How to define and build an effective cyber threat intelligence capability /
Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become i...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Waltham, MA :
Syngress, an imprint of Elsevier,
[2015]
©2015 |
Temas: | |
Acceso en línea: | Texto completo Texto completo |
Tabla de Contenidos:
- A problem well-defined is half-solved
- Defining business objectives or "start with why"
- Common objectives of a threat intelligence program
- Translating objectives into needs. "Why drives what"
- How technology models operationalize threat data
- Who: given why, what, and how, how you can ask where to get it.