Loading…

Operationalizing Threat Intelligence : a Guide to Developing and Operationalizing Cyber Threat Intelligence Programs.

Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program Key Features Develop and implement a threat intelligence program from scratch Discover techniques to perform cyber threat intelligence, collection, and analysis using open-source tools...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Wilhoit, Kyle
Other Authors: Opacki, Joseph
Format: Electronic eBook
Language:Inglés
Published: Birmingham : Packt Publishing, Limited, 2022.
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Table of Contents:
  • Table of Contents Why You Need a Threat Intelligence Program Threat Actors, Campaigns, and Tooling Guidelines and Policies Threat Intelligence Frameworks, Standards, Models, and Platforms Operational Security (OPSEC) Technical Threat Intelligence – Collection Technical Threat Analysis – Enrichment Technical Threat Analysis – Threat Hunting and Pivoting Technical Threat Analysis – Similarity Analysis Preparation and Dissemination Fusion into Other Enterprise Operations Overview of Datasets and Their Practical Application Conclusion.