How to Define and Build an Effective Cyber Threat Intelligence Capability (2015)

How to Define and Build an Effective Cyber Threat Intelligence Capability (2015)

Chapter 1. Introduction

Chapter 2. A Problem Well-Defined is Half-Solved

Chapter 3. Defining Business Objectives or “Start with Why”

Chapter 4. Common Objectives of a Threat Intelligence Program

Chapter 5. Translating Objectives into Needs, or “Why Drives What”

Chapter 6. How Technology Models Operationalize Threat Data

Chapter 7. Who: Given Why, What, and How, Now You Can Ask Where To Get It

Chapter 8. Conclusion and Recap