Description
This free excerpt from the book Building an Effective Cybersecurity Program, 2nd Edition, by Tari Schreider C|CISO, CRISC, ITIL® Foundation, MCRP, SSCP will help you to begin Building YOUR Cyber Threat, Vulnerability Detection, and Intelligence Capability.
This chapter will help you to:
- Understand the relationship between threats and vulnerabilities.
- Understand how to identify and categorize cyber threats.
- Know how to detect vulnerabilities within your organization.
- View your organization as an attack surface.
For more information about this book, see Building an Effective Cybersecurity Program 2nd Edition
The book is presented as a practical roadmap detailing each step required for you to build your effective cybersecurity program and fight off cyber threats. It also provides many design templates to assist in program builds and all chapters include self-study questions to gauge your progress. Building An Effective Cybersecurity Program (2nd Edition) is your single source reference for building effective cybersecurity programs!
Cyber Threat Intelligence Program Use Cases
If you are still wondering how an intelligence capability would benefit your organization, I have highlighted several tactical use cases.
- Countermeasures alignment: Countermeasures rely on rules, filters, and signatures to be effective. Intelligence provides advanced warning of specific cyber threats that countermeasures can address if properly configured. Using high quality intelligence reduces false positives.
- Incident response (IR): The IR team can use threat intelligence to validate indicators that triggered alarms accelerating response time. The intelligence can provide valuable data about a cyber threat, it’s origin, behavior, and associated adversaries.
- SecOps: Threat intelligence can assist SecOps personnel to triage SIEM alerts through the attachment of risk score tags. Threat intelligence systems can interface directly with the SIEM to automate alert prioritization.
- System hygiene: Patching systems is a significant effort for any organization and knowing what and when to patch can save precious resources, time, and budget. Most organizations operate on a patching backlog and prioritizing patching efforts allows you to focus on your most at-risk systems.
Building An Effective Cybersecurity Program 2nd edition reviews
Is your business facing a cyber threat? How effective is your cybersecurity programs? Hear what others have to say about Tari Schreider’s latest book:
“There are a myriad of cybersecurity books available these days. However, none like this. This book is the differentiator.”
“Schreider has decades of information security and risk management experience in numerous environments and industries. He brings that experience to every chapter in this valuable guide.”