How to Define and Build an Effective Cyber Threat Intelligence Capability
Autor Henry Dalziel Editat de Eric Olson, James Carnallen Limba Engleză Paperback – 8 ian 2015
Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.
- Learn how to create a proactive strategy for digital security
- Use data analysis and threat forecasting to predict and prevent attacks before they start
- Understand the fundamentals of today's threatscape and how best to organize your defenses
Preț: 141.79 lei
Preț vechi: 177.24 lei
-20% Nou
Puncte Express: 213
Preț estimativ în valută:
27.14€ • 28.22$ • 22.51£
27.14€ • 28.22$ • 22.51£
Carte indisponibilă temporar
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780128027301
ISBN-10: 0128027304
Pagini: 42
Dimensiuni: 152 x 229 x 8 mm
Greutate: 0.09 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0128027304
Pagini: 42
Dimensiuni: 152 x 229 x 8 mm
Greutate: 0.09 kg
Editura: ELSEVIER SCIENCE
Cuprins
Chapter 1: Introduction
Chapter 2: A Problem Well-Defined is Half-Solved
Chapter 3: Defining Business Objectives ("Start With Why")
Chapter 4: Common Objectives of a Threat Intelligence Program
Chapter 5: Translating Objectives in Needs ("Why DRIVES What")
Chapter 6: How Technology Models Operationalize Threat Data
Chapter 7: Who You Can Ask Where to Get It
Chapter 8: Conclusion and Recap
Chapter 2: A Problem Well-Defined is Half-Solved
Chapter 3: Defining Business Objectives ("Start With Why")
Chapter 4: Common Objectives of a Threat Intelligence Program
Chapter 5: Translating Objectives in Needs ("Why DRIVES What")
Chapter 6: How Technology Models Operationalize Threat Data
Chapter 7: Who You Can Ask Where to Get It
Chapter 8: Conclusion and Recap