I was really hoping to learn some TTPs that APTs are using so I could look for them in our shop. That's not what you're going to get with this book. This book was more about building a general security program. The ideas Eric Cole is proposing are really just best practices for running a security program with a bent on how an attacker would target you specifically. There's a few gems in there, but if you're a security practitioner you probably already know this stuff.
The book could've been half the size. There's a lot of repetition that I just started scanning over at some point because he'd already beat the horse dead.