How to Define and Build an Effective Cyber Threat Intelligence Capability
4/5
()
About this ebook
Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental.
Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.
- Learn how to create a proactive strategy for digital security
- Use data analysis and threat forecasting to predict and prevent attacks before they start
- Understand the fundamentals of today's threatscape and how best to organize your defenses
Henry Dalziel
Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP).
Read more from Henry Dalziel
Next Generation Red Teaming Rating: 0 out of 5 stars0 ratingsIntroduction to US Cybersecurity Careers Rating: 3 out of 5 stars3/5Cyber Security Awareness for Corporate Directors and Board Members Rating: 1 out of 5 stars1/5How to Defeat Advanced Malware: New Tools for Protection and Forensics Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for CEOs and Management Rating: 2 out of 5 stars2/5How to Attack and Defend Your Website Rating: 0 out of 5 stars0 ratingsAutomated Security Analysis of Android and iOS Applications with Mobile Security Framework Rating: 1 out of 5 stars1/5Meeting People via WiFi and Bluetooth Rating: 0 out of 5 stars0 ratingsEssential Skills for Hackers Rating: 3 out of 5 stars3/5Infosec Management Fundamentals Rating: 5 out of 5 stars5/5Deploying Secure Containers for Training and Development Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for Lawyers Rating: 0 out of 5 stars0 ratingsSecuring Social Media in the Enterprise Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for Accountants and CPAs Rating: 0 out of 5 stars0 ratings
Related to How to Define and Build an Effective Cyber Threat Intelligence Capability
Related ebooks
Security Operations Center - Analyst Guide: SIEM Technology, Use Cases and Practices Rating: 4 out of 5 stars4/5Building Effective Cybersecurity Programs: A Security Manager’s Handbook Rating: 4 out of 5 stars4/5Offensive Security Certified Professional A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsSecurity Incident Response A Complete Guide Rating: 4 out of 5 stars4/5Cyber War: The Next Threat to National Security and What to Do About It Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Cyber Intelligence-Driven Risk: How to Build and Use Cyber Intelligence for Business Risk Decisions Rating: 0 out of 5 stars0 ratingsCyber-Physical Attacks: A Growing Invisible Threat Rating: 4 out of 5 stars4/5Research Methods for Cyber Security Rating: 0 out of 5 stars0 ratingsCybersecurity Risk Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsSecurity Engineering: A Guide to Building Dependable Distributed Systems Rating: 4 out of 5 stars4/5Cybersecurity ABCs: Delivering awareness, behaviours and culture change Rating: 0 out of 5 stars0 ratingsSeven Deadliest Network Attacks Rating: 3 out of 5 stars3/5Security Controls Evaluation, Testing, and Assessment Handbook Rating: 5 out of 5 stars5/5Kali Linux 2: Windows Penetration Testing Rating: 5 out of 5 stars5/5Threat Intelligence Capabilities A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsPenetration Tester's Open Source Toolkit Rating: 4 out of 5 stars4/5SIEM A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsScene of the Cybercrime Rating: 4 out of 5 stars4/5Cybersecurity Operations Handbook Rating: 5 out of 5 stars5/5NIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsHack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network Rating: 0 out of 5 stars0 ratingsSecuring the Cloud: Cloud Computer Security Techniques and Tactics Rating: 5 out of 5 stars5/5Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Rating: 0 out of 5 stars0 ratingsCloud Storage Forensics Rating: 4 out of 5 stars4/5Computer and Information Security Handbook Rating: 2 out of 5 stars2/5The Language of Cybersecurity Rating: 5 out of 5 stars5/5Implementing Insider Threat Prevention Cyber Security: The Psychology of Insider Threat Prevention, #3 Rating: 0 out of 5 stars0 ratings
