Wk 5 Threat Intelligence Sources and Providers Summary and Conclusion

Anonymous
timer Asked: Mar 29th, 2019
account_balance_wallet $20

Question Description

1. An introduction to the topic that provides a brief overview of threat intelligence in general (how the term is defined / used) and how it can be used to support the risk management process (e.g. risk identification, risk mitigation strategies, etc.)

2. Provide examples (backed up by citations to readings) of externally developed cyber threat intelligence which could be used to support the company's risk management efforts. You should consider cyberthreat intelligence services from both commercial providers and the ISAC cooperatives.

3. Provide a summary & conclusions section in which you state your opinion as to which providers would be the best sources of cyberthreat intelligence for the company.

Unformatted Attachment Preview

The CISO's office at your selected e-Commerce company (from Project 1) has invited you to present an analysis of how threat intelligence products and services obtained from external sources can be used to improve the company's risk management efforts. Your presentation will be given as part of a panel discussion at the CISO's monthly meeting with executives and managers. The CISO sponsors these panels to help staff members learn more about cybersecurity products and services and the vendors from which these capabilities can be purchased. To prepare for your presentation, you must write a 3 to 5 paragraph briefing statement in which you summarize your analysis. This will be reviewed by the CISO before you give your presentation. Your briefing statement must provide: 1. An introduction to the topic that provides a brief overview of threat intelligence in general (how the term is defined / used) and how it can be used to support the risk management process (e.g. risk identification, risk mitigation strategies, etc.) 2. Provide examples (backed up by citations to readings) of externally developed cyber threat intelligence which could be used to support the company's risk management efforts. You should consider cyberthreat intelligence services from both commercial providers and the ISAC cooperatives. 3. Provide a summary & conclusions section in which you state your opinion as to which providers would be the best sources of cyberthreat intelligence for the company. ...
Purchase answer to see full attachment

Tutor Answer

Prof_Holley
School: Duke University

Attached.

Threat Intelligence Sources and Providers
Threat intelligence can be said to be organized, analyzed and refined information that an
organization uses to figure out the threats that have, will, or are currently targeting the
organization (Hayslip, 2017). Thus, threat intelligence also known as cyber threat intelligence
provides crucial information that an organization can use in risk management process to design
proper security mechanisms as well as mitigate the risks that could negatively affect their brand,
business operations, and bottom line. Moreover, CTI can also be used to prioritize patching.
Using the information provided by intelligence, th...

flag Report DMCA
Review

Anonymous
Good stuff. Would use again.

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors