Why We Wrote 'The Threat Intelligence Handbook'
By Chris Pace on October 2, 2018
- Recorded Future has published a book aimed at helping security professionals reap the benefits of threat intelligence.
- The book offers practical steps to applying threat intelligence in any organization.
- The ultimate objective is to put threat intelligence into the hands of all those who can use it.
Recorded Future interacts with a lot of people every day. We go to hundreds of events every year, we have tens of thousands of social media followers, we travel around the world to meet our customers and other businesses interested in our products, and we run webinars and training courses. From my involvement in just some of these activities, I can say with confidence that there are two questions that we get asked most frequently:
- What actually is threat intelligence?
- How are other organizations using it?
For the most part, these questions are being asked by security and risk professionals seeking ways to apply threat intelligence in their own organizations. They definitely have an understanding of the potential benefits, and there is an appetite to use intelligence — the challenge that remains is where to start.
Our answer up until now has been, “Well, it depends,” and it still really is the right answer. You will have to decide which of the many use cases for intelligence and which areas of your security will see the clearest benefits to your business. What we wanted to do with this book is to put the options all in one place.
Threat Intelligence as a Solution, Not Just a Function
Our approach is built on the belief that intelligence should be put into the hands of all those who can use it. This approach shifts threat intelligence from a siloed function that’s the preserve of elite teams of analysts to a solution that integrates with and empowers everyone working in security — and one that plays a key role in strengthening defense and reducing risk.
We’ve articulated this in the book in the simplest way we could. By first defining how intelligence can be applied, and then describing how the most common roles in most security organizations can use it, we hope to show how you can mature your own threat intelligence capabilities.
Choose Your Own Adventure
This book is designed to be a practical guide, offering advice that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems.
Chapter 1: Intelligence-Driven Security — Describes the phases of the threat intelligence lifecycle and looks at sources of threat intelligence.
Chapter 2: Threat Intelligence for Security Operations — Explores how intelligence provides context for triage and helps SOC teams make better decisions.
Chapter 3: Threat Intelligence for Incident Response — Discusses how intelligence can minimize reactivity in incident response and presents three use cases.
Chapter 4: Threat Intelligence for Vulnerability Management — Examines how intelligence helps prioritize vulnerabilities based on true risk to the enterprise.
Chapter 5: Threat Intelligence for Security Leaders — Explores how building a comprehensive threat intelligence capability can help CISOs manage risk and make effective investment decisions.
Chapter 6: Threat Intelligence for Risk Analysis — Explains the value of risk models and how intelligence can provide hard data about attack probabilities and costs.
Chapter 7: Threat Intelligence for Fraud Prevention — Enumerates how intelligence can help anticipate and defeat fraud.
Chapter 8: Analytical Frameworks for Threat Intelligence — Explains how three leading threat frameworks provide structures for thinking about attacks.
Chapter 9: Your Threat Intelligence Journey — Provides suggestions on how to start simple and scale up a threat intelligence program.
Chapter 10: Developing the Core Threat Intelligence Team — Describes how a dedicated team can take threat intelligence to a new level.
The book also includes an appendix listing all of the goals a business could have for using threat intelligence to help you identify and prioritize those that might impact your enterprise most.
Get Your Free Paperback Edition
An e-book version of “The Threat Intelligence Handbook” is available to download from our website now, but for a limited time, we will be sending out free hard copies of the book to anyone who wants one. You can request your copy here.