Fr. 53.50

How to Define and Build an Effective Cyber Threat Intelligence Capability

English · Paperback / Softback

Shipping usually within 3 to 5 weeks

Description

Read more

Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental.
Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.

List of contents

Chapter 1: Introduction
Chapter 2: A Problem Well-Defined is Half-Solved
Chapter 3: Defining Business Objectives ("Start With Why")
Chapter 4: Common Objectives of a Threat Intelligence Program
Chapter 5: Translating Objectives in Needs ("Why DRIVES What")
Chapter 6: How Technology Models Operationalize Threat Data
Chapter 7: Who You Can Ask Where to Get It
Chapter 8: Conclusion and Recap

About the author










Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP).

Product details

Authors Henry Dalziel
Assisted by James Carnall (Editor), Eric Olson (Editor)
Publisher Elsevier Science & Technology
 
Languages English
Product format Paperback / Softback
Released 15.12.2014
 
EAN 9780128027301
ISBN 978-0-12-802730-1
Dimensions 152 mm x 4 mm x 229 mm
Weight 102 g
Subject Natural sciences, medicine, IT, technology > IT, data processing > IT

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.