This framework will help corporations seeking to participate in cyber intelligence exchange programs to enrich their event data and improve their incident response speed and capabilities.
The paper is divided into three main sections.
Finding Your Fit - Evaluating Sharing Programs: How to find sharing partners and exchange platforms that best meet your needs.
Before You Join - Building a Foundation for Success: Identify the capabilities and business requirements that form the foundation of a cyber intelligence exchange program.
Getting Started - A Framework for Threat Intelligence Exchange: Understand the basics of the exchange process so they can efficiently share the event they see and more efficiently operationalize any intelligence they collect.