Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Embark Studios head Patrick Söderlund explains how Arc Raiders was made on “a quarter of the budget” of a AAA title

    Will there actually be any such thing as a Project Helix “native” game? | Opinion

    Larry Hryb joins Commodore International Corporation as community development consultant

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      What the polls say about how Americans are using AI

      February 27, 2026

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026
    • Business

      The team behind continuous batching says your idle GPUs should be running inference, not sitting dark

      March 13, 2026

      Met Office ‘supercomputing as a service’ one year old

      March 12, 2026

      Tech hiring evolves as candidates ask for AI compute alongside pay and perks

      March 11, 2026

      Oracle is spending billions on AI data centers as cash flow turns negative

      March 11, 2026

      Google: Cloud attacks exploit flaws more than weak credentials

      March 10, 2026
    • Crypto

      Banks Respond to Kraken’s Federal Reserve