Summary
This chapter covered threat intelligence requirements and their prioritization. It also detailed the most effective methods for developing intelligence requirements using a military approach known as the IPOE. Lastly, we tackled how to construct an intelligence team by laying out the required skills and structuring the organization's security system by selecting the right profile for the CTI team.
The second crucial step in the planning and direction phase of the intelligence cycle is selecting the platforms and tools for the intelligence project. Therefore, the next chapter covers various intelligence frameworks, how they can be used to produce an intelligence product, and how to select the appropriate framework for the tasks that have been defined.
Detention points (need to know the network topology) |
Indicators (selected from the characteristics of the threat) |
... |