Abstract
At this stage, we've discussed what cyber threat intelligence (CTI) is and how you can utilize standards and frameworks to maximize its value, and we've looked at intelligence as a practice overall. Now, armed with your new intelligence requirements, a burning desire, and probably not a lot of money to spend… you're probably thinking "Now what?".
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature
About this chapter
Cite this chapter
Roberts, A. (2021). How Do I Implement This? (Regardless of Budget). In: Cyber Threat Intelligence. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-7220-6_5
Download citation
DOI: https://doi.org/10.1007/978-1-4842-7220-6_5
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-7219-0
Online ISBN: 978-1-4842-7220-6
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books