• Complain

Kyle Wilhoit - Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

Here you can read online Kyle Wilhoit - Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: Packt Publishing, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Kyle Wilhoit Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs
  • Book:
    Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs
  • Author:
  • Publisher:
    Packt Publishing
  • Genre:
  • Year:
    2022
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program

Key Features
  • Develop and implement a threat intelligence program from scratch
  • Discover techniques to perform cyber threat intelligence, collection, and analysis using open-source tools
  • Leverage a combination of theory and practice that will help you prepare a solid foundation for operationalizing threat intelligence programs
Book Description

Were living in an era where cyber threat intelligence is becoming more important. Cyber threat intelligence routinely informs tactical and strategic decision-making throughout organizational operations. However, finding the right resources on the fundamentals of operationalizing a threat intelligence function can be challenging, and thats where this book helps.

In Operationalizing Threat Intelligence, youll explore cyber threat intelligence in five fundamental areas: defining threat intelligence, developing threat intelligence, collecting threat intelligence, enrichment and analysis, and finally production of threat intelligence. Youll start by finding out what threat intelligence is and where it can be applied. Next, youll discover techniques for performing cyber threat intelligence collection and analysis using open source tools. The book also examines commonly used frameworks and policies as well as fundamental operational security concepts. Later, youll focus on enriching and analyzing threat intelligence through pivoting and threat hunting. Finally, youll examine detailed mechanisms for the production of intelligence.

By the end of this book, youll be equipped with the right tools and understand what it takes to operationalize your own threat intelligence function, from collection to production.

What you will learn
  • Discover types of threat actors and their common tactics and techniques
  • Understand the core tenets of cyber threat intelligence
  • Discover cyber threat intelligence policies, procedures, and frameworks
  • Explore the fundamentals relating to collecting cyber threat intelligence
  • Understand fundamentals about threat intelligence enrichment and analysis
  • Understand what threat hunting and pivoting are, along with examples
  • Focus on putting threat intelligence into production
  • Explore techniques for performing threat analysis, pivoting, and hunting
Who this book is for

This book is for cybersecurity professionals, security analysts, security enthusiasts, and anyone who is just getting started and looking to explore threat intelligence in more detail. Those working in different security roles will also be able to explore threat intelligence with the help of this security book.

Table of Contents
  1. Why You Need a Threat Intelligence Program
  2. Threat Actors, Campaigns, and Tooling
  3. Guidelines and Policies
  4. Threat Intelligence Frameworks, Standards, Models, and Platforms
  5. Operational Security (OPSEC)
  6. Technical Threat Intelligence Collection
  7. Technical Threat Analysis Enrichment
  8. Technical Threat Analysis Threat Hunting and Pivoting
  9. Technical Threat Analysis Similarity Analysis
  10. Preparation and Dissemination
  11. Fusion into Other Enterprise Operations
  12. Overview of Datasets and Their Practical Application
  13. Conclusion

Kyle Wilhoit: author's other books


Who wrote Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs? Find out the surname, the name of the author of the book and a list of all author's works by series.

Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Operationalizing Threat Intelligence A guide to developing and operationalizing - photo 1
Operationalizing Threat Intelligence

A guide to developing and operationalizing cyber threat intelligence programs

Kyle Wilhoit

Joseph Opacki

BIRMINGHAMMUMBAI Operationalizing Threat Intelligence Copyright 2022 Packt - photo 2

BIRMINGHAMMUMBAI

Operationalizing Threat Intelligence

Copyright 2022 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

Group Product Manager: Vijin Boricha

Publishing Product Manager: Mohd Riyan Khan

Senior Editor: Tanya D'cruz

Content Development Editor: Nihar Kapadia

Technical Editor: Shruthi Shetty

Copy Editor: Safis Editing

Project Coordinator: Ajesh Devavaram

Proofreader: Safis Editing

Indexer: Subalakshmi Govindhan

Production Designer: Prashant Ghare

Marketing Coordinators: Sourodeep Sinha and Hemangi Lotlikar

First published: June 2022

Production reference: 1090522

Published by Packt Publishing Ltd.

