What to Do with Cyber Threat Intelligence
In this final stage of the book, we began the next and final stage of the intelligence life cycle by discussing the preparation of threat intelligence and, finally, the dissemination to stakeholder groups within the organization. After the intelligence has been analyzed and produced, it should be disseminated, with feedback sought.
In Chapter 10, Preparation and Dissemination, we began by discussing the data interpretation journey. In this chapter, we focused on how to interpret the collected data, evaluate it for intelligence, and identify which portions of it should be considered as timely, accurate, and relevant threat intelligence. Special focus in this chapter was placed on interpretation and alignment, critical thinking and reasoning, tagging, and considerations of threat intelligence based on lessons learned by the United States intelligence community.
In Chapter 11, Fusion into Other Enterprise Operations, we specifically...