Member-only story

Cyber Threat Intelligence

Collection Management Part 1 — Overview

Mark Ernest
9 min readSep 26, 2022

Cyber Threat Intelligence Lifecycle

Prior to exploring collection management, it’s pertinent to define the cyber threat intelligence (CTI) lifecycle. The CTI lifecycle can broadly be identified under the following domains, each with specific objectives:

  • Requirements
  • Collection
  • Processing
  • Analysis
  • Dissemination
  • Feedback

For a quick introduction to each domain, the following resources provide a good overview:

Requirements

While CTI requirements are the most critical part of a CTI program, this domain will be addressed in later stories as I often find leaders uncertain how to best articulate requirements when there isn’t a basic familiarity with CTI or cyber risk. I’ve found that providing an…

--

--

Mark Ernest
Mark Ernest

Written by Mark Ernest

Dad, husband, cybersecurity researcher & practitioner, developer.

No responses yet