Section 3: What to Do with Threat Intelligence
Section 3 continues exploring the core concept of Section 2: how to collect threat intelligence. In Section 3, we'll examine how threat intelligence can be used, productionized, or further leveraged throughout organizations of any type. This section focuses on what to do with technical threat intelligence after it's been collected and enriched, in addition to identifying areas where threat intelligence can be beneficial to an organization.
This part of the book comprises the following chapters:
- Chapter 10, Preparation and Dissemination
- Chapter 11, Fusion into Other Enterprise Operations
- Chapter 12, Overview of Datasets and Their Practical Application
- Chapter 13, Conclusion