0%

Book Description

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.

  • Presents case studies and actual data to demonstrate threat data visualization techniques and threat simulation tools
  • Explores the usage of kill chain modelling to inform actionable security intelligence
  • Demonstrates a methodology that can be used to create a full threat forecast analysis for enterprise networks of any size

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. About The Authors
  6. Foreword
    1. Why Threat Forecasting is Relevant
    2. What You Will Learn and How You Will Benefit
  7. Preface
    1. Book Organization and Structure
    2. Closing Thoughts
  8. Acknowledgments
  9. 1: Navigating Today’s Threat Landscape
    1. Abstract
    2. Introduction
    3. Why Threat Forecasting
    4. Going Beyond Historical Threat Reporting
    5. The State of Regulatory Compliance
    6. Best Practices, Standards, and Frameworks
    7. Today’s Information Assurance Needs
  10. 2: Threat Forecasting
    1. Abstract
    2. Synopsis
    3. Introduction
    4. Summary
  11. 3: Security Intelligence
    1. Abstract
    2. Synopsis
    3. Introduction
    4. Summary
  12. 4: Identifying Knowledge Elements
    1. Abstract
    2. Synopsis
    3. Introduction
    4. Defining Knowledge Elements
    5. Types of Knowledge Elements
    6. Publicly Defined Knowledge Elements
    7. Summary
  13. 5: Knowledge Sharing and Community Support
    1. Abstract
    2. Synopsis
    3. Introduction
    4. Sharing Knowledge Elements
    5. Community Sharing
    6. Commercial Offerings
    7. Staying Ahead of the Adversary
    8. Summary
  14. 6: Data Visualization
    1. Abstract
    2. Synopsis
    3. Introduction
    4. Summary
  15. 7: Data Simulation
    1. Abstract
    2. Synopsis
    3. Introduction
    4. Summary
  16. 8: Kill Chain Modeling
    1. Abstract
    2. Synopsis
    3. Introduction
    4. Summary
  17. 9: Connecting the Dots
    1. Abstract
    2. Synopsis
    3. Introduction
    4. Historical Threat Reporting
    5. State of the Security Industry
    6. Leveraging New and Existing Tools
    7. Real World Examples
    8. Applying Threat Forecasting Techniques
    9. Summary
  18. 10: The Road Ahead
    1. Abstract
    2. Synopsis
    3. John Pirc
    4. David DeSanto
    5. Iain Davison
    6. Will Gragido
    7. Summary
  19. Index
18.118.1.232