A Requirements-Driven Approach to Cyber Threat Intelligence

Cyber threat intelligence (CTI) is never an end in itself. It instead serves a broader mission: to inform, advise, and empower stakeholders within an organization or community. Stakeholder needs drive intelligence requirements. Intelligence requirements are therefore pivotal to a successful CTI capability.

This paper describes the value of a requirements-driven approach to intelligence, outlines requirements-driven practices, and offers actionable advice on how Intelligence functions can implement and optimize such an approach themselves.


Fill out the details below

Google would like to contact you in the future on their products and services via phone, email, and/or post. For more details on our information practices and how to unsubscribe, please see their Privacy Policy. You can unsubscribe at any time.
Sign me up to receive news, product updates, event information and special offers about Google Cloud from Google. I understand my personal data will be processed in accordance with Google’s Privacy Policy.
If you engage with the content, EnterpriseGuide will share your data with Google. For details on their information practices and how to unsubscribe, see their Privacy Statement. You can unsubscribe at any time.