This curriculum spans the full lifecycle of threat intelligence operations, comparable in scope to a multi-phase advisory engagement that integrates technical implementation, cross-functional governance, and continuous improvement practices seen in mature security programs.
Module 1: Establishing Threat Intelligence Requirements
- Selecting intelligence sources based on organizational attack surface, such as prioritizing dark web monitoring for financial institutions with high fraud risk.
- Defining intelligence consumer roles (SOC, IR, executive) and tailoring data formats (STIX/TAXII, PDF reports, API feeds) to their technical capabilities.
- Mapping intelligence requirements to MITRE ATT&CK techniques relevant to the organization’s sector and infrastructure.
- Deciding whether to build an in-house collection capability or rely on commercial feeds, considering resource constraints and data specificity needs.
- Establishing criteria for evaluating the timeliness, accuracy, and relevance of intelligence from external providers.
- Integrating threat intelligence requirements into existing risk assessment frameworks to align with compliance mandates like NIST or ISO 27001.
Module 2: Sourcing and Acquiring Threat Data
- Onboarding commercial threat feeds by validating data schema compatibility with existing SIEM and SOAR platforms.
- Negotiating data-sharing agreements with ISACs or peer organizations while addressing liability and confidentiality clauses.
- Configuring network sensors to collect open-source intelligence (OSINT) from forums, paste sites, and code repositories without violating terms of service.
- Deploying honeypots or sinkholes to gather adversary tactics, techniques, and procedures (TTPs) specific to the organization’s industry.
- Assessing the operational risk of collecting data from adversarial infrastructure, including potential attribution and legal exposure.
- Implementing automated ingestion pipelines that normalize and deduplicate data from multiple sources before enrichment.
Module 3: Processing and Enriching Intelligence
- Building parsers to extract indicators (IPs, domains, hashes) from unstructured reports and mapping them to standardized formats like STIX 2.1.
- Integrating threat intelligence platforms (TIPs) with internal data sources such as DNS logs and endpoint telemetry for contextual enrichment.
- Applying confidence scoring to indicators based on source reliability, corroboration, and freshness to prioritize response actions.
- Resolving false positives by cross-referencing indicators against internal allowlists and historical benign activity patterns.
- Automating geolocation, ASN, and WHOIS lookups to enrich IOCs and support attribution analysis.
- Implementing data retention policies that balance investigative utility with privacy regulations like GDPR or CCPA.
Module 4: Analyzing and Prioritizing Threats
- Conducting adversary campaign analysis by clustering related IOCs and TTPs into coherent threat narratives.
- Using ATT&CK Navigator to map observed behaviors to adversary groups and assess likelihood of targeted attacks.
- Calculating risk scores for threats based on exploit availability, exposure of critical assets, and detection coverage gaps.
- Facilitating analyst collaboration through shared workspaces to reduce duplication and improve analytical consistency.
- Producing targeted intelligence briefs for technical teams highlighting actionable detection rules and mitigation steps.
- Updating threat models quarterly based on new intelligence to reflect evolving adversary capabilities and infrastructure.
Module 5: Integrating Intelligence into Security Operations
- Automating IOC ingestion into firewalls, EDR, and email gateways using bidirectional APIs to ensure timely blocking.
- Developing Sigma or YARA rules from intelligence findings to enhance detection logic in SIEM and endpoint tools.
- Adjusting SOAR playbooks to incorporate threat context, such as escalating phishing alerts containing IOCs from active campaigns.
- Validating detection rules in staging environments to prevent performance degradation or alert fatigue.
- Coordinating with network defenders to implement temporary blocks on high-fidelity IOCs during active incidents.
- Measuring detection efficacy by tracking mean time to detect (MTTD) for threats identified through intelligence.
Module 6: Threat Actor Attribution and Context Development
- Correlating infrastructure reuse, malware compilation timestamps, and language artifacts to assess confidence in actor attribution.
- Consulting classified or law enforcement-shared data to validate hypotheses about actor origin or intent, where accessible.
- Documenting attribution rationale with evidence chains to support internal decision-making and external reporting.
- Managing disclosure risks when sharing attribution conclusions with external partners or law enforcement.
- Differentiating between opportunistic and targeted threats based on victimology and tooling sophistication.
- Updating adversary profiles with new TTPs and infrastructure to maintain relevance for defensive planning.
Module 7: Measuring Efficacy and Maturity
- Tracking intelligence-driven detections as a percentage of total alerts to assess operational impact.
- Conducting red team exercises using known adversary TTPs to test detection and response coverage.
- Performing retrospective analysis on breaches to determine if available intelligence was missed or misprioritized.
- Using maturity models (e.g., Lockheed Martin Kill Chain, ATT&CK Navigator) to benchmark program capabilities annually.
- Surveying SOC and IR teams to evaluate the usability and relevance of intelligence products.
- Adjusting resource allocation based on metrics showing highest ROI, such as reduced dwell time or faster containment.
Module 8: Governance and Cross-Functional Alignment
- Establishing a threat intelligence steering committee with representatives from legal, compliance, and business units.
- Defining escalation paths for intelligence indicating imminent attacks on critical business functions.
- Aligning intelligence activities with enterprise risk management to inform cyber insurance and board reporting.
- Enforcing data handling policies for sensitive intelligence, including encryption and access logging.
- Coordinating with physical security teams when intelligence indicates blended cyber-physical threats.
- Reviewing third-party vendor intelligence integrations for supply chain risk and data sovereignty compliance.