Chapter 7

Who: Given Why, What, and How, Now You Can Ask Where To Get It

Abstract

At this point, the book has covered why you are building a cyber-threat capability, what you are going to need, and how you plan to implement it. The next chapter covers going out to the market and deciding who to buy from and the six key axes on which to evaluate an intelligence or data vendor.

Keywords

management communication
chief financial officer (CFO)
capital expenditure
operational expenditure
By this time in the process, you know – technologically and in terms of personnel – why you are doing it, what you are going to need, and how you plan to implement it. The next logical step from here is going out to the market and deciding whom to buy from. ...

Get How to Define and Build an Effective Cyber Threat Intelligence Capability now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.