2907db63-aea5-4028-81c3-d86c9e754aa8

A Requirements-driven Approach to Cyber Threat Intelligence

Cyber threat intelligence (CTI) is never an end in itself. It instead serves a broader mission: to inform, advise, and empower stakeholders within an organization or community. Stakeholder needs drive intelligence requirements. Intelligence requirements are therefore pivotal to a successful CTI capability.

This paper describes the value of a requirements-driven approach to intelligence, outlines requirements-driven practices, and offers actionable advice on how Intelligence functions can implement and optimize such an approach themselves.


Sign me up to receive news, product updates, event information, and special offers about Google Cloud from Google.

I understand my personal data will be processed in accordance with Google's Privacy Policy.