Integrating Threat Intelligence and Operations

This chapter is about threat intelligence and how we can incorporate it into our cyber intelligence program.

In this chapter, we will talk about:

  • Overview of threat intelligence
  • Sources of threat intelligence 
  • Information Sharing and Analysis Centers
  • Capability Maturity Model – threat intelligence integration
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.12.36.30