Threat intelligence can be broken down into four categories. Use them to help you decide who needs to receive what type of information:
Strategic
Strategic threat intelligence is high-level analysis for non-technical stakeholders concerned with the overall business, such as C-suite executives, IT management, and boards of directors. Communicate this type of information in a broad context with the long term in view. These audiences must manage overall risks, such as how the general threat landscape is evolving, how a business decision might introduce new vulnerabilities, how advanced technology is helping businesses mitigate threats at a lower cost, or what the potential financial and operational implications of a breach are.
Tactical
Tactical threat intelligence is information cybersecurity experts need to take immediate action to mitigate threats. It includes technical information about the most current TTP trends and IOCs, and is usually consumed by IT service managers, SOC center employees, and architects. Use this type of intelligence to make decisions about security controls and create proactive defense strategies. This type of information is always in flux and can be automated to help security teams maintain maximum agility.
Operational
Operational threat intelligence is knowledge about specific threats and campaigns. It provides specialized information for incident response teams about an attacker’s identity, motivations, and methods. Enable security professionals in your organization to receive this kind of intelligence more efficiently with a cyber threat intelligence platform that automates data collection, translating foreign-language sources when needed.
Technical
Closely aligned with operational intelligence, technical threat intelligence refers to signs that an attack is happening—such as IOCs. Use a threat intelligence platform with AI to automatically scan for these types of known indicators, which can include phishing email content, malicious IP addresses, or specific implementations of malware. SOC and incident response teams can respond rapidly to this information and prevent damage to your business.
Follow Microsoft Security