Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Cyber Intelligence

You're reading from   Mastering Cyber Intelligence Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense

Arrow left icon
Product type Paperback
Published in Apr 2022
Publisher Packt
ISBN-13 9781800209404
Length 528 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Jean Nestor M. Dahj Jean Nestor M. Dahj
Author Profile Icon Jean Nestor M. Dahj
Jean Nestor M. Dahj
Arrow right icon
View More author details
Toc

Table of Contents (20) Chapters Close

Preface 1. Section 1: Cyber Threat Intelligence Life Cycle, Requirements, and Tradecraft
2. Chapter 1: Cyber Threat Intelligence Life Cycle FREE CHAPTER 3. Chapter 2: Requirements and Intelligence Team Implementation 4. Chapter 3: Cyber Threat Intelligence Frameworks 5. Chapter 4: Cyber Threat Intelligence Tradecraft and Standards 6. Chapter 5: Goal Setting, Procedures for CTI Strategy, and Practical Use Cases 7. Section 2: Cyber Threat Analytical Modeling and Defensive Mechanisms
8. Chapter 6: Cyber Threat Modeling and Adversary Analysis 9. Chapter 7: Threat Intelligence Data Sources 10. Chapter 8: Effective Defense Tactics and Data Protection 11. Chapter 9: AI Applications in Cyber Threat Analytics 12. Chapter 10: Threat Modeling and Analysis – Practical Use Cases 13. Section 3: Integrating Cyber Threat Intelligence Strategy to Business processes
14. Chapter 11: Usable Security: Threat Intelligence as Part of the Process 15. Chapter 12: SIEM Solutions and Intelligence-Driven SOCs 16. Chapter 13: Threat Intelligence Metrics, Indicators of Compromise, and the Pyramid of Pain 17. Chapter 14: Threat Intelligence Reporting and Dissemination 18. Chapter 15: Threat Intelligence Sharing and Cyber Activity Attribution – Practical Use Cases 19. Other Books You May Enjoy

Preface

The increase in security breaches and attacks in the last two decades indicates that the traditional security defense methods are falling short. The sophistication of attacks – such as the Advanced Persistent Threats (APTs) – leaves organizations with more worries despite the heavy investment in security tools, which often work in silos. The lack of analytics skills, the struggle to incorporate security into processes, and the gap in structured security analytics are the main concern in the fight against augmented cyber threats.

Cyber Threat Intelligence (CTI) is a collaborative security program that uses advanced analysis of data collected from several sources (internal and external) to discover, detect, deny, disrupt, degrade, deceive, or destroy adversaries' activities. Because it is actionable and encourages information sharing between community members, individuals, and so on, it is becoming the de facto method to fight against APTs. However, many organizations are still struggling to embrace and integrate CTI in their existing security solutions and extract value from it.

This book, Mastering Cyber Intelligence, provides the knowledge required to dive into the CTI world. It equips you with the theoretical and practical skills to conduct a threat intelligence program from planning to dissemination and feedback processing. It details strategies you can use to integrate CTI into an organization's security stack from the ground up, allowing you to effectively deal with cyber threats.

Through step-by-step explanations and examples, you learn how to position CTI in the organization strategy and plan, and set objectives for your CTI program, collect the appropriate data for your program, process and format the collected data, perform threat modeling and conduct threat analysis, and share intelligence output internally (with the strategic, tactical, and operational security teams) and externally (with the community). By the end of the book, you will master CTI and be confident to help organizations implement it to protect revenue, assets, and sensitive information (and data).

lock icon The rest of the chapter is locked
Next Section arrow right
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image