Member-only story
How to Plan a CTI Project: Key Documentation You Need

A cyber threat intelligence (CTI) project can be a difficult undertaking. There are many hurdles, roadblocks, and pitfalls that can derail your success. To combat these, you must dedicate time and effort to comprehensively planning your CTI project.
This guide will show you how to do this by walking through all the key documentation you need before you start intelligence work.
You will learn why CTI project planning is fundamental for success, the must-have documentation to create (and how this relates to the CTI lifecycle), and how to account for the unpredictable nature of intelligence collection. By the end, you will have the knowledge and tools to plan your next great work. Let’s get started!
The complete version of this article can be viewed for free on: https://kravensecurity.com/cti-project-planning
CTI Project Planning 101
Cyber threat intelligence (CTI) can benefit various cyber security disciplines and business functions.
- The security operations team can use CTI to efficiently triage incidents, proactively defend against the latest threats, and perform threat hunting.
- The finance and fraud teams can use it to identify scammers and fraudulent transactions.
- The marketing and branding teams can use intelligence to spot impersonators, protect the brand image, and get ahead of negative press.
Unfortunately, this means planning a CTI project can be daunting. Where do you begin? What should you cover? How do you ensure you are delivering a quality CTI project?
This is where documentation can save the day. Documentation signposts what should be completed, what should be included, and what to expect from a CTI project. It is the pillar on which your CTI project is built, allowing you to meet consumer expectations and produce quality work.

You can use these key pieces of documentation to guide you through the CTI project planning journey, from brainstorming to formal agreements with your customer…