Summary
In this chapter, we talked about the importance of any CTI program adopting standards and frameworks as an organization. Additionally, we introduced you to several threat modeling methods and frameworks and discussed several of the data sharing frameworks that most organizations use. Finally, we introduced you to two open source platforms that many CTI programs deploy and discussed the benefits of each of them.
In the next chapter, we will be switching our mindset to focus on the tactical and practical application of collecting cyber threat intelligence. We will be introducing the concept of operational security and its technical and non-technical application, as well as its overall implementation.