Wk 5 Threat Intelligence Sources and Providers Summary and Conclusion

1. An introduction to the topic that provides a brief overview of threat intelligence in general (how the term is defined / used) and how it can be used to support the risk management process (e.g. risk identification, risk mitigation strategies, etc.)

2. Provide examples (backed up by citations to readings) of externally developed cyber threat intelligence which could be used to support the company’s risk management efforts. You should consider cyberthreat intelligence services from both commercial providers and the ISAC cooperatives.

3. Provide a summary & conclusions section in which you state your opinion as to which providers would be the best sources of cyberthreat intelligence for the company.