Chapter 11: Fusion into Other Enterprise Operations

As we begin the process of dissemination and approach the end of the intelligence life cycle, we need to put some thought into how each of our potential organizational stakeholders will consume and use the intelligence before we begin the cycle again. There are many internal stakeholders within an organization who can consume this intelligence for many different purposes. In this chapter, we will discuss how different enterprise stakeholders within an organization consume threat intelligence by examining different organization elements and determining their needs and use cases. By the end of this chapter, you will have a better understanding of how to share threat intelligence across your key ...

Get Operationalizing Threat Intelligence now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.