Cyber intelligence doesn't only come from IT operations and IT security. The dimension that we have not discussed is how we can leverage the user as a source of information. Through training, we can empower users to help us report the things that our scanning, monitoring, and processes miss.
In this chapter, we will cover:
- Integrating the user into cyber intelligence
- Security awareness now and where it can go
- Capability Maturity Model - security awareness