Member-only story
Cyber Threat Intelligence
Collection Management Part 1 — Overview
9 min readSep 26, 2022
Cyber Threat Intelligence Lifecycle
Prior to exploring collection management, it’s pertinent to define the cyber threat intelligence (CTI) lifecycle. The CTI lifecycle can broadly be identified under the following domains, each with specific objectives:
- Requirements
- Collection
- Processing
- Analysis
- Dissemination
- Feedback
For a quick introduction to each domain, the following resources provide a good overview:
Requirements
While CTI requirements are the most critical part of a CTI program, this domain will be addressed in later stories as I often find leaders uncertain how to best articulate requirements when there isn’t a basic familiarity with CTI or cyber risk. I’ve found that providing an…