Organization carries out threat intelligence by analyzing and utilizing collected information about relevant cyber security threats related and corresponding protections.
When analyzing and utilizing the collected threat intelligence information, the following points must be taken into account:
- analyzing how the threat intelligence information relates to to our own operations
- analyzing how relevant threat intelligence information is to our operations
- communicating and sharing information in an understandable form to relevant persons
- utilizing the findings of threat intelligence to determine the adequacy of technical protections, technologies used and information security testing methods for analysis