Driving Cyber Intel

Cyber intelligence doesn't only come from IT operations and IT security. The dimension that we have not discussed is how we can leverage the user as a source of information. Through training, we can empower users to help us report the things that our scanning, monitoring, and processes miss.

In this chapter, we will cover:

  • Integrating the user into cyber intelligence
  • Security awareness now and where it can go
  • Capability Maturity Model - security awareness
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.63.136