Chad Nelley - Cyber Security Operations & Leadership
  • Home
  • About
  • OPS Portfolio
    • Early Career
    • Core Career
    • Nelley Consulting, LLC
    • Boards & Non-Profit Experience
  • CS Portfolio
    • Cybersecurity Fundamentals
    • Cryptography
    • Security Architecture >
      • Conceptual Security Architecture
      • Logical Security Architecture
      • Physical Security Architecture
      • Component Security Architecture
      • Governance & CS Operations
    • Operational Policy >
      • Policy Charter & Compliance
      • Mobile & Antivirus Policy
      • Privacy Policy & Classification
    • Risk Management
    • Management & Cybersecurity
    • Secure Software Design & Development
    • Network Visualization
    • Cyber Threat Intelligence
    • Incident Response & Forensics
  • SC Resource Links
    • Cyber Education
    • Industry Resources
    • Cybersecurity News
    • Cyber Economic Development
    • Cryptography Links
    • Security Architecture Links
    • Operational Policy Links
    • Risk Management Links
    • Management & Cybersecurity Links
    • Secure Software Design & Development Links
    • Network Visualization & Vulnerability Links
    • Cyber Threat Intelligence Links
    • Incident Response & Forensics Links
  • Contact
  • Home
  • About
  • OPS Portfolio
    • Early Career
    • Core Career
    • Nelley Consulting, LLC
    • Boards & Non-Profit Experience
  • CS Portfolio
    • Cybersecurity Fundamentals
    • Cryptography
    • Security Architecture >
      • Conceptual Security Architecture
      • Logical Security Architecture
      • Physical Security Architecture
      • Component Security Architecture
      • Governance & CS Operations
    • Operational Policy >
      • Policy Charter & Compliance
      • Mobile & Antivirus Policy
      • Privacy Policy & Classification
    • Risk Management
    • Management & Cybersecurity
    • Secure Software Design & Development
    • Network Visualization
    • Cyber Threat Intelligence
    • Incident Response & Forensics
  • SC Resource Links
    • Cyber Education
    • Industry Resources
    • Cybersecurity News
    • Cyber Economic Development
    • Cryptography Links
    • Security Architecture Links
    • Operational Policy Links
    • Risk Management Links
    • Management & Cybersecurity Links
    • Secure Software Design & Development Links
    • Network Visualization & Vulnerability Links
    • Cyber Threat Intelligence Links
    • Incident Response & Forensics Links
  • Contact

Cyber Threat Intelligence Links


For For more information on Cyber Threat Intelligence see below links:
https://docs.google.com/viewer?a=v&pid=forums&srcid=MDY4NDM1NzM3NzA2MjI3MjE2MjYBMDg2NjAxMzE4OTY0NTQxNDQ5NDYBalBnaGhjb3pPYzhKATAuMQEBdjI
http://h20195.www2.hpe.com/v2/getpdf.aspx/4AA6-6901ENW.pdf?ver=1.0
http://www.darkreading.com/vulnerabilities---threats/state-sponsored-cybercrime-a-growing-business-threat/a/d-id/1320555
https://docs.google.com/viewer?a=v&pid=forums&srcid=MDY4NDM1NzM3NzA2MjI3MjE2MjYBMDg2NjAxMzE4OTY0NTQxNDQ5NDYBalBnaGhjb3pPYzhKATAuMQEBdjI
http://h20195.www2.hpe.com/v2/getpdf.aspx/4AA6-6901ENW.pdf?ver=1.0
http://www.darkreading.com/vulnerabilities---threats/state-sponsored-cybercrime-a-growing-business-threat/a/d-id/1320555

For Information related to the Cyber Kill Chain please see below links:
http://resources.infosecinstitute.com/cyber-kill-chain-is-a-great-idea-but-is-it-something-your-company-can-implement/#gref
http://www.lockheedmartin.com/us/what-we-do/aerospace-defense/cyber/cyber-kill-chain.html
https://en.wikipedia.org/wiki/Kill_chain

Proudly powered by Weebly