Cyber Threat Intelligence

Collection Management Part 2 — Design Technical Approach

Mark Ernest

--

In the previous story: Cyber Threat Intelligence Collection Management Part 1 — Overview the CTI Collection management lifecycle was explored. Part 2 will deep dive into the CTI collection design phase, specifically with a focus on future CTI Processing automation.

In the previous post, the following collection source was leveraged for the use case: Dead or Alive? An Emotet Story and will be used through the remainder of this story. Within Collection Design, the…

--

--

Mark Ernest

Dad, husband, cybersecurity researcher & practitioner, developer.