A Requirements-driven Approach to Cyber Threat Intelligence

A Requirements-driven Approach to Cyber Threat Intelligence

 

 

A Requirements-driven Approach to Cyber Threat Intelligence

Cyber threat intelligence (CTI) is never an end in itself. It instead serves a broader mission: to inform, advise, and empower stakeholders within an organization or community. Stakeholder needs drive intelligence requirements. Intelligence requirements are therefore pivotal to a successful CTI capability. This paper describes the value of a requirements-driven approach to intelligence, outlines requirements-driven practices, and offers actionable advice on how Intelligence functions can implement and optimize such an approach themselves.

White Paper from  Red_Hat_logo

    Read the full content


    You have been directed to this site by Global IT Research. For more details on our information practices, please see our Privacy Policy, and by accessing this content you agree to our Terms of Use. You can unsubscribe at any time.

    If your Download does not start Automatically, Click Download Whitepaper

     

    Show More