03316nam 2200601 450 991080889730332120200520144314.00-12-802730-40-12-802752-5(CKB)2670000000585902(EBL)1888755(OCoLC)898422494(SSID)ssj0001455375(PQKBManifestationID)11792520(PQKBTitleCode)TC0001455375(PQKBWorkID)11391599(PQKB)11633273(Au-PeEL)EBL1888755(CaPaEBR)ebr10999731(CaONFJC)MIL679363(CaSebORM)9780128027301(MiAaPQ)EBC1888755(EXLCZ)99267000000058590220150110h20152015 uy 0engur|n|---|||||txtccrHow to define and build an effective cyber threat intelligence capability /Henry Dalziel1st editionWaltham, Massachusetts :Syngress,2015.©20151 online resource (43 p.)Description based upon print version of record.1-322-48081-8 Cover; Title Page; Copyright Page; Table of contents; Author Biography; Contributing Editors' Biography; Chapter 1 - Introduction; Chapter 2 - A Problem Well-Defined is Half-Solved; 2.1 Data feeds vs. intelligence ; 2.2 Defining threat intelligence ; Chapter 3 - Defining Business Objectives or "Start with Why"; 3.1 When defining business objectives, language matters ; Chapter 4 - Common Objectives of a Threat Intelligence Program; 4.1 - Once you have your why...; Chapter 5 - Translating Objectives into Needs, or "Why Drives What"5.1 Illustration: translating the objective into concrete intelligence needs Chapter 6 - How Technology Models Operationalize Threat Data; 6.1 - How- labor options or "how much do I do myself?" ; 6.2 - Implementation - the best laid plans ; Chapter 7 - Who: Given Why, What, and How, Now You Can Ask Where To Get It; 7.1 - Reporting and management communication ; 7.2 - Defining and articulating budget needs ; Chapter 8 - Conclusion and Recap <i><b>Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security</b></i> is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. AmoComputer networksSecurity measuresUnited StatesfastComputer networksSecurity measures.005.8Dalziel Henry1620482Olson EricCarnall JamesMiAaPQMiAaPQMiAaPQBOOK9910808897303321How to define and build an effective cyber threat intelligence capability4037138UNINA