
Effective Threat Intelligence
Building and Running an Intel Team for Your Organization
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
$0.99/mes por los primeros 3 meses

Compra ahora por $14.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Harry Roger Williams III
-
De:
-
James Dietle
Acerca de esta escucha
You already have the tools to make a threat intel program! With the growing number of threats against companies, threat intelligence is becoming a business essential. This book will explore steps facts and myths on how to effectively formalize and improve the intel program at your company by:
- Separating good and bad intelligence
- Creating a threat intelligence maturity model
- Quantifying threat risk to your organization
- How to build and structure a threat intel team
- Ways to build intel talent from within.
With a wider array of information freely available to the public, you do not want to be caught without an understanding of the threats to your company. Explore some ideas to help formalize the efforts to create a safer environment for employees and clients.
©2016 James S Dietle (P)2017 James S DietleLos oyentes también disfrutaron...
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- De: Recorded Future
- Narrado por: Chris Pace
- Duración: 2 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges.
-
-
Basic information for starters
- De SUNIL VARKEY en 03-11-19
De: Recorded Future
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- De: Christian Espinosa
- Narrado por: Kaleo Griffith
- Duración: 6 h y 54 m
- Versión completa
-
General
-
Narración:
-
Historia
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- De Jonathan en 09-01-21
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- De: Nicole Perlroth
- Narrado por: Allyson Ryan
- Duración: 18 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- De since1968 en 02-13-21
De: Nicole Perlroth
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- De: Cliff Stoll
- Narrado por: Will Damron
- Duración: 12 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- De Todd en 08-11-20
De: Cliff Stoll
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- De: Recorded Future
- Narrado por: Chris Pace
- Duración: 2 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges.
-
-
Basic information for starters
- De SUNIL VARKEY en 03-11-19
De: Recorded Future
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- De: Christian Espinosa
- Narrado por: Kaleo Griffith
- Duración: 6 h y 54 m
- Versión completa
-
General
-
Narración:
-
Historia
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- De Jonathan en 09-01-21
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- De: Nicole Perlroth
- Narrado por: Allyson Ryan
- Duración: 18 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- De since1968 en 02-13-21
De: Nicole Perlroth
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- De: Cliff Stoll
- Narrado por: Will Damron
- Duración: 12 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- De Todd en 08-11-20
De: Cliff Stoll
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Accelerate: Building and Scaling High Performing Technology Organizations
- De: Nicole Forsgren PhD, Jez Humble, Gene Kim
- Narrado por: Nicole Forsgren
- Duración: 4 h y 58 m
- Versión completa
-
General
-
Narración:
-
Historia
How can we apply technology to drive business value? For years we've been told that the performance of software delivery teams doesn't matter - that it can't provide a competitive advantage to our companies. Through four years of groundbreaking research to include data collected from the State of DevOps reports conducted with Puppet, Dr. Nicole Forsgren, Jez Humble, and Gene Kim set out to find a way to measure software delivery performance - and what drives it - using rigorous statistical methods.
-
-
Only if you have nothing else to do
- De Gvido en 07-24-18
De: Nicole Forsgren PhD, y otros
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- De: Chris Moschovitis
- Narrado por: Sean Pratt
- Duración: 9 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- De Roger Swanson en 07-19-18
-
Prediction Machines
- The Simple Economics of Artificial Intelligence
- De: Ajay Agrawal, Joshua Gans, Avi Goldfarb
- Narrado por: LJ Ganser
- Duración: 7 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Artificial intelligence does the seemingly impossible - driving cars, trading stocks, and teaching children. But facing the sea change that AI will bring can be paralyzing. How should companies set strategies, governments design policies, and people plan their lives for a world so different from what we know? In Prediction Machines, three eminent economists recast the rise of AI as a drop in the cost of prediction. With this single, masterful stroke, they lift the curtain on the AI-is-magic hype and show how basic tools from economics provide clarity about the AI revolution and a basis for action by CEOs, managers, policy makers, investors, and entrepreneurs.
-
-
Not sure what I was expecting, but underwhelmed
- De William J Brown en 09-27-18
De: Ajay Agrawal, y otros
-
Machine Learning for Beginners
- Absolute Beginners Guide, Learn Machine Learning and Artificial Intelligence from Scratch (Python, Machine Learning, Book 2)
- De: Chris Sebastian
- Narrado por: Brian R. Scott
- Duración: 3 h y 30 m
- Versión completa
-
General
-
Narración:
-
Historia
Machine learning is changing the world. You use machine learning every day and probably don’t know it. In this audiobook, you will learn how ML grew from a desire to make computers able to learn.
-
-
GREAT BOOK!!!
- De Jonathan en 05-29-19
De: Chris Sebastian
-
Data Analytics
- The Insider's Guide to Master Data Analytics
- De: Cedric Nix, Writers International Publishing
- Narrado por: Sean Anthony
- Duración: 2 h y 16 m
- Versión completa
-
General
-
Narración:
-
Historia
Analytics is a vital part of the business world we live in today. Without a detailed analysis of market conditions and other factors it would be impossible to tell if any new venture, whether it be a new business or the revamp of an old one, would be profitable. Data Analytics: Insider's Guide to Master Data Analytics will help you to better understand the complexities of data analytics.
