Week 5- Briefing- Threat Intelligence Sources and Providers.docx

This preview shows page 1 - 2 out of 12 pages.

Before you begin: please make sure that you have read the readings for this week.The CISO's office at your selected e-Commerce company (from Project 2) has invited you to present ananalysis of how threat intelligence products and services obtained from external sources can be used toimprove the company's risk management efforts.Your presentation will be given as part of a panel discussion at the CISO's monthly meeting withexecutives and managers. The CISO sponsors these panels to help staff members learn more aboutcybersecurity products and services and the vendors from which these capabilities can be purchased.To prepare for your presentation, you must write a 3 to 5 paragraph briefing statement in which yousummarize your analysis. This will be reviewed by the CISO before you give your presentation. Yourbriefing statement must provide:1. An introduction to the topic that provides a brief overview of threat intelligence in general (how theterm is defined / used) and how it can be used to support the risk management process (e.g. riskidentification, risk mitigation strategies, etc.)2. Provide examples (backed up by citations to readings) of externally developed cyber threatintelligence which could be used to support the company's risk management efforts. You should considercyberthreat intelligence services from both commercial providers and the ISAC cooperatives.3. Provide a summary & conclusions section in which you state your opinion as to which providers wouldbe the best sources of cyberthreat intelligence for the company.Post your briefing statement as a reply to this topic. Provide in-text citations and references for 3 ormore authoritative sources. Put the reference list at the end of your posting.Any company can really benefit from obtaining threat intelligence products and services fromexternal sources. These products and services could improve the company’s risk managementefforts. To begin, a little background information about threat intelligence needs to be provided.“Threat intelligence, or cyber threat intelligence, is information an organization uses tounderstand the threats that have, will, or are currently targeting the organization” (What is threatintelligence?2020). This information is very vital to an organization, it can be used to prepare,prevent, and identify cyber threats that could potentially take advantage of valuable informationor resources. Threat intelligence is essentially used to gain valuable knowledge on the manycyber threats to build effective defense mechanisms and mitigate the risks that could damage thecompany’s reputation, business operations, and more. Cyber threat intelligence provides thecapability to defend more proactively because targeted threats require a targeted defense. Threatintelligence can greatly support the risk management process because of how informative it canbe for a company about cyber threats and the company can update and adjust its risk

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 12 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture