๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

The Threat Intelligence Handbook

โœ Scribed by Chris Pace (ed.)


Publisher
CyberEdge Group
Year
2018
Tongue
English
Leaves
108
Edition
ebook
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


"A practical guide for security teams to unlocking the power of Intelligence"
--Recorded Future, Inc.

Foreword by Christopher Ahlberg.

"104-page book describing how IT security teams can leverage best-of-breed threat intelligence to mitigate todayโ€™s advanced threats"
--CyberEdge Group, LLC

โœฆ Table of Contents


Contributors
Foreword
Introduction
Chapter 1: Intelligence-Driven Security
What Have You Heard About Threat Intelligence?
The Six Phases of the Threat Intelligence Lifecycle
Tools and People
Chapter 2: Threat Intelligence for Security Operations
Responsibilities of the SOC Team
The Overwhelming Volume of Alerts
Context Is King
Improving the โ€œTime to Noโ€
Beyond Triage
Chapter 3: Threat Intelligence for Incident Response
Continuing Challenges
The Reactivity Problem
Minimizing Reactivity in Incident Response
Strengthening Incident Response With Threat Intelligence
Threat Intelligence in Action
Essential Characteristics of Threat Intelligence for Incident Response
Chapter 4: Threat Intelligence for Vulnerability Management
The Vulnerability Problem by the Numbers
Assess Risk Based on Exploitability
The Genesis of Threat Intelligence: Vulnerability Databases
Threat Intelligence and Real Risk
Sources of Intelligence
Use Case: Cross-Referencing Intelligence
Bridging the Risk Gaps Between Security, Operations,
and Business Leadership
Chapter 5: Threat Intelligence for Security Leaders
Risk Management
Mitigation: People, Processes, and Tools
Investment
Communication
Supporting Security Leaders
The Security Skills Gap
Intelligence to Manage Better
Chapter 6: Threat Intelligence for Risk Analysis
The FAIR Risk Model
Threat Intelligence and Threat Probabilities
Threat Intelligence and the Cost of Attacks
Chapter 7: Threat Intelligence for Fraud Prevention
Stand and Deliver!
Know Your Enemy
Criminal Communities and the Dark Web
Connecting the Dots for Fraud Prevention
Chapter 8: Analytical Frameworks for Threat Intelligence
The Lockheed Martin Cyber Kill Chainยฎ
The Diamond Model
The MITRE ATT&CKโ„ข Framework
Chapter 9: Your Threat Intelligence Journey
Donโ€™t Start With Threat Feeds
Clarify Your Threat Intelligence Needs and Goals
Key Success Factors
Start Simple and Scale Up
Chapter 10: Developing the Core Threat Intelligence Team
Dedicated, but Not Necessarily Separate
Core Competencies
The Four Types of Threat Intelligence
Collecting and Enriching Threat Data
Engaging With Threat Intelligence Communities
Conclusion
Two Key Takeaways from the Book
Appendix: Threat Intelligence Goals: A Quick Reference Guide


๐Ÿ“œ SIMILAR VOLUMES


Handbook of Warning Intelligence: Assess
โœ Cynthia Grabo ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐ŸŒ English

Handbook of Warning Intelligence: Assessing the Threat to National Security was written during the Cold War and classified for 40 years, this manual is now available to scholars and practitioners interested in both history and intelligence. Cynthia Grabo, author of the abridged version, Anticipating

Cyber Threat Intelligence
โœ Martin Lee ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Wiley ๐ŸŒ English

<span>CYBER THREAT INTELLIGENCE</span><p><span>โ€œMartin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesnโ€™t just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you can do a

Cyber Threat Intelligence
โœ Ali Dehghantanha, Mauro Conti, Tooska Dargahi ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p><p>This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet

Cyber Threat Intelligence
โœ Martin Lee ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Wiley ๐ŸŒ English

<span>CYBER THREAT INTELLIGENCE</span><p><span>"Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you can do a

Cyber Threat Intelligence
โœ Martin Lee ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Wiley ๐ŸŒ English

<span>CYBER THREAT INTELLIGENCE</span><p><span>"Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you can do a