This chapter is about threat intelligence and how we can incorporate it into our cyber intelligence program.
In this chapter, we will talk about:
- Overview of threat intelligence
- Sources of threat intelligence
- Information Sharing and Analysis Centers
- Capability Maturity Model – threat intelligence integration