Have a personal or library account? Click to login
Operationalizing Threat Intelligence Cover

Operationalizing Threat Intelligence

A guide to developing and operationalizing cyber threat intelligence programs

Paid access
|Jul 2022
Product purchase options

Table of Contents

  1. Why You Need a Threat Intelligence Program
  2. Threat Actors, Campaigns, and Tooling
  3. Guidelines and Policies
  4. Threat Intelligence Frameworks, Standards, Models, and Platforms
  5. Operational Security (OPSEC)
  6. Technical Threat Intelligence – Collection
  7. Technical Threat Analysis – Enrichment
  8. Technical Threat Analysis – Threat Hunting and Pivoting
  9. Technical Threat Analysis – Similarity Analysis
  10. Preparation and Dissemination
  11. Fusion into Other Enterprise Operations
  12. Overview of Datasets and Their Practical Application
  13. Conclusion
PDF ISBN: 978-1-80181-866-7
Publisher: Packt Publishing Limited
Copyright owner: © 2022 Packt Publishing Limited
Publication date: 2022
Language: English
Pages: 460