LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.
Infosec and IT Professionals, security analysts, data analysts, chief privacy officers, risk officers
About The Authors
Foreword
Preface
Acknowledgments
1: Navigating Today’s Threat Landscape
2: Threat Forecasting
3: Security Intelligence
4: Identifying Knowledge Elements
5: Knowledge Sharing and Community Support
6: Data Visualization
7: Data Simulation
8: Kill Chain Modeling
9: Connecting the Dots
10: The Road Ahead
Index
JP
John extensive expertise in the Security field stems from past work experience with the US Intelligence Community, as Chief Technology Officer at CSG LTD, Product Manager at Cisco, Product Line Executive for all security products at IBM Internet Security Systems, Director at McAfee's Network Defense Business Unit, Director of Product Management at HP Enterprise Security Products, Chief Technology Officer at NSS Labs, Co-Founder and Chief Strategy Officer at Bricata, LLC and most recently as Director of Security Solutions for Forsythe Technology.
In addition to a BBA from the University of Texas, John also holds the NSA-IAM and CEH certifications. He has been named security thought leader from SANS Institute and speaks at top tier security conferences worldwide and has been published in Time Magazine, Bloomberg, CNN and other tier 1 media outlets.
DD
David is the Director, Products & Threat Research for Spirent Communications where he drives product strategy for all Application Security testing solutions. He also manages the security engineering team responsible for the research, development and validation of new security attacks (i.e., exploits, malware, DDoS attacks) as well as development of all engine components that support them. Prior to Spirent, David’s career has included roles at the industry’s top security research and testing labs where his expertise guided these organizations in creating industry-leading security tests and solutions for enterprises, services providers and network equipment vendors.
David holds a Master of Science in Cybersecurity from New York University School of Engineering and Bachelor of Science in Computer Science from Millersville University. He is a frequent speaker at major international conferences on topics including threat intelligence, cloud security, GNSS security issues and the impacts of SSL decryption on today’s next generation security products.
ID
He currently lives in Clinton, MD with his Laura and two kids Shaun age 6 and Emma age 1, he also has a dog and a cat. Iain enjoys creating home automation devices from raspberry pi kits along with home media and simple robotics.
Along with his experience in the cyber-security industry, Iain has also written a book with a few of colleagues on threat forecasting, it will be published in the second quarter of this year. The book discusses some techniques used to gather intelligence, the importance of all data not just the obvious. Looking at data from a different perspective, something other than the norm.
Now that he is on the Exabeam team, he may be willing to write yet another book based around UBA and all the things it can it can do in the enterprise.
WG