-
-
Awful
- De Dr. Mike Profit en 07-06-17
De: Cedric Nix, y otros
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- De: P. W. Singer, Allan Friedman
- Narrado por: Sean Pratt
- Duración: 11 h y 29 m
- Versión completa
-
General
-
Narración:
-
Historia
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- De Pascal en 03-04-17
De: P. W. Singer, y otros
-
The DevOps Handbook, Second Edition
- How to Create World-Class Agility, Reliability, & Security in Technology Organizations
- De: Gene Kim, Jez Humble, Patrick Debois, y otros
- Narrado por: Ron Butler
- Duración: 15 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
This award-winning and best-selling business handbook for digital transformation is now fully updated and expanded with the latest research and new case studies! Over the last five years, The DevOps Handbook has been the definitive guide for taking the successes laid out in the best-selling The Phoenix Project and applying them in any organization. Now, with this fully updated and expanded edition, it’s time to take DevOps out of the IT department and apply it across the full business.
-
-
Atrocious
- De Anonymous User en 05-25-22
De: Gene Kim, y otros
-
Cybersecurity for Beginners
- De: Raef Meeuwisse
- Narrado por: Danny Eastman
- Duración: 7 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
-
Not for IT ppl moving into security
- De keith en 03-25-18
De: Raef Meeuwisse
-
Building Microservices
- Designing Fine-Grained Systems
- De: Sam Newman
- Narrado por: Theodore O'Brien
- Duración: 21 h y 12 m
- Versión completa
-
General
-
Narración:
-
Historia
As organizations shift from monolithic applications to smaller, self-contained microservices, distributed systems have become more fine-grained. But developing these new systems brings its own host of problems. This expanded second edition takes a holistic view of topics that you need to consider when building, managing, and scaling microservices architectures. Through clear examples and practical advice, author Sam Newman gives everyone from architects and developers to testers and IT operators a firm grounding in the concepts.
-
-
Easy to Understand
- De Anonymous User en 04-27-22
De: Sam Newman
-
Essential CISM: Updated for the 16th Edition CISM Review Manual
- De: Phil Martin
- Narrado por: Phil Martin
- Duración: 11 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
Essential CISM has been written with a single goal in mind - to present the CISM material in a way that is easy to absorb without leaving any content behind. Plenty of examples are included to drive the points home so that when it comes time to take the CISM exam, you are ready! The book is broken down into two sections. Section 1 covers basic concepts you will need to understand before hitting each domain. The CISM official exam guide is redundant across the domains, and so in this book you will encounter each topic once instead of having to rehash the same subject in different ways.
-
-
Helpful as an addition for the CISM exam Prep.
- De Alex Syvorotka en 05-06-19
De: Phil Martin
-
The Psychology of Information Security
- De: Leron Zinatullin
- Narrado por: Peter Silverleaf
- Duración: 2 h y 12 m
- Versión completa
-
General
-
Narración:
-
Historia
Based on insights gained from academic research, as well as interviews with UK-based security professionals from various sectors, The Psychology of Information Security describes how resolving conflicts between security compliance and human behavior explains the importance of careful risk management and how to align a security program with wider business objectives, providing methods and techniques to engage stakeholders and encourage buy-in.
-
-
Good insight
- De Antonio Rodgers en 04-14-19
De: Leron Zinatullin
-
Essential CISA Exam Guide: Updated for the 26th Edition
- De: Phil Martin
- Narrado por: Phil Martin
- Duración: 22 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
Essential CISA has been made with a single goal in mind - to present the CISA material in a way that is easy to absorb without leaving any content behind. Plenty of examples are included to drive the points home so when it comes time to take the CISA exam, you are ready!
-
-
Good material, besides being the currently only
- De Ariel en 12-22-19
De: Phil Martin
Lo que los oyentes dicen sobre Effective Threat Intelligence
Calificaciones medias de los clientesReseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- David F Philo
- 03-09-19
Narrative was distracting.
The material/content was good but the narrator voice was distracting. The male voice was swings wildly making me fell like riding on a roller coaster.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Benjamin.Scalise
- 06-25-21
Good Overview of CTI
Provided a good overview of Cyber threat intelligence management and provides some great recommendations.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- TechDude
- 09-11-18
Quite broad
While this is a great book for someone that knows absolutely nothing about Threat Intelligence, however if you're in the security field, this book should be condensed to five minutes. Does not really dive into maturing a threat intel team
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Toby Wilmington
- 02-19-19
The content is good, the narrator is not - struggling to continue
I am a few chapters in to this audio book, and whilst I am sure the rest of the audiobook will contain meaningful and useful content (as the last 45 minutes has), I am doubting as to whether I can continue.
I listen to tonnes of Audiobooks, of varying subjects and I have never had this issue - the narration is so odd - like a robotic human scripted AI...
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña