The Cyber Threat Intelligence Cycle

Photo by Robby McCullough on Unsplash

Planning & Direction

Collection

Processing

Analysis & Production

Dissemination (or Distribution)

Feedback

Applying the CTI Cycle

Additional Resources

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Chad Warner

Chad Warner

Cyber threat intelligence (CTI), cybersecurity, & privacy enthusiast. Seeking a CTI job. Bookworm. Fan of Tolkien & LEGO.