The threat intelligence strategy map and goal setting
Despite the different CTI standards and methodologies developed, there is no single way to shape CTI strategy. However, building on the CTI life cycle and planning processes, an organization can use intelligence strategically to meet its objectives and justify the CTI program's business value. This section looks at the threat intelligence strategy map as approached by Derek Brink (https://ibm.co/31t9HNK) and the goals for each intelligence analyst level.
Threat intelligence is not just the final output of threat analyses; it is a process that connects business operations to tangible outcomes. These outcomes are to detect, prevent, and reduce cyber threats and attacks to an acceptable and manageable level. The strategy map of CTI is summarized in the following figure:
An organization that wants to integrate threat intelligence...