InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Member-only story

How to Plan a CTI Project: Key Documentation You Need

Adam Goss
InfoSec Write-ups
Published in
10 min read4 days ago

--

CTI Project Plan

A cyber threat intelligence (CTI) project can be a difficult undertaking. There are many hurdles, roadblocks, and pitfalls that can derail your success. To combat these, you must dedicate time and effort to comprehensively planning your CTI project.

This guide will show you how to do this by walking through all the key documentation you need before you start intelligence work.

You will learn why CTI project planning is fundamental for success, the must-have documentation to create (and how this relates to the CTI lifecycle), and how to account for the unpredictable nature of intelligence collection. By the end, you will have the knowledge and tools to plan your next great work. Let’s get started!

The complete version of this article can be viewed for free on: https://kravensecurity.com/cti-project-planning

CTI Project Planning 101

Cyber threat intelligence (CTI) can benefit various cyber security disciplines and business functions.

  • The security operations team can use CTI to efficiently triage incidents, proactively defend against the latest threats, and perform threat hunting.
  • The finance and fraud teams can use it to identify scammers and fraudulent transactions.
  • The marketing and branding teams can use intelligence to spot impersonators, protect the brand image, and get ahead of negative press.

Unfortunately, this means planning a CTI project can be daunting. Where do you begin? What should you cover? How do you ensure you are delivering a quality CTI project?

This is where documentation can save the day. Documentation signposts what should be completed, what should be included, and what to expect from a CTI project. It is the pillar on which your CTI project is built, allowing you to meet consumer expectations and produce quality work.

You can use these key pieces of documentation to guide you through the CTI project planning journey, from brainstorming to formal agreements with your customer…

--

--

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Adam Goss

Helping demystify cyber threat intelligence for businesses and individuals | CTI | Threat Hunting | Custom Tooling

No responses yet

Write a response