
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet or computer - no Kindle device required. Learn more.
Read instantly on your browser with Kindle Cloud Reader.
Using your mobile phone camera - scan the code below and download the Kindle app.


Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers Paperback – 10 Aug. 2021
Aaron Roberts (Author) See search results for this author |
- Choose from over 20,000 locations across the UK
- FREE unlimited deliveries at no additional cost for all customers
- Find your preferred location and add it to your address book
- Dispatch to this address when you check out
Enhance your purchase
- ISBN-101484272196
- ISBN-13978-1484272190
- Edition1st ed.
- Publication date10 Aug. 2021
- LanguageEnglish
- Dimensions15.49 x 1.35 x 23.5 cm
- Print length229 pages
Customers who bought this item also bought
Product description
From the Back Cover
There are a lot of competing approaches and ways of working, but this book cuts through the confusion. Author Aaron Roberts introduces the best practices and methods for using CTI successfully. This book will help not only senior security professionals, but also those looking to break into the industry. You will learn the theories and mindset needed to be successful in CTI.
This book covers the cybersecurity wild west, the merits and limitations of structured intelligence data, and how using structured intelligence data can, and should, be the standard practice for any intelligence team. You will understand your organizations’ risks, based on the industry and the adversaries you are most likely to face, the importance of open-source intelligence (OSINT) to any CTI practice, and discover the gaps that exist with your existing commercial solutions and where to plug those gaps, and much more.
You will:
- Know the wide range of cybersecurity products and the risks and pitfalls aligned with blindly working with a vendor
- Understand critical intelligence concepts such as the intelligence cycle, setting intelligence requirements, the diamond model, and how to apply intelligence to existing security information
- Understand structured intelligence (STIX) and why it’s important, and aligning STIX to ATT&CK and how structured intelligence helps improve final intelligence reporting
- Know how to approach CTI, depending on your budget
- Prioritize areas when it comes to funding and the best approaches to incident response, requests for information, or ad hoc reporting
- Critically evaluate services received from your existing vendors, including what they do well, what they don’t do well (or at all), how you can improve on this, the things you should consider moving in-house rather than outsourcing, and the benefits of finding and maintaining relationships with excellent vendors
About the Author
Aaron Roberts is an intelligence professional specializing in Cyber Threat Intelligence (CTI) and Open-Source Intelligence (OSINT). He is focused on building intelligence-led cyber capabilities in large enterprises and conducting online investigations and research. He has worked within several the public and private sectors as well as the British Military. As such he understands how intelligence can and should be utilized within a range of environments and the fundamental approach that businesses must take to get the maximum value out of their cyber threat intelligence program.
Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.
Product details
- Publisher : Apress; 1st ed. edition (10 Aug. 2021)
- Language : English
- Paperback : 229 pages
- ISBN-10 : 1484272196
- ISBN-13 : 978-1484272190
- Dimensions : 15.49 x 1.35 x 23.5 cm
- Best Sellers Rank: 425,687 in Books (See Top 100 in Books)
- 852 in Computer Security
- Customer reviews:
About the author

Aaron Roberts is an intelligence professional specializing in Cyber Threat Intelligence (CTI) and Open-Source Intelligence (OSINT). He is focused on building intelligence-led cyber capabilities in large enterprises and conducting online investigations and research. He has worked within the public and private sectors as well as the British Military. As such he understands how intelligence can and should be utilized within a range of environments and the fundamental approach that businesses must take to get the maximum value out of their cyber threat intelligence program.
Customer reviews
Customer Reviews, including Product Star Ratings, help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyses reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon