O'Reilly logo

Building an Intelligence-Led Security Program by Allan Liska

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4

Gathering data

Abstract

This chapter reviews several security frameworks and discusses the importance of using a framework with standardized components when building an intelligence-led security program. The chapter also discusses the importance of being able to convey the importance of security in business terms.

Keywords

Continuous monitoring
NIST Cybersecurity Framework
business intelligence
Information in this chapter
The Continuous Monitoring Framework
NIST Cyber Security Framework
Security + Intelligence
The Business Side of Security
Planning a Phased Approach

Introduction

The first section of this book was primarily theory-focused. Understanding the history of intelligence and creating a framework, like ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required