© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2021
A. RobertsCyber Threat Intelligencehttps://doi.org/10.1007/978-1-4842-7220-6_6

6. Things to Consider When Implementing CTI

Aaron Roberts1  
(1)
London, UK
 

At this stage, we’ve considered the core fundamental concepts a CTI team should adopt, ways of establishing and following the intelligence cycle tied to formalized requirements, and how to start getting an admittedly immature CTI capability off the ground for little to no cost. However, when looking at things from the top down, we still need to consider and address several things.

Suppose you’ve followed this book from the start and have implemented the things I’ve suggested so far. In that case, you’ll start ...

Get Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.