web analytics

ESTABLISHING CYBER THREAT INTELLIGENCE

Rate this post

Humans have historically relied on Intelligence to make assessments, understand its implications and plan accordingly. Nations have relied extensively on Threat Intelligence in the military realm to plan their kinetic operations and establish their defenses to achieve their objectives and goals.

In the conventional warfare, you need to understand the capabilities, motivations and goals of your adversaries. In kinetic operations, groups at conflict, try to impair and destroy the capabilities of their adversaries first and later attempt to engage in subsequent battles within a war.

The damage to the capabilities becomes pivotal because it has psychological impact on a group’s morale, capability to respond back or defend itself from any aggression. With the evolution in threat landscape over the years, the usage and application for threat intelligence has also evolved.

Cyber Threat Intelligence is the analysis of cyber threat actors, their capabilities, motivations, and their goals. Such analysis allows organizations to prevent and mitigate cyber-attacks on their organizational infrastructure and assets.

It is unfortunate that Cyber Threat Intelligence has become a buzzword for many to be used with their own interpretation and its implementation is often limited to the consumption of threat data feeds which are often volatile and tactical in nature and therefore do not add value to the strategic objectives of the Organization.

Views: 0

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post