Reflection
In this module, we learned about the difference between data, information, intelligence, and actionable intelligence. Just as there are targeted attacks, having actionable intelligence will enable a company to perform counter measures to fend off and prevent targeted attacks from successfully breaching the organization’s network. The Cyber Threat Intelligence Plan will enable us to start thinking about who threat actors might be are against our company. It will enable us to seek out to understand methods and capabilities of attack. Performing a gap analysis will enable us to identify high value information assets, low value information assets and which security systems and processes need improvement. The most important gaps are weak defenses protecting high value assets. Those defenses must be strengthened as soon as possible. The second priority for improvement is weak defenses protecting low value assets, as well as strong defenses protecting high value assets. These must be addressed, but not as urgently. The least urgent, low priority are those low value assets protected by strong defenses, and assets not targeted by any likely adversary. With this information, we can outline investment priorities and options. Implementing a continuous improvement process that will involve an 8 step process will ensure a successful Cyber Threat Intelligence Program.