Book Image

Practical Cyber Intelligence

By : Wilson Bautista Jr.
Book Image

Practical Cyber Intelligence

By: Wilson Bautista Jr.

Overview of this book

<p>Cyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book kicks off with the need for cyber intelligence and why it is required in terms of a defensive framework.</p> <p>Moving forward, the book provides a practical explanation of the F3EAD protocol with the help of examples. Furthermore, we learn how to go about threat models and intelligence products/frameworks and apply them to real-life scenarios. Based on the discussion with the prospective author I would also love to explore the induction of a tool to enhance the marketing feature and functionality of the book.</p> <p>By the end of this book, you will be able to boot up an intelligence program in your organization based on the operation and tactical/strategic spheres of Cyber defense intelligence.</p>
Table of Contents (17 chapters)

To get the most out of this book

You will want to read this book from start to finish as I've written each chapter to build off of each other. Each concept you learn in these chapters will relate to one another in some fashion. If you don't, you'll find yourself completely lost as a lot of what has gone into this have customized processes that have worked or is working in the organizations and teams I've helped develop.

So I want you to read this book with an open mind and ask yourself "what if this could work?" I only ask you to do this because I believe that we should all be on a path to improving our own processes (IT and business) within our organizations. The amount of breaches in 2017 alone is an indicator that some organizational processes don't work.

  1. We cannot accept "this is how it has always been done" anymore
  2. We need to reduce friction between each other
  3. We need to increase the speed of decision making
  4. We need to reduce the risk of exploitation

This book is another way to enable sound decision making at all levels by developing an intelligence capability between IT teams using the resources that we already have. It is definitely a "bastardization" of military and civilian processes that have been put together to "make it work" for my teams. This book is not a solution, but a way to taking what we already know and trying to make an organization's collaboration and communication more efficient. By doing this, we are one more step closer in reducing the risk of exploitation to our organization.

Let's get started.

Download the color images

Conventions used

There are a number of text conventions used throughout this book.

Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Select System info from the Administration panel."

Warnings or important notes appear like this.
Tips and tricks appear like this.