课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Intelligence sharing

Intelligence sharing

- [Narrator] Take a moment to think about the different business functions that would benefit from threat intelligence information within your own organization. You may have a variety of supported functions where threat intelligence sharing would add value, such as incident response teams who are tasked with actively responding to security incidents. Vulnerability management teams who must identify potential weaknesses that could lead to future incidents. Risk management teams who must understand the big picture of cybersecurity risk. Security engineering teams who must design controls to combat emerging threats. And detection and monitoring teams such as the Security Operations Center who are responsible for actively monitoring the security environment for threat indicators. Technology frameworks for threat intelligence allow the automated sharing of information between the tools and systems used by each of these functions. Information becomes even more powerful when shared in a…

内容