Cyber Intelligence-Driven Risk. Richard O. Moore, III
tion id="u6750976f-4369-58cb-9e4d-3b630dd6573d">
Table of Contents
1 Cover
7 CHAPTER 1: Objectives of a Cyber Intelligence-Driven Risk Program NOTES NOTES
8 CHAPTER 2: Importance of Cyber Intelligence for Businesses NOTES NOTES
9 CHAPTER 3: Military to Commercial Viability of the CI-DR™ Program NOTES NOTES
10 CHAPTER 4: CI-DR™ Security Program Components NOTES NOTE
11 CHAPTER 5: Functional Capabilities of the CI-DRTM Program NOTES NOTES
12 CHAPTER 6: CI-DR™ Key Capability Next-Generation Security Operations Center NOTES NOTES
13 CHAPTER 7: CI-DR™ Key Capability Cyber Threat Intelligence NOTES NOTES
14 CHAPTER 8: CI-DR™ Key Capability Forensic Teams NOTES
15 CHAPTER 9: CI-DR™ Key Capability Vulnerability Management Teams NOTES NOTES
16 CHAPTER 10: CI-DR™ Key Capability Incident Response Teams NOTES
17 CHAPTER 11: CI-DR™ Collection Components NOTES NOTE
18 CHAPTER 12: CI-DR™ Stakeholders NOTES
19 Conclusion
20 Glossary
21 About the Author and Chapter Authors RICHARD O. MOORE III, MSIA, CISSP, CISM, AUTHOR AND EDITOR STEVEN JOHNSON, DSC, CISM, CISSP, CCE #1463 DEREK OLSON, CISSP, CISM STEVEN M DUFOUR, ISO LEADER AUDITOR, CERTIFIED QUALITY MANAGER
22 Index
List of Illustrations
1 IntroductionFIGURE I.1 CI-DR's business value.
2 Chapter 2FIGURE 2.1 CI-DR™ Cyber intelligence life cycle.
3 Chapter 4FIGURE 4.1 CI-DR™ maturity.FIGURE 4.2 CI-DR™ functions and capabilities.
4 Chapter 5FIGURE 5.1 Vulnerability trending metrics.FIGURE 5.2 Risk and control success.FIGURE 5.3 Asset risk assessment.FIGURE 5.4 Assets to architecture.FIGURE 5.5 Assets to coordination.FIGURE 5.6 Application threat trending.FIGURE 5.7 Exception trending.
5 Chapter 7FIGURE 7.1 Threat reporting.
6 Chapter 12FIGURE 12.1 CI-DR and AI compatibility.
Guide
Pages
1 iii
2 iv
3 vii