“How to Define and Build an Effective Cyber Threat Intelligence Capability” Notes

Chad Warner
2 min readNov 30, 2021

--

How to Define and Build an Effective Cyber Threat Intelligence Capability by Henry Dalziel is a very brief high-level guide to setting up a cyber threat intelligence (CTI) program.

“How to Define and Build an Effective Cyber Threat Intelligence Capability” by Henry Dalziel

This page contains one or more affiliate links. As an Amazon Associate, I earn from qualifying purchases.

Notes

Much of what’s called “cyber threat intelligence” is actually data; intelligence is data that’s been put through a process to evaluate the data in context and produce a useable output.

Intelligence must be relevant, actionable, valuable (have business value).

Business objectives for CTI

  • Grow revenue
  • Lower expenses
  • Reduce risk
  • Increase customer satisfaction and retention
  • Increase employee retention and satisfaction
  • Comply with regulations

Questions to ask before investing in CTI

  1. What is the driver to buy or build CTI capabilities? Compliance, risk reduction, etc.?
  2. Can you define a clear, bounded, mission or set of responsibilities?
  3. Can you quantify the problem, risk, or value of the solution?
  4. How will you operationalize the information to support the objective?
  5. How will you report and measure performance to justify expenditures?

Evaluate vendors of intelligence/data on quality, quantity, uniqueness, value, ease, vendor’s reputation and longevity.

Questions to ask when defining and building a CTI capability

  1. Why are you doing it? (business objective)
  2. What do you need to do? (activities that support business objective)
  3. How are you going to implement it? (architecture, operational model, etc.)
  4. Who will build it? Who will operate it? (skills and sourcing options)

If you start with ‘why,’ derive ‘what’ you need. On the basis of that, establish ‘how’ you will operate and then decide ‘who’ to engage, you are well positioned to create, and successfully operate an effective threat-intelligence capability.

“If you start with ‘why,’ derive ‘what’ you need. On the basis of that, establish ‘how’ you will operate and then decide ‘who’ to engage, you are well positioned to create, and successfully operate an effective threat-intelligence capability.”

--

--

Chad Warner
Chad Warner

Written by Chad Warner

Web Strategist at OptimWise. Cybersecurity & privacy enthusiast. Bookworm. Fan of Tolkien & LEGO.

No responses yet