The Intelligence Handbook, Fourth Edition

A Roadmap for Building an Intelligence-Led Security Program


What's in the Book?

Intelligence is the most powerful weapon defenders have against adversaries. No matter what security role you play, intelligence enables smarter, faster decisions.

The new, fourth edition of our most popular book is your definitive guide for developing an intelligence-led security program. With 198 pages covering the application of intelligence across the enterprise and new chapters on fraud intelligence, identity intelligence, and attack surface intelligence, it is the most comprehensive book published on intelligence for security teams.

Graduation Cap
Unlock Value

Understand how intelligence disrupts adversaries and amplifies the effectiveness of all security functions.
Examine Use Cases

Learn how to apply intelligence across your entire enterprise to defend your data, systems, facilities, and bottom line.
Chart Line
Develop Your Program

Clarify your security needs, build a winning team, and quickly launch or scale your intelligence-led program to stay one step ahead.
Quote Right Icon

“Current defense strategies are not working. Defenders must switch to offense. Organizations must move to intelligence-led security programs that anticipate adversaries and their intent, monitor the infrastructure they build, and learn from breached organizations.”

Christopher Ahlberg, Ph.D.,

CEO and Co-Founder, Recorded Future

Full Chapter List

Chapter 1 What Is Intelligence for Security Teams?
Chapter 11 Geopolitical Intelligence
Chapter 2 Types and Sources
Chapter 12 Fraud Intelligence
Chapter 3 The Intelligence Lifecycle
Chapter 13 Identity Intelligence
Chapter 4 SecOps Intelligence: Triage
Chapter 14 Attack Surface Intelligence
Chapter 5 SecOps Intelligence: Response
Chapter 15 Intelligence for Security Leaders
Chapter 6 Vulnerability Intelligence
Chapter 16 Intelligence for Emerging Threats
Chapter 7 Threat Intelligence: Knowing Attackers
Chapter 17 Analytical Frameworks for Intelligence
Chapter 8 Threat Intelligence: Risk Analysis
Chapter 18 Intelligence Data Sources and Types
Chapter 9 Third-Party Intelligence
Chapter 19 Your Intelligence Journey
Chapter 10 Brand Intelligence
Chapter 20 Developing Your Core Intelligence Team