A Requirements-driven Approach to Cyber Threat Intelligence
Cyber threat intelligence (CTI) is never an end in itself. It instead serves a broader mission: to inform, advise, and empower stakeholders within an organization or community. Stakeholder needs drive intelligence requirements. Intelligence requirements are therefore pivotal to a successful CTI capability. This paper describes the value of a requirements-driven approach to intelligence, outlines requirements-driven practices, and offers actionable advice on how Intelligence functions can implement and optimize such an approach themselves.
If your Download does not start Automatically, Click Download Whitepaper