Who: Given Why, What, and How, Now You Can Ask Where To Get It
Abstract
At this point, the book has covered why you are building a cyber-threat capability, what you are going to need, and how you plan to implement it. The next chapter covers going out to the market and deciding who to buy from and the six key axes on which to evaluate an intelligence or data vendor.
Keywords
Get How to Define and Build an Effective Cyber Threat Intelligence Capability now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.