O'Reilly logo

Information Security Analytics by Jason Martin, Inez Miyamoto, Robert McPherson, Mark Talabis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Security Intelligence and Next Steps

Abstract

In this chapter, we will explain how you develop security intelligence so that you may increase your security response posture. Our goal is to help you to start thinking about how security intelligence can work for you so that you may increase your effectiveness and productivity.

Keywords

Privacy; Risk management; Security analytics; Security intelligence
Information in This Chapter
▪ Overview (17 pages)
▪ Security Intelligence
Basic Security Intelligence Analysis
Business Extension of Security Intelligence
▪ Security Breaches
▪ Practical Applications
Insider Threat
Resource Justification
Risk Management
Challenges
▪ Data
▪ Integration of Equipment and Personnel
▪ False Positives
▪ Concluding Remarks ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required