How to Define and Build an Effective Cyber Threat Intelligence Capability
4/5
()
About this ebook
Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental.
Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.
- Learn how to create a proactive strategy for digital security
- Use data analysis and threat forecasting to predict and prevent attacks before they start
- Understand the fundamentals of today's threatscape and how best to organize your defenses
Henry Dalziel
Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP).
Read more from Henry Dalziel
Introduction to US Cybersecurity Careers Rating: 3 out of 5 stars3/5Infosec Management Fundamentals Rating: 5 out of 5 stars5/5How to Defeat Advanced Malware: New Tools for Protection and Forensics Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for Corporate Directors and Board Members Rating: 1 out of 5 stars1/5Next Generation Red Teaming Rating: 0 out of 5 stars0 ratingsEssential Skills for Hackers Rating: 3 out of 5 stars3/5Automated Security Analysis of Android and iOS Applications with Mobile Security Framework Rating: 1 out of 5 stars1/5How to Attack and Defend Your Website Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for CEOs and Management Rating: 2 out of 5 stars2/5Meeting People via WiFi and Bluetooth Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for Lawyers Rating: 0 out of 5 stars0 ratingsSecuring Social Media in the Enterprise Rating: 0 out of 5 stars0 ratingsDeploying Secure Containers for Training and Development Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for Accountants and CPAs Rating: 0 out of 5 stars0 ratings
Related to How to Define and Build an Effective Cyber Threat Intelligence Capability
Related ebooks
Building an Intelligence-Led Security Program Rating: 5 out of 5 stars5/5Building a Practical Information Security Program Rating: 5 out of 5 stars5/5Cyber Security Threat Intelligence A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsThe Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice Rating: 4 out of 5 stars4/5Designing and Building Security Operations Center Rating: 3 out of 5 stars3/5The Psychology of Information Security: Resolving conflicts between security compliance and human behaviour Rating: 5 out of 5 stars5/5Building an Effective Cybersecurity Program, 2nd Edition Rating: 0 out of 5 stars0 ratingsCyber threat hunting Second Edition Rating: 0 out of 5 stars0 ratingsInformation Security A Practical Guide: Bridging the gap between IT and management Rating: 5 out of 5 stars5/5Cyber Security Awareness for CEOs and Management Rating: 2 out of 5 stars2/5Cyber Intelligence-Driven Risk: How to Build and Use Cyber Intelligence for Business Risk Decisions Rating: 0 out of 5 stars0 ratingsBuild a Security Culture Rating: 0 out of 5 stars0 ratingsBuilding Effective Cybersecurity Programs: A Security Manager’s Handbook Rating: 4 out of 5 stars4/5Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data Rating: 5 out of 5 stars5/5Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques Rating: 0 out of 5 stars0 ratingsCybersecurity ABCs: Delivering awareness, behaviours and culture change Rating: 0 out of 5 stars0 ratingsOSSEC Host-Based Intrusion Detection Guide Rating: 5 out of 5 stars5/5Selling Information Security to the Board: A Primer Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5The Language of Cybersecurity Rating: 5 out of 5 stars5/5Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers Rating: 0 out of 5 stars0 ratingsThe Chief Security Officer’s Handbook: Leading Your Team into the Future Rating: 0 out of 5 stars0 ratings7 Rules To Become Exceptional At Cyber Security Rating: 5 out of 5 stars5/5Botnets: The Killer Web Applications Rating: 5 out of 5 stars5/5The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Rating: 0 out of 5 stars0 ratingsSecurity Operations: CISSP, #7 Rating: 0 out of 5 stars0 ratingsNetwork Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response Rating: 4 out of 5 stars4/5
Enterprise Applications For You
QuickBooks 2024 All-in-One For Dummies Rating: 0 out of 5 stars0 ratings50 Useful Excel Functions: Excel Essentials, #3 Rating: 5 out of 5 stars5/5Bitcoin For Dummies Rating: 4 out of 5 stars4/5Excel : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Excel Programming: 1 Rating: 5 out of 5 stars5/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Mastering QuickBooks 2020: The ultimate guide to bookkeeping and QuickBooks Online Rating: 0 out of 5 stars0 ratingsChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsSharePoint 2016 For Dummies Rating: 5 out of 5 stars5/5Scrivener For Dummies Rating: 4 out of 5 stars4/5Create Income through Self-Publishing: An Author's Approach on Generating Wealth by Self-Publishing Rating: 5 out of 5 stars5/5QuickBooks 2021 For Dummies Rating: 0 out of 5 stars0 ratingsExcel Formulas and Functions 2020: Excel Academy, #1 Rating: 4 out of 5 stars4/5Notion for Beginners: Notion for Work, Play, and Productivity Rating: 4 out of 5 stars4/5101 Ready-to-Use Excel Formulas Rating: 4 out of 5 stars4/5Systems Thinking: Managing Chaos and Complexity: A Platform for Designing Business Architecture Rating: 4 out of 5 stars4/5Access 2019 For Dummies Rating: 0 out of 5 stars0 ratingsLearn Windows PowerShell in a Month of Lunches Rating: 0 out of 5 stars0 ratingsEssential Office 365 Third Edition: The Illustrated Guide to Using Microsoft Office Rating: 3 out of 5 stars3/5QuickBooks 2023 All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsEnterprise AI For Dummies Rating: 3 out of 5 stars3/5Excel Tips and Tricks Rating: 0 out of 5 stars0 ratingsExcel 2016 For Dummies Rating: 4 out of 5 stars4/5PowerShell for SQL Server Essentials Rating: 0 out of 5 stars0 ratings
Reviews for How to Define and Build an Effective Cyber Threat Intelligence Capability
2 ratings1 review
- Rating: 5 out of 5 stars5/5Quick read to gain knowledge on building an effective threat intelligence program.
Book preview
How to Define and Build an Effective Cyber Threat Intelligence Capability - Henry Dalziel
How to Define and Build an Effective Cyber Threat Intelligence Capability
Henry Dalziel
Table of Contents
Cover
Title page
Copyright
Author Biography
Contributing Editors' Biography
Chapter 1: Introduction
Abstract
Chapter 2: A Problem Well-Defined is Half-Solved
Abstracts
2.1. Data feeds vs. intelligence
2.2. Defining threat intelligence
Chapter 3: Defining Business Objectives or Start with Why
Abstract
3.1. When defining business objectives, language matters
Chapter 4: Common Objectives of a Threat Intelligence Program
Abstract
4.1. Once you have your why...
Chapter 5: Translating Objectives into Needs, or Why Drives What
Abstract
5.1. Illustration: translating the objective into concrete intelligence needs
Chapter 6: How Technology Models Operationalize Threat Data
Abstract
6.1. How- labor options or how much do I do myself?
6.2. Implementation – the best laid plans
Chapter 7: Who: Given Why, What, and How, Now You Can Ask Where To Get It
Abstract
7.1. Reporting and management communication
7.2. Defining and articulating budget needs
Chapter 8: Conclusion and Recap
Abstract
Copyright
Syngress is an imprint of Elsevier
225 Wyman Street, Waltham, MA 02451, USA
Copyright © 2015 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described here in. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the Library of Congress.
ISBN: 978-0-12-802730-1
For information on all Syngress publications visit our website at http://store.elsevier.com/
Author Biography
Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger, and e-book author. He writes for the blog "Concise-Courses.com" and has developed numerous cybersecurity continuing education courses and books.