Cloud Blog: The Cyber Threat Intelligence Program Design Playbook is now available

Source URL: https://cloud.google.com/blog/products/identity-security/cti-program-design-playbook-is-now-available/
Source: Cloud Blog
Title: The Cyber Threat Intelligence Program Design Playbook is now available

Feedly Summary: As cybersecurity threats have grown more sophisticated and prevalent, we’ve seen organizations develop robust cyber threat intelligence (CTI) programs to help bolster defenses. However, creating and maturing a CTI program remains a challenge because it requires people, processes, technologies, and metrics to validate success.
To help organizations better operationalize threat intelligence, we’ve published the CTI Program Design Playbook. This training track is the inaugural release from Mandiant Academy’s newest on-demand training, developed for professionals who actively defend networks. It’s designed to provide you with the essential knowledge and skills to design, build, operate, and optimize a CTI program from the ground up.

aside_block
), (‘btn_text’, ‘Start building for free’), (‘href’, ‘http://console.cloud.google.com/freetrial?redirectPath=/welcome’), (‘image’, None)])]>

What you’ll learn: An overview
This track includes three two-hour courses addressing different aspects of CTI program development.
In the first course, Designing and Building a CTI Program, you will learn how to establish the foundations of a CTI program, including a CTI program charter and roadmap.
In the second course, Operating an Effective CTI Program, you will learn how to effectively identify and maintain a CTI program’s stakeholders. This course also describes the resources necessary to collect, analyze, and disseminate threat intelligence while accommodating stakeholders’ unique requirements.
Students who are part of an active CTI program but would like to mature their team’s capabilities may benefit from the third course, Optimizing an Efficient CTI Program. This course teaches you helpful ways to accurately measure a CTI program’s effectiveness and, where necessary, make improvements.
Who should take these courses?
This training track is the inaugural release from Mandiant Academy’s newest approach to on-demand training, which breaks the core tenets of effective cybersecurity strategies into discrete two-hour courses. This new style aims to address the needs of busy practitioners who already possess the knowledge and skills needed to defend networks but have limited time to enhance their capabilities. 
The CTI Program Design Playbook was developed for practitioners:

Intelligence analysts supporting network defenders at the tactical, operational, or strategic levels

Managers of active intelligence programs who would like to improve their team’s capabilities

Cybersecurity practitioners who desire an intelligence capability

Practitioners tasked with founding their organization’s first intelligence capability

Start learning today
To learn more about the CTI Program Design Playbook and to sign up for the course, please visit our website. You can access a wealth of knowledge through Mandiant Academy’s on-demand, instructor-led, and experiential training options. We hope this course proves helpful in your efforts to defend your organization against cyber threats.

AI Summary and Description: Yes

Summary: The text outlines the design and implementation of Cyber Threat Intelligence (CTI) programs, presenting a new on-demand training track by Mandiant Academy. It emphasizes the necessity of integrating diverse resources, processes, and knowledge for cybersecurity professionals to effectively combat sophisticated threats.

Detailed Description:

The text discusses the challenges organizations face in creating and maturing Cyber Threat Intelligence (CTI) programs amid increasing cybersecurity threats. It introduces the CTI Program Design Playbook as a resource developed by Mandiant Academy aimed at helping professionals enhance their threat intelligence capabilities.

Key Points:
– **Cyber Threat Intelligence (CTI)**: The text underlines the rising need for robust CTI programs to enhance organizational defenses against sophisticated cyber threats.
– **Challenges in CTI Program Development**: It acknowledges the complexity inherent in developing CTI programs due to the required integration of people, processes, technologies, and metrics for validation.
– **Training Track Overview**: The playbook includes a series of three two-hour courses designed to guide professionals in building and optimizing CTI programs.
– **Course 1 – Designing and Building a CTI Program**: Focuses on establishing foundational aspects, including a charter and roadmap.
– **Course 2 – Operating an Effective CTI Program**: Addresses stakeholder management and resource requirements for analyzing and disseminating threat intelligence.
– **Course 3 – Optimizing an Efficient CTI Program**: Aims to train professionals on measuring the effectiveness of their CTI programs and making necessary improvements.
– **Target Audience**: The training is tailored for a variety of professionals, including intelligence analysts, managers of intelligence programs, and those starting their organization’s first intelligence capability.
– **Mandiant Academy’s Approach**: The new on-demand training format caters to busy practitioners by delivering essential cybersecurity knowledge in concise, focused segments, promoting continuous professional development.

In conclusion, the text is highly relevant to the fields of cybersecurity and information security, particularly for those looking to implement or improve CTI capabilities within their organizations. The outlined courses present valuable insights and practical guidance for professionals striving to enhance their cybersecurity posture.