Wk 5 Threat Intelligence Sources and Providers Summary and Conclusion

User Generated

Yvmml1977

Other

Description

1. An introduction to the topic that provides a brief overview of threat intelligence in general (how the term is defined / used) and how it can be used to support the risk management process (e.g. risk identification, risk mitigation strategies, etc.)

2. Provide examples (backed up by citations to readings) of externally developed cyber threat intelligence which could be used to support the company's risk management efforts. You should consider cyberthreat intelligence services from both commercial providers and the ISAC cooperatives.

3. Provide a summary & conclusions section in which you state your opinion as to which providers would be the best sources of cyberthreat intelligence for the company.

Unformatted Attachment Preview

The CISO's office at your selected e-Commerce company (from Project 1) has invited you to present an analysis of how threat intelligence products and services obtained from external sources can be used to improve the company's risk management efforts. Your presentation will be given as part of a panel discussion at the CISO's monthly meeting with executives and managers. The CISO sponsors these panels to help staff members learn more about cybersecurity products and services and the vendors from which these capabilities can be purchased. To prepare for your presentation, you must write a 3 to 5 paragraph briefing statement in which you summarize your analysis. This will be reviewed by the CISO before you give your presentation. Your briefing statement must provide: 1. An introduction to the topic that provides a brief overview of threat intelligence in general (how the term is defined / used) and how it can be used to support the risk management process (e.g. risk identification, risk mitigation strategies, etc.) 2. Provide examples (backed up by citations to readings) of externally developed cyber threat intelligence which could be used to support the company's risk management efforts. You should consider cyberthreat intelligence services from both commercial providers and the ISAC cooperatives. 3. Provide a summary & conclusions section in which you state your opinion as to which providers would be the best sources of cyberthreat intelligence for the company.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Threat Intelligence Sources and Providers
Threat intelligence can be said to be organized, analyzed and refined information that an
organization uses to figure out the threats that have, will, or are currently targeting the
organization (Hayslip, 2017). Thus, threat intelligence also known as cyber threat intelligence
provides crucial information that an organization can use in risk management process to design
proper security mechanisms as well as mitigate the risks that could negatively affect their brand,
business operations, and bottom line. Moreover, CTI can also be used to prioritize patching.
Using the information provided by intelligence, th...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags