Description
1. An introduction to the topic that provides a brief overview of threat intelligence in general (how the term is defined / used) and how it can be used to support the risk management process (e.g. risk identification, risk mitigation strategies, etc.)
2. Provide examples (backed up by citations to readings) of externally developed cyber threat intelligence which could be used to support the company's risk management efforts. You should consider cyberthreat intelligence services from both commercial providers and the ISAC cooperatives.
3. Provide a summary & conclusions section in which you state your opinion as to which providers would be the best sources of cyberthreat intelligence for the company.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached.
Threat Intelligence Sources and Providers
Threat intelligence can be said to be organized, analyzed and refined information that an
organization uses to figure out the threats that have, will, or are currently targeting the
organization (Hayslip, 2017). Thus, threat intelligence also known as cyber threat intelligence
provides crucial information that an organization can use in risk management process to design
proper security mechanisms as well as mitigate the risks that could negatively affect their brand,
business operations, and bottom line. Moreover, CTI can also be used to prioritize patching.
Using the information provided by intelligence, th...