How to define and build an effective cyber threat intelligence capability /
Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become i...
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Waltham, MA :
Syngress, an imprint of Elsevier,
[2015]
�2015 |
Subjects: | |
Online Access: | Texto completo |
Table of Contents:
- A problem well-defined is half-solved
- Defining business objectives or "start with why"
- Common objectives of a threat intelligence program
- Translating objectives into needs. "Why drives what"
- How technology models operationalize threat data
- Who: given why, what, and how, how you can ask where to get it.