DOC-20240331-WA0006.-137

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Appendix

Threat Intelligence Goals: A Quick Reference Guide

Threat intelligence is not “one size fits all.” The security


applications of threat intelligence in your business depend on
the nature of your organization and your existing information
security strategies and capabilities.
This library of threat intelligence goals aligns with the security
teams we have highlighted in this book. You can use these goals
to help identify and prioritize threat intelligence activities.

Security Operations

Data Exposure Incidents Report data exposure incidents to affected


stakeholders for remediation

High-Risk Malware Families Research evolution and trends of malware families


with high risk to my organization
Reputation Risk Identify risks to my organization’s reputation

Incident Response

Data Exposure Incidents Report data exposure incidents to affected parties


and stakeholders for remediation

Vulnerability Management
Exploit Kits Identify information about exploit kits

High-Risk Vulnerabilites Identify critical and high-risk vulnerabilities in tech


stack

Undisclosed Vulnerabilities Identify undisclosed zero-day and embargoed


vulnerabilities

Risk Analysis
Third-Party Security
Assess third party’s information security competence
Competence
Third Parties With Elevated Identify third parties that have elevated risk to my
Risk organization
Competitive Research Research competitive market

Security Leadership
Third Parties With Elevated Identify third parties that have elevated risk to my
Risk organization

Attack Planning Identify attack planning that could target my


organization

You might also like