How to Define and Build an Effective Cyber Threat Intelligence Capability (2015)
Chapter 2. A Problem Well-Defined is Half-Solved
Chapter 3. Defining Business Objectives or “Start with Why”
Chapter 4. Common Objectives of a Threat Intelligence Program
Chapter 5. Translating Objectives into Needs, or “Why Drives What”
Chapter 6. How Technology Models Operationalize Threat Data
Chapter 7. Who: Given Why, What, and How, Now You Can Ask Where To Get It
Chapter 8. Conclusion and Recap