Этот коммит содержится в:
BushidoToken 2024-03-22 19:27:18 +00:00 коммит произвёл GitHub
родитель 155ea6b61d
Коммит 69406e59e2
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: B5690EEEBB952194

Просмотреть файл

@ -78,3 +78,4 @@ A collection of essential resources related to cyber threat intelligence theory.
| [Mandiant](https://www.mandiant.com/) | The core skills framework provides enterprises and individuals guidance with three things: 1. determine appropriate development roadmaps to ensure CTI skills progression; 2. provide a guidepost for aspirant CTI analysts to tailor their studies; 3. assist network defenders in understanding the roles and responsibilities of a CTI analyst | [The Mandiant Cyber Threat Intelligence (CTI) Analyst Core Competencies Framework](https://www.mandiant.com/sites/default/files/2022-05/cti-analyst-core-competencies-framework-v1.pdf) |
| ENISA | ENISA report on evaluating Threat Intelligence Platform (TIPs) | [Exploring the opportunities and limitations of current Threat Intelligence Platforms](https://www.enisa.europa.eu/publications/exploring-the-opportunities-and-limitations-of-current-threat-intelligence-platforms/at_download/fullReport) |
| [sfakiana](https://github.com/sfakiana/SANS-CTI-Summit-2021) | This is the TLP WHITE version of the Excel document related to Threat Intelligence Platform requirements. This Excel document was first released during SANS CTI Summit 2021 presentation of Andreas Sfakianakis titled "Still thinking your Ex(cel)? Here are some TIPs". The contents of this document are related to the 2017 ENISA report on "The limitations and opportunities of current Threat Intelligence Platforms" (authors are Andreas Sfakianakis and Razvan Gavrila). | [Threat Intelligence Platform (TIP) Functional Requirements](https://github.com/sfakiana/SANS-CTI-Summit-2021/blob/main/TIP_Functional_Requirements_v1.0.xlsx) |
| [Mandiant](https://www.mandiant.com) | Mandiant publicly released a web-based Intelligence Capability Discovery (ICD) to help commercial and governmental organizations evaluate the maturity of their cyber threat intelligence (CTI) program. | [Cyber Threat Intelligence Program Maturity Assessment](https://www.mandiant.com/resources/blog/cti-program-maturity-assessment) |