Chapter 2

A Problem Well-Defined is Half-Solved

Abstracts

This chapter covers the importance of molding a threat-intelligence program around (company-specific) business objectives, that is, it must pursue a well-defined mission that is bounded, scoped, and relatively rigid; work within a set of clear expectations in a portfolio of responsibilities that everyone agrees to; and meaningfully report metrics that matter to management and budget holders.

Keywords

application vulnerabilities
malware signatures
URL blacklists
botted nodes
vulnerability threat intelligence
security posture
risk assessment
spear phishing
Threat intelligence is absolutely the buzzword “du jour.” It is being used to seek venture capital and fund start-ups. It is ...

Get How to Define and Build an Effective Cyber Threat Intelligence Capability now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.