Building an Intelligence-Led Security Program ReviewsBuilding Program News]
[wpramazon asin=”0128021454″]
[wpramazon asin=”1522912754″]
Related Building Program Products
Valuable ideas that you can leverage for greater security.,
Overall I would certainly buy this book again, and it presents a wide scope of useful information, and the authors overall depth and considerations are solid. This book belongs in the library of anyone concerned with such a subject and network intelligence.
Was this review helpful to you?
Very Disappointing,
I will give a few examples of the very bad advice. The book recommends using the DomainTools Web site in chapter 6. However, readers should be advised that there is an intel leak with this site and if the security personnel is researching a domain or IP from a nation-state actor it could be very detrimental. Also, the author recommends submitting samples to VirusTotal. Any experienced Cyber Security Professional should know that submitting a possible nation-state sponsored piece of malware to this site could be very bad news. For example, if the malware is tailored to your company, then the threat actor will be able to see that you have found and are analyzing their malware (yes, many advanced and targeted threat actors check VirusTotal for submissions of their malware) – this could cause the threat actor to quickly spread out on your company’s network in order to maintain persistence, making containment and eradication exponentially worse.
I could keep going on about problems I have with this book, but I will stop here. I do not recommend this book.
Was this review helpful to you?
Tie your defense together,
The book offers a wealth of specific tools and processes, and most importantly, how a business can phase in the implementation. For that reason alone, I would recommend it, as we all know many business approach security at the extremes: either not caring at all or just trying to throw money at the problem.
Overall, while I may not necessarily agree with every tactic, this book does a great job of detailing the current state of the art and how those technologies could fit into an overall plan. It is useful to anyone looking to setup a coherent security process.
Disclaimer: I am a colleague of Allan’s though we have never worked for the same company.
Was this review helpful to you?