
How to Define and Build an Effective Cyber Threat Intelligence Capability
- Publisher's listprice EUR 31.95
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 10% (cc. 1 355 Ft off)
- Discounted price 12 197 Ft (11 616 Ft + 5% VAT)
13 553 Ft
Availability
printed on demand
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Publisher Syngress
- Date of Publication 9 January 2015
- ISBN 9780128027301
- Binding Paperback
- No. of pages42 pages
- Size 228x152 mm
- Weight 70 g
- Language English 0
Categories
Long description:
Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental.
Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.
MoreTable of Contents:
Chapter 1: Introduction
Chapter 2: A Problem Well-Defined is Half-Solved
Chapter 3: Defining Business Objectives ("Start With Why")
Chapter 4: Common Objectives of a Threat Intelligence Program
Chapter 5: Translating Objectives in Needs ("Why DRIVES What")
Chapter 6: How Technology Models Operationalize Threat Data
Chapter 7: Who You Can Ask Where to Get It
Chapter 8: Conclusion and Recap
More