Integrate Threat Intelligence Into Your Security Operations Research & Tools
Start here – read the Executive Brief
Read our concise Executive Brief to find out why you should implement a threat intelligence program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
1. Plan for a threat intelligence program
Assess current capabilities and define an ideal target state.
- Integrate Threat Intelligence Into Your Security Operations – Phase 1: Plan for a Threat Intelligence Program
- Security Pressure Posture Analysis Tool
- Threat Intelligence Maturity Assessment Tool
- Threat Intelligence Project Charter Template
- Threat Intelligence RACI Tool
- Threat Intelligence Management Plan Template
- Threat Intelligence Policy Template
2. Design an intelligence collection strategy
Understand the different collection solutions to identify which best supports needs.
- Integrate Threat Intelligence Into Your Security Operations – Phase 2: Design an Intelligence Collection Strategy
- Threat Intelligence Prioritization Tool
- Threat Intelligence RFP MSSP Template
3. Optimize the intelligence analysis process
Begin analyzing and acting on gathered intelligence.
- Integrate Threat Intelligence Into Your Security Operations – Phase 3: Optimize the Intelligence Analysis Process
- Threat Intelligence Malware Runbook Template
4. Design a collaboration and feedback program
Stand up an intelligence dissemination program.
- Integrate Threat Intelligence Into Your Security Operations – Phase 4: Design a Collaboration and Feedback Program
- Threat Intelligence Alert Template
- Threat Intelligence Alert and Briefing Cadence Schedule Template