Summary
Knowing how to set intelligence goals and take the right approach to integrate CTI in an organization is essential for a CTI analyst. While commercial TIPs provide many benefits, organizations can still leverage open source ones to build a sound CTI program.
This chapter has covered how to set the fundamental objectives and goals of CTI and how it works with the other security functions of an organization. The chapter has explained how threat intelligence can strategically be implemented and how different organizations can integrate it into their business processes for informed security decisions. The chapter also introduced TIPs and their advantages in integrating intelligence programs. And finally, the chapter has covered the installation of the MISP open-source TIP, which is used in most parts of this book.
In the next chapter, we look at cyber threat modeling and adversary analysis.