Chad Warner“Intelligence-Driven Incident Response” NotesIntelligence-Driven Incident Response: Outwitting the Adversary, Second Edition by Rebekah Brown and Scott J. Roberts is a helpful…Dec 2, 2021Dec 2, 2021
Chad Warner“Practical Threat Intelligence and Data-Driven Threat Hunting” NotesIn Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK™ Framework and open…Nov 30, 2021Nov 30, 2021
Chad Warner“Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers” NotesCyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers by Aaron Roberts is a very informative guide to cyber…Nov 30, 2021Nov 30, 2021
Chad Warner“The Security Intelligence Handbook” NotesThe Security Intelligence Handbook: How to Disrupt Adversaries and Reduce Risk With Security Intelligence, Third Edition by Recorded Future…Nov 30, 2021Nov 30, 2021
Chad Warner“How to Define and Build an Effective Cyber Threat Intelligence Capability” NotesHow to Define and Build an Effective Cyber Threat Intelligence Capability by Henry Dalziel is a very brief high-level guide to setting up a…Nov 30, 2021Nov 30, 2021
Chad WarnerTactical, Operational, Strategic Levels of CTIThere are 3 levels of cyber threat intelligence: tactical, operational, and strategic. They progress from the micro to the macro level in…Feb 10, 2022Feb 10, 2022
InThe Gray AreabySigmund Brandstaetter CISSP, CCSP, CISM, OSCP, CEHStreamlining Detection & Response: The Role of Cyber Threat Intelligence and AI in Modern SOC…IntroductionApr 21, 2023Apr 21, 2023