Cyber threat information is any information that can help an organization identify, assess, monitor, and respond to cyber threats. Cyber threat information includes indicators of compromise; tactics, techniques, and procedures used by threat actors; suggested actions to detect, contain, or prevent attacks; and the findings from the analyses of incidents. Organizations that share cyber threat information can improve their own security postures as well as those of other organizations. CTIN can help your ISAO or ISAC establish information sharing goals, identify cyber threat information sources, scope information sharing activities, develop rules that control the publication and distribution of threat
information, engage with existing sharing communities, and make effective use of threat information in support of their overall cybersecurity practices.
Our support services for ISACs & ISAOs include:
- Program design & development
- Red Team/Blue Team design, and development
- Exercise development
- Threat Intel Platform deployment, configuration, member onboarding and training
- STIX 2.0 & TAXII 2.0 Integration
- Threat intelligence tradecraft training
- Curriculum design
This is not a test. It is for real.
Contact us with questions: