How to Define and Build an Effective Cyber Threat Intelligence Capability - 1st Edition - ISBN: 9780128027301, 9780128027523

How to Define and Build an Effective Cyber Threat Intelligence Capability

1st Edition

Editors: Eric Olson James Carnall
Authors: Henry Dalziel
eBook ISBN: 9780128027523
Paperback ISBN: 9780128027301
Imprint: Syngress
Published Date: 15th December 2014
Page Count: 42
Tax/VAT will be calculated at check-out Price includes VAT (GST)
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
31.95
22.36
22.36
22.36
22.36
22.36
25.56
25.56
39.95
27.96
27.96
27.96
27.96
27.96
31.96
31.96
24.99
17.49
17.49
17.49
17.49
17.49
19.99
19.99
Unavailable
Price includes VAT (GST)
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental.

Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.

Key Features

  • Learn how to create a proactive strategy for digital security
  • Use data analysis and threat forecasting to predict and prevent attacks before they start
  • Understand the fundamentals of today's threatscape and how best to organize your defenses

Readership

information security professionals, consultants, network administrators, CIOs, CTOs, CISO, and executives within high-target industries

Table of Contents

  • Contributing Editors' Biography
  • Chapter 1: Introduction
    • Abstract
  • Chapter 2: A Problem Well-Defined is Half-Solved
    • Abstracts
    • 2.1. Data feeds vs. intelligence
    • 2.2. Defining threat intelligence
  • Chapter 3: Defining Business Objectives or “Start with Why”
    • Abstract
    • 3.1. When defining business objectives, language matters
  • Chapter 4: Common Objectives of a Threat Intelligence Program
    • Abstract
    • 4.1. Once you have your why...
  • Chapter 5: Translating Objectives into Needs, or “Why Drives What”
    • Abstract
    • 5.1. Illustration: translating the objective into concrete intelligence needs
  • Chapter 6: How Technology Models Operationalize Threat Data
    • Abstract
    • 6.1. How- labor options or “how much do I do myself?”
    • 6.2. Implementation – the best laid plans
  • Chapter 7: Who: Given Why, What, and How, Now You Can Ask Where To Get It
    • Abstract
    • 7.1. Reporting and management communication
    • 7.2. Defining and articulating budget needs
  • Chapter 8: Conclusion and Recap
    • Abstract

Details

No. of pages:
42
Language:
English
Copyright:
© Syngress 2015
Published:
Imprint:
Syngress
eBook ISBN:
9780128027523
Paperback ISBN:
9780128027301

About the Editor

Eric Olson

Eric Olson is Vice President, Product Strategy at Cyveillance, where he is responsible for the management of Cyveillance‘s entire portfolio of Enterprise and OEM services. He oversees new product development, messaging and positioning, pricing strategy and profitability for each service line.

Affiliations and Expertise

Vice President, Product Strategy at Cyveillance. Virginia, United States.

James Carnall

James Carnall is Vice President, Cyber Intelligence Division at Cyveillance, where he is responsible for Brand Protection, Cyber Security and Anti-Phishing services. James also manages our Cyber Intelligence Analyst team and security as well as our Global Intelligence and Legal Advisory teams.

Affiliations and Expertise

Vice President, Cyber Intelligence Division at Cyveillance. Virginia, United States.

About the Author

Henry Dalziel

Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP).

Affiliations and Expertise

Founder, Concise Ac Ltd, UK