Threat Intelligence & Incident Response
Topics
Types of Content
Integrate Threat Intelligence Into Your Security Operations – Phases 1-4Intelligence-driven computer network defense is a risk management strategy that addresses the threat component of risk, incorporating analysis of adversaries, their... |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 1: Plan for a Threat Intelligence ProgramAssess your organization's unique threat landscape, current capabilities, and define an ideal target state. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 2: Design an Intelligence Collection StrategyDesign a threat intelligence collection strategy that best supports your organizational needs. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 3: Optimize the Intelligence Analysis ProcessDesign a threat intelligence analysis process that complements your existing security operations. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 4: Design a Collaboration and Feedback ProgramStand up an intelligence dissemination and feedback program. |
|
Threat Intelligence Maturity Assessment ToolThe Threat Intelligence Maturity Assessment Tool will help you systematically understand your current security state. Based on Info-Tech's maturity model, evaluate the... |
|
Threat Intelligence Project Charter TemplateManagement buy-in is key to establishing an effective threat intelligence program. The approval indicates that security is top-of-mind and that the process aligns with... |
|
Threat Intelligence RACI ToolAssign responsibilities to the threat management process. |
|
Threat Intelligence Management Plan TemplateA management plan organizes the project so that you can make efficient and effective resource allocation decisions. |
|
Threat Intelligence Policy TemplateThe purpose of this policy is to set the requirements for proper facilitation and operation of the threat intelligence program. |
|