This lesson, from the Cyber Intelligence Foundations course, looks closer at how different stakeholders within an organization use intelligence.
This video discusses how Cyber Threat Intelligence (CTI) can be used within a cybersecurity organization. It highlights the different stakeholders within an organization that should be receiving value from intelligence, including assurance and risk functions, executives, hunt missions, incident responders, and security design teams.
It emphasizes that intelligence must be actionable and include recommendations or a list of items that are already being undertaken to mitigate or resolve threats. It also notes that CTI should be able to integrate with security controls and tools and function at the automation level by using one of the industry standard data formats.
Different types of intelligence serve different functions within the organization:
Watch to understand the importance of CTI in helping organizations understand and mitigate cyber threats.