligence Handbook
โ Scribed by Chris Pace (ed.)
- Publisher
- CyberEdge Group
- Year
- 2018
- Tongue
- English
- Leaves
- 108
- Edition
- ebook
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
"A practical guide for security teams to unlocking the power of Intelligence"
--Recorded Future, Inc.
Foreword by Christopher Ahlberg.
"104-page book describing how IT security teams can leverage best-of-breed threat intelligence to mitigate todayโs advanced threats"
--CyberEdge Group, LLC
โฆ Table of Contents
Contributors
Foreword
Introduction
Chapter 1: Intelligence-Driven Security
What Have You Heard About Threat Intelligence?
The Six Phases of the Threat Intelligence Lifecycle
Tools and People
Chapter 2: Threat Intelligence for Security Operations
Responsibilities of the SOC Team
The Overwhelming Volume of Alerts
Context Is King
Improving the โTime to Noโ
Beyond Triage
Chapter 3: Threat Intelligence for Incident Response
Continuing Challenges
The Reactivity Problem
Minimizing Reactivity in Incident Response
Strengthening Incident Response With Threat Intelligence
Threat Intelligence in Action
Essential Characteristics of Threat Intelligence for Incident Response
Chapter 4: Threat Intelligence for Vulnerability Management
The Vulnerability Problem by the Numbers
Assess Risk Based on Exploitability
The Genesis of Threat Intelligence: Vulnerability Databases
Threat Intelligence and Real Risk
Sources of Intelligence
Use Case: Cross-Referencing Intelligence
Bridging the Risk Gaps Between Security, Operations,
and Business Leadership
Chapter 5: Threat Intelligence for Security Leaders
Risk Management
Mitigation: People, Processes, and Tools
Investment
Communication
Supporting Security Leaders
The Security Skills Gap
Intelligence to Manage Better
Chapter 6: Threat Intelligence for Risk Analysis
The FAIR Risk Model
Threat Intelligence and Threat Probabilities
Threat Intelligence and the Cost of Attacks
Chapter 7: Threat Intelligence for Fraud Prevention
Stand and Deliver!
Know Your Enemy
Criminal Communities and the Dark Web
Connecting the Dots for Fraud Prevention
Chapter 8: Analytical Frameworks for Threat Intelligence
The Lockheed Martin Cyber Kill Chainยฎ
The Diamond Model
The MITRE ATT&CKโข Framework
Chapter 9: Your Threat Intelligence Journey
Donโt Start With Threat Feeds
Clarify Your Threat Intelligence Needs and Goals
Key Success Factors
Start Simple and Scale Up
Chapter 10: Developing the Core Threat Intelligence Team
Dedicated, but Not Necessarily Separate
Core Competencies
The Four Types of Threat Intelligence
Collecting and Enriching Threat Data
Engaging With Threat Intelligence Communities
Conclusion
Two Key Takeaways from the Book
Appendix: Threat Intelligence Goals: A Quick Reference Guide
๐ SIMILAR VOLUMES
Handbook of Warning Intelligence: Assessing the Threat to National Security was written during the Cold War and classified for 40 years, this manual is now available to scholars and practitioners interested in both history and intelligence. Cynthia Grabo, author of the abridged version, Anticipating
<span>CYBER THREAT INTELLIGENCE</span><p><span>โMartin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesnโt just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you can do a
<p><p>This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet
<span>CYBER THREAT INTELLIGENCE</span><p><span>"Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you can do a
<span>CYBER THREAT INTELLIGENCE</span><p><span>"Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you can do a