Chapter 11: Fusion into Other Enterprise Operations
As we begin the process of dissemination and approach the end of the intelligence life cycle, we need to put some thought into how each of our potential organizational stakeholders will consume and use the intelligence before we begin the cycle again. There are many internal stakeholders within an organization who can consume this intelligence for many different purposes. In this chapter, we will discuss how different enterprise stakeholders within an organization consume threat intelligence by examining different organization elements and determining their needs and use cases. By the end of this chapter, you will have a better understanding of how to share threat intelligence across your key stakeholder groups and be able to identify any special considerations that must be accounted for throughout the entire intelligence life cycle.
In this chapter, we will examine the following stakeholders, as we believe that today, most enterprise...