Forgot About Feedback Threat Intelligence Lifecycle
A key model in implementing and maintaining a healthy threat intelligence program is the threat intelligence lifecycle. The lifecycle is a continuous and iterative process with multiple stages. Depending on your source, these stages can differ slightly but in general encompass the following areas: Planning, Collection, Processing, Analysis, Dissemination, and Feedback.
15 views • 10 slides