Operationalizing threat intelligence a guide to developing and operationalizing cyber threat intelligence programs
Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program Key Features Develop and implement a threat intelligence program from scratch Discover techniques to perform cyber threat intelligence, collection, and analysis using open-source tools...
Other Authors: | , |
---|---|
Format: | eBook |
Language: | Inglés |
Published: |
Birmingham, UK :
Packt Publishing
[2022]
|
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009668678306719 |
Table of Contents:
- Table of Contents Why You Need a Threat Intelligence Program Threat Actors, Campaigns, and Tooling Guidelines and Policies Threat Intelligence Frameworks, Standards, Models, and Platforms Operational Security (OPSEC) Technical Threat Intelligence – Collection Technical Threat Analysis – Enrichment Technical Threat Analysis – Threat Hunting and Pivoting Technical Threat Analysis – Similarity Analysis Preparation and Dissemination Fusion into Other Enterprise Operations Overview of Datasets and Their Practical Application Conclusion.