Jump to ratings and reviews
Rate this book

Threat Intelligence in Practice: A Practical Guide to Threat Intelligence from Successful Organizations

Rate this book
Many organizations are discovering that traditional security tools alone aren’t enough to protect their networks. In this practical report, you’ll explore threat intelligence, a method for collecting information on various forms of malicious cyber activity as a way to bolster your in-house measures. Author Allan Liska, security architect at Recorded Future, takes you through the threat intelligence cycle and explains what is required to put together an effective threat intelligence program for your company.

Backed by case studies of several organizations that have successfully implemented these initiatives, this report explains that threat intelligence is actionable external information that, when correlated against internal data, can be used to detect or prevent an attack. You’ll understand how threat intelligence enables you to stay abreast of current as well as future threats.

• Understand exactly what threat intelligence is, and how to correlate it to internal events
• Collect and apply threat intelligence, gain feedback, and incorporate feedback into your own threat intelligence cycle
• Examine tactical, operational, and strategic intelligence, and ensure that the right information gets to the right people
• Get practical examples from several organizations that have correctly implemented threat intelligence programs

61 pages, ebook

First published December 11, 2017

1 person want to read

About the author

Allan Liska

25 books3 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
0 (0%)
3 stars
1 (100%)
2 stars
0 (0%)
1 star
0 (0%)
Displaying 1 of 1 review
Profile Image for Chad.
1,271 reviews1,042 followers
June 10, 2022
Decent, short primer on cyber threat intelligence.

Notes
Threat intel must be
• Relevant: must impact org
• Actionable: concrete steps can be taken by security teams to protect org
• Contextual: should include enough evidence to enable intel analyst to rank threat

Components of good intel requirement (IR)
• Asks single question
• Focuses on specific fact, event, or activity
• Provides intel required to support a single decision

TIPs complement SIEMs, they don't replace them. TIPs aren't made to ingest large quantities of data.

After providing intel, ask the requestor if the requirement was responded to properly, to see if they have questions.
Displaying 1 of 1 review

Can't find what you're looking for?

Get help and learn more about the design.