O'Reilly logo

Building an Intelligence-Led Security Program by Allan Liska

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8

CERTs, ISACs, and intelligence-sharing communities

Abstract

Outside of the world of data feeds, there are a number of excellent sources of information that can provide broad, sector specific, and even company-specific information that can be used to produce finished intelligence within an organization. This chapter provides an overview of some of those sources.

Keywords

CERT
CSIRT
ISAC
FS-ISAC
IT-ISAC
ICS-ISAC
SARA
NH-ISAC
MS-ISAC
R-ISAC
Air Domain Intelligence Integration Center
Vorstack
Soltra
ThreatConnect
Information in this chapter
CERTs and CSIRTs
ISACs
Intelligence-sharing communities

Introduction

Building out an intelligence-led security program is hard; doing it alone is almost impossible. The good news is ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required