LetsDefend Academy

Online practicing and training platform for blue team members

CTI Lifecycle

Cyber threat intelligence goes through the following life cycle.

  1. Planning: Determining the purpose, objective and requirements of the CTI
  2. Collection: Collecting data from many sources
  3. Processing: Processing the collected data and making it ready for analysis
  4. Analysis: Analyzing the processed data, transforming the information into intelligence and making it ready for sharing
  5. Dissemination: Sharing threat intelligence data
  6. Feedback: Determining whether arrangements should be made for future threat intelligence operations by taking feedback from the reports shared.