My Papers

Papers at
International Forums

Establishing Cyber Threat Intelligence Function

Industry expert Muneeb Imran Shaikh provides an insightful approach on how to establish cyber threat intelligence function.

The paper delves into exploring the fundamentals of intelligence and the difference between strategic, operational and tactical intelligence.

“Humans have historically relied on Intelligence to make assessments, understand its implications and plan accordingly. Nations have relied extensively on Threat Intelligence in the military realm to plan their kinetic operations and establish their defenses to achieve their objectives and goals.

In the conventional warfare, you need to understand the capabilities, motivations and goals of your adversaries. In kinetic operations, groups at conflict, try to impair and destroy the capabilities of their adversaries first and later attempt to engage in subsequent battles within a war.

Cyber Threat Intelligence is the analysis of cyber threat actors, their capabilities, motivations, and their goals. Such analysis allows organizations to prevent and mitigate cyber-attacks on their organizational infrastructure and assets.”

Download to learn:

  • Data Vs Intelligence
  • Types of Threat Intelligence
  • Understanding Cyber underground market.
  • How to support other functions through Cyber threat intelligence

Author: Muneeb Imran Shaikh

Cyber Threat Intelligence – Governance & Risk Specialist

Cyber Threat Intelligence, A Partner in Risk Management

Industry expert Muneeb Imran Shaikh provides an insightful approach to cyber threat intelligence and risk management.

Excerpt:

“Risk Management is a reflection of maturity, a demonstration of due care and due diligence contrary to the notion of blindly accepting challenges, moving from one crisis to another and considering it “Resilience.”

As organizations engage in risk assessment exercises, it is availability of data that becomes a primary factor to decide whether a qualitative, quantitative or a semi-quantitative analysis approach will be adopted.

Threat-centric risk scenarios are derived from examination of threat agents and the vulnerabilities exploited by cyber criminal or other threat actors.

Adopting a threat-centric approach keeps the risk management team abreast of potential methods of attack, threat actors and cyber criminals targeting the Industry vertical or region along with their motivations.”

Download to learn: 

  • The perception of risk
  • Where cyber threat intelligence fits into risk management
  • How to incorporate a product life cycle model

Author: Muneeb Imran Shaikh
Cyber Threat Intelligence – Governance & Risk Specialist