Book description
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.
- Presents case studies and actual data to demonstrate threat data visualization techniques and threat simulation tools
- Explores the usage of kill chain modelling to inform actionable security intelligence
- Demonstrates a methodology that can be used to create a full threat forecast analysis for enterprise networks of any size
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- About The Authors
- Foreword
- Preface
- Acknowledgments
- 1: Navigating Today’s Threat Landscape
- 2: Threat Forecasting
- 3: Security Intelligence
- 4: Identifying Knowledge Elements
- 5: Knowledge Sharing and Community Support
- 6: Data Visualization
- 7: Data Simulation
- 8: Kill Chain Modeling
- 9: Connecting the Dots
- 10: The Road Ahead
- Index
Product information
- Title: Threat Forecasting
- Author(s):
- Release date: May 2016
- Publisher(s): Syngress
- ISBN: 9780128004784
You might also like
book
Operationalizing Threat Intelligence
Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program Key Features Develop …
book
Incident Response with Threat Intelligence
Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using …
book
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems …
book
Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis
This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It …