Enterprise Applications For You
Systems Thinking: Managing Chaos and Complexity: A Platform for Designing Business Architecture Rating: 4 out of 5 stars4/5Salesforce.com For Dummies Rating: 3 out of 5 stars3/5CompTIA Project+ Study Guide: Exam PK0-005 Rating: 0 out of 5 stars0 ratingsCreating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Data Governance: How to Design, Deploy and Sustain an Effective Data Governance Program Rating: 4 out of 5 stars4/5The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Rating: 4 out of 5 stars4/5Excel 2019 Bible Rating: 4 out of 5 stars4/5Scrivener Superpowers Rating: 0 out of 5 stars0 ratingsQuickBooks 2023 All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsQuickBooks 2024 All-in-One For Dummies Rating: 0 out of 5 stars0 ratings50 Useful Excel Functions: Excel Essentials, #3 Rating: 5 out of 5 stars5/5Access 2019 For Dummies Rating: 0 out of 5 stars0 ratingsExcel 2019 For Dummies Rating: 3 out of 5 stars3/5Learn Windows PowerShell in a Month of Lunches Rating: 0 out of 5 stars0 ratingsEnterprise AI For Dummies Rating: 3 out of 5 stars3/5Bitcoin For Dummies Rating: 4 out of 5 stars4/5SharePoint 2016 For Dummies Rating: 5 out of 5 stars5/5Experts' Guide to OneNote Rating: 5 out of 5 stars5/5The New Email Revolution: Save Time, Make Money, and Write Emails People Actually Want to Read! Rating: 5 out of 5 stars5/5The Ridiculously Simple Guide To Numbers For Mac Rating: 0 out of 5 stars0 ratingsExcel Guide for Success Rating: 5 out of 5 stars5/5Excel Formulas and Functions 2020: Excel Academy, #1 Rating: 4 out of 5 stars4/5Excel : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Excel Programming: 1 Rating: 5 out of 5 stars5/5Improve your skills with Google Sheets: Professional training Rating: 0 out of 5 stars0 ratingsNotion for Beginners: Notion for Work, Play, and Productivity Rating: 4 out of 5 stars4/5
Reviews for How to Define and Build an Effective Cyber Threat Intelligence Capability
2 ratings1 review
- Rating: 5 out of 5 stars5/5Quick read to gain knowledge on building an effective threat intelligence program.
Book preview
How to Define and Build an Effective Cyber Threat Intelligence Capability - Henry Dalziel
How to Define and Build an Effective Cyber Threat Intelligence Capability
Henry Dalziel
Table of Contents
Cover
Title page
Copyright
Author Biography
Contributing Editors' Biography
Chapter 1: Introduction
Abstract
Chapter 2: A Problem Well-Defined is Half-Solved
Abstracts
2.1. Data feeds vs. intelligence
2.2. Defining threat intelligence
Chapter 3: Defining Business Objectives or Start with Why
Abstract
3.1. When defining business objectives, language matters
Chapter 4: Common Objectives of a Threat Intelligence Program
Abstract
4.1. Once you have your why...
Chapter 5: Translating Objectives into Needs, or Why Drives What
Abstract
5.1. Illustration: translating the objective into concrete intelligence needs
Chapter 6: How Technology Models Operationalize Threat Data
Abstract
6.1. How- labor options or how much do I do myself?
6.2. Implementation – the best laid plans
Chapter 7: Who: Given Why, What, and How, Now You Can Ask Where To Get It
Abstract
7.1. Reporting and management communication
7.2. Defining and articulating budget needs
Chapter 8: Conclusion and Recap
Abstract
Copyright
Syngress is an imprint of Elsevier
225 Wyman Street, Waltham, MA 02451, USA
Copyright © 2015 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described here in. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the Library of Congress.
ISBN: 978-0-12-802730-1
For information on all Syngress publications visit our website at http://store.elsevier.com/
Author Biography
Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger, and e-book author. He writes for the blog "Concise-Courses.com" and has developed numerous cybersecurity continuing education courses and books.