Chapter 12: Overview of Datasets and Their Practical Application

Throughout this book, we have introduced a lot of concepts that have focused on operationalizing threat intelligence. In this chapter, we will focus on tying all these concepts together by applying them within a real-life scenario. We will be working our way through each of the phases of the intelligence life cycle we introduced to you in Chapter 1, Why You Need a Threat Intelligence Program. We will start with planning and direction by focusing on creating and developing a general intelligence requirement, followed by a prioritized collection requirement, to kick off our intelligence life cycle. Then, we will take this guidance to introduce you to the scenario we will focus on ...

Get Operationalizing Threat Intelligence now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.