Livery Place

35 Livery Street

Birmingham

B3 2PB, UK.

ISBN 978-1-80181-468-3

www.packt.com

For Stella, who was the best brown dog anyone could have.

Kyle Wilhoit

For my love, who has provided me with purpose in our life journey together, and for my daughter, who inspires me to leave the world a better place.

Joseph Opacki

Contributors
About the authors

Kyle Wilhoit is cybersecurity and cyber threat intelligence professional with wide experience ranging from security architecture to threat analysis. Kyle is specialized in threat intelligence collection and analysis, with a specific focus on nation-state actor groups.

Kyle earned his graduate and undergraduate degrees from Lindenwood University, in St. Charles, Missouri. His work history includes being a threat researcher and leader throughout Silicon Valley, including companies such as DomainTools, Trend Micro, FireEye, and others. Kyle has been an active member on the Blackhat US board since 2016 and has spoken at over 40 conferences across the globe and published over 30 blogs or whitepapers on original research he has performed. Kyle is also the coauthor of Hacking Exposed: Industrial Control Systems: ICS and SCADA Security Secrets and Solutions.

Kyle currently resides in St. Louis, Missouri with his wife and kids.

This book would not have been possible without my wife, who somehow managed to fully support me during the writing of a book on a subject matter she knows or cares nothing about. Also, thank you Mom and Dad, who forever fed my curiosity about computers, even at the age of 12. Finally, I'd like to thank my Brazilian Jiu-Jitsu coach, Dave Greenlee, who continually proves that the fundamentals of good jiu-jitsu are also the fundamentals of good character.

Joseph Opacki is a United States Marine Corps (USMC) veteran and career cybersecurity professional with a specialization in malware reverse engineering, computer intrusion investigation, security research, and threat intelligence. He received his undergraduate degree from George Mason University and his graduate degree from the Virginia Polytechnic Institute and State University. He has been active in academia working as an Adjunct Professor for over a decade in the Master of Digital Forensics program at George Mason University. Before his retirement from public service, Joseph was a malware reverse engineering Subject Matter Expert (SME) at the Federal Bureau of Investigation.

This book would not be possible without my wife. She is the person that consistently challenges me to do more and not settle for the status quo. She has always fully supported any of my life's endeavors and never turned her nose up at anything I ever wanted to accomplish, rather providing all the motivation and support I needed to be successful. Thank you to all the colleagues in my career that have taught me and motivated me. You are appreciated!

About the reviewers

Kunal Sehgal has been a cyber-evangelist for over 15 years and is an untiring advocate of Cyber Threat Intelligence sharing. He encourages cyber-defenders to work together by maintaining a strong level of camaraderie across public and private organizations, spanning sectorial and geographical barriers. He is not only actively connected with various communities in Asia but also regularly shares credible intelligence with various law enforcement agencies around the world. These efforts have helped organizations proactively defend themselves against cyber threats and have collectively helped sectors become more resilient.

In his professional capacity, Kunal has worked on setting up two Information Sharing and Analysis Centers in Singapore, to serve the APAC region. He has also worked with all major national CERTs, regulators, and other government bodies in Asia, to strengthen intelligence networks for combatting cybercrime. In 2018, Kunal was part of a global working group, chaired by the Global Forum on Cyber Expertise (GFCE), to make policy-related recommendations to a panel of 90+ member countries.

Kunal invests his non-working hours researching, blogging, and presenting at cyber-events across Asia. He has earned 17 certifications/degrees and has coauthored two whitepapers in the cyber realm.

Dedicated to S.M.

Anthony DESVERNOIS is an IT security professional with more than 10 years of experience in the banking industry. He has worked in many fields within IT across Europe, Asia-Pacific, and the Americas, as an individual contributor and as a manager.

Anthony has been passionate about computer science, and especially IT security, from a young age, on both functional and technical sides.

Anthony holds a Master of Science in systems, network, and security and a master's in business administration.

Table of Contents
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs»

Look at similar books to Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs»

Discussion, reviews of the book Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.