Этот коммит содержится в:
Cypher 2023-01-22 15:38:35 -05:00 коммит произвёл GitHub
родитель 1ddb3391fb
Коммит 38016902bd
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: 4AEE18F83AFDEB23

Просмотреть файл

@ -70,5 +70,5 @@ A collection of essential resources related to cyber threat intelligence theory.
| [Recorded Future](https://recordedfuture.com)| Recorded Future maintains a handbook detailing their vendor-biased playbooks for responding to typical CTI-type detections within an enterprise CTI program. This is useful for understanding what threat intelligence response cases may look like in an enterprise CTI program | [The Intelligence Playbook: Practical Applications Across the Enterprise](https://go.recordedfuture.com/hubfs/The_Intelligence_Playbook_Practical_Applications_Across_the_Enterprise.pdf) |
| [Mandiant](https://www.mandiant.com/) | The core skills framework provides enterprises and individuals guidance with three things: 1. determine appropriate development roadmaps to ensure CTI skills progression; 2. provide a guidepost for aspirant CTI analysts to tailor their studies; 3. assist network defenders in understanding the roles and responsibilities of a CTI analyst | [The Mandiant Cyber Threat Intelligence (CTI) Analyst Core Competencies Framework](https://www.mandiant.com/sites/default/files/2022-05/cti-analyst-core-competencies-framework-v1.pdf) |
| [CERT-BI](https://cert.bancaditalia.it/)| This whitepaper details an enterprise-friendly service architecture for offering an enhanced CTI capability | [A service architecture for an enhanced CTI capability](http://ceur-ws.org/Vol-2940/paper37.pdf) |
| ENISA | ENISA report on evaluating Threat Intelligence Platform (TIPs) | [enisa.europa.eu](https://www.enisa.europa.eu/publications/exploring-the-opportunities-and-limitations-of-current-threat-intelligence-platforms/at_download/fullReport) |
| NCSC | This guide is aimed at individuals who oversee or deliver threat intelligence capability to a department. This document provides a roadmap to delivering a CTI capability and an overview of the activities, deliverables and technologies required. | [Cyber Threat Intelligence in Government: A Guide for Decision Makers & Analysts](https://hodigital.blog.gov.uk/wp-content/uploads/sites/161/2020/03/Cyber-Threat-Intelligence-A-Guide-For-Decision-Makers-and-Analysts-v2.0.pdf) |
| ENISA | ENISA report on evaluating Threat Intelligence Platform (TIPs) | [Exploring the opportunities and limitations of current Threat Intelligence Platforms](https://www.enisa.europa.eu/publications/exploring-the-opportunities-and-limitations-of-current-threat-intelligence-platforms/at_download/fullReport) |