Book Image

Practical Cyber Intelligence

By : Wilson Bautista Jr.
Book Image

Practical Cyber Intelligence

By: Wilson Bautista Jr.

Overview of this book

<p>Cyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book kicks off with the need for cyber intelligence and why it is required in terms of a defensive framework.</p> <p>Moving forward, the book provides a practical explanation of the F3EAD protocol with the help of examples. Furthermore, we learn how to go about threat models and intelligence products/frameworks and apply them to real-life scenarios. Based on the discussion with the prospective author I would also love to explore the induction of a tool to enhance the marketing feature and functionality of the book.</p> <p>By the end of this book, you will be able to boot up an intelligence program in your organization based on the operation and tactical/strategic spheres of Cyber defense intelligence.</p>
Table of Contents (17 chapters)

The Security Stack

Up to this point, we've introduced how we can integrate a threat intelligence capability into improving our organization's security. Threat intelligence is externally focused. However, I wanted to take a moment in this chapter to lay a foundation to improve the internal communication capability.

In this chapter, we will undertake the following:

  • Discuss some core security service basics
  • Talk about security operation center capabilities
  • See how we can integrate services and improve their communication
  • Discuss a Capability Maturity Model for information security that enables cyber intelligence
  • Collaboration + Capability = Active Defense