Small Cyber Threat Intelligence Program
This is my journey to build a small Threat Intelligence Program
Overview of Cyber Threat Intelligence and CTI Requirement

Who defines the requirements?
Intelligence Direction
Establish a Request for an Information Portal (PFR) or Priority Intelligence Requirement (PIR)
Collection - Good Feeds/Tools and Connectors

Name
Source
Type
Reliability of Source
Accuracy of Data
Technical
Technical
Technical
Technical
Technical
Human
Human
Technical
Technical
Technical
Technical
Technical
Technical
Assets Profiling
Create Diamond Model
Refs:
Last updated