The only way to get where we need to be in security analysis is if we use Security Intelligence. This means working harder and understanding the big picture of your data.
12. Non-Typical Data
(but still relevant to security)
• Web Application Data
• Voice and Communication
• Email
• Performance Monitoring
• ID Management
• External Data Sources
38. Closing
The only way to really get where we need to
be in security analysis is if we:
•Put in the work to get there
•Think outside the box
•Change what is normal for security analysis