Key Takeaways
SRM leaders responsible for improving security operations (SecOps) and who want to build an effective threat intelligence program and establish, employ and govern their intelligence requirements (IRs) should:
- Identify all the relevant stakeholders to provide assurances that critical business processes and assets are accounted for when soliciting requirements and readily providing cyberthreat information ahead of business impact.
- Build a requirements matrix to drive guided action with critical exposures to threats as a primary focal point, aligning business criticality and information sensitivity concerns to intelligence available for collection and analysis.
- Establish the collection and documentation of priority intelligence requirements (PIRs) early in the threat intelligence build cycle and align budgets to ensure defensibility.
- Deliver intelligence reporting that is in-line with stakeholder expectations, PIRs and the findings’ impact to the business, with the goal to consistently highlight the program’s value.