So far, we have covered ground on the cybersecurity landscape, identified what cyber threat intelligence actually is, and introduced some of the core concepts for conducting CTI and the approaches behind it. So you may feel more confident about the core understanding of what you want or need to do to get started or develop your capability, but now you need to figure out how you’re going to do that with whatever (possibly nonexistent) budget you have available, right?
The good news is that a lot of the concepts ...