Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

How to Define and Build an Effective Cyber Threat Intelligence Capability
How to Define and Build an Effective Cyber Threat Intelligence Capability
How to Define and Build an Effective Cyber Threat Intelligence Capability
Ebook78 pages1 hour

How to Define and Build an Effective Cyber Threat Intelligence Capability

Rating: 4 out of 5 stars

4/5

()

Read preview

About this ebook

Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental.

Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.

  • Learn how to create a proactive strategy for digital security
  • Use data analysis and threat forecasting to predict and prevent attacks before they start
  • Understand the fundamentals of today's threatscape and how best to organize your defenses
LanguageEnglish
Release dateDec 5, 2014
ISBN9780128027523
How to Define and Build an Effective Cyber Threat Intelligence Capability
Author

Henry Dalziel

Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP).

Read more from Henry Dalziel

Related to How to Define and Build an Effective Cyber Threat Intelligence Capability

Related ebooks

Enterprise Applications For You

View More

Related articles

Reviews for How to Define and Build an Effective Cyber Threat Intelligence Capability

Rating: 4 out of 5 stars
4/5

2 ratings1 review

What did you think?

Tap to rate

Review must be at least 10 words

  • Rating: 5 out of 5 stars
    5/5
    Quick read to gain knowledge on building an effective threat intelligence program.

Book preview

How to Define and Build an Effective Cyber Threat Intelligence Capability - Henry Dalziel

How to Define and Build an Effective Cyber Threat Intelligence Capability

Henry Dalziel

Table of Contents

Cover

Title page

Copyright

Author Biography

Contributing Editors' Biography

Chapter 1: Introduction

Abstract

Chapter 2: A Problem Well-Defined is Half-Solved

Abstracts

2.1. Data feeds vs. intelligence

2.2. Defining threat intelligence

Chapter 3: Defining Business Objectives or Start with Why

Abstract

3.1. When defining business objectives, language matters

Chapter 4: Common Objectives of a Threat Intelligence Program

Abstract

4.1. Once you have your why...

Chapter 5: Translating Objectives into Needs, or Why Drives What

Abstract

5.1. Illustration: translating the objective into concrete intelligence needs

Chapter 6: How Technology Models Operationalize Threat Data

Abstract

6.1. How- labor options or how much do I do myself?

6.2. Implementation – the best laid plans

Chapter 7: Who: Given Why, What, and How, Now You Can Ask Where To Get It

Abstract

7.1. Reporting and management communication

7.2. Defining and articulating budget needs

Chapter 8: Conclusion and Recap

Abstract

Copyright

Syngress is an imprint of Elsevier

225 Wyman Street, Waltham, MA 02451, USA

Copyright © 2015 Elsevier Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

Notices

Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described here in. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library.

Library of Congress Cataloging-in-Publication Data

A catalog record for this book is available from the Library of Congress.

ISBN: 978-0-12-802730-1

For information on all Syngress publications visit our website at http://store.elsevier.com/

Author Biography

Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger, and e-book author. He writes for the blog "Concise-Courses.com" and has developed numerous cybersecurity continuing education courses and books.

Enjoying the preview?
Page 1 of 1