Summary
This very well could be the most important chapter in this book. Without an effective OPSEC process to assess risk, procedures to protect identities and the technical aspects of the work, and organizational policies to set expectations and create an OPSEC culture, organizations can be lured into a false sense of security. During collection operations, breakdowns in OPSEC can lead to discovery by the threat actor, counter-operations being conducted by threat actors, personal and organizational targeting, and even physical harm. In this chapter, we talked about the OPSEC process and the available types, both identity-focused and technically focused. We also discussed actor engagement, source protection, monitoring, and training.
In the next chapter, we will dive into technical threat intelligence collection, which focuses on the methodologies and techniques that are used to collect threat intelligence. Then, we will compare active versus passive collection and take a deep...