We believe threat intelligence is a team sport, not the exclusive domain of a few elite analysts who are in the know. This book is a definitive guide to everything security teams need to know about threat intelligence.
Graduation Cap
Learn Best Practices
Gain an understanding of what threat intelligence is — and what it isn’t — with definitions of the threat intelligence lifecycle and examples of different sources.
Users
Examine Use Cases
Learn how others are applying threat intelligence for security operations, incident response, vulnerability management, and security leadership.
Chart Line
Develop Your Program
Use our reference guide for threat intelligence goals to quickly develop an effective core threat intelligence team unique to your organization’s security needs.
Quote Right Icon
Intelligence can spearhead a highly proactive security strategy when it can be consumed by the teams and technology able to make the best use of it.
Abiel John
CEO and Co-Founder, Secifi.com
Full Chapter List
Chapter 1 Intelligence-Driven Security
Chapter 2 For Security Operations
Chapter 3 For Incident Response
Chapter 4 For Vulnerability Management
Chapter 5 For Security Leaders
Chapter 6 For Risk Analysis
Chapter 7 For Fraud Prevention
Chapter 8 Analytical Frameworks
Chapter 9 Your Journey
Chapter 10 Your Core Team