O'Reilly logo

Building an Intelligence-Led Security Program by Allan Liska

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Fusing internal and external intelligence

Abstract

This chapter covers the fusing of internal and external intelligence to present a singular view of the threats an organization may face. Whether that singular view is presented through training or via threat intelligence specific protocols into a Threat Intelligence Management Platform or a Big Data solution, the goal is to make the view of internal and external data indistinguishable.

Keywords

Security awareness training
CyBOX
OpenIOC
STIX
TAXII
YARA
threat intelligence management platforms
Big Data Security Analytics
Hadoop
Information in this chapter
Security awareness training
OpenIOC, CyBOX, STIX, and TAXII
Threat intelligence management platforms
Big data security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required