Summary

In this chapter, we had a high-level overview of threat intelligence and where we can find it. These sources can be from ISACs or from OSINT sources such as Twitter. Being able to consolidate all of this information is important because we will need to process it so that we can create intelligence for the teams who will be responsible for reducing the risk and mitigating the vulnerabilities. By providing a Capability Maturity Model to follow, we can build the communication capability to push information down to the teams, as well as be able to follow the results. Ultimately, we want to have a tight integration between teams to provide the most correct and most complete information, so that we can possibly produce a dashboard that highlights the known threats, their probability, and their impact to the organization.

In the next chapter, we will dig a little deeper into communication and how we can build channels to enable teams.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.196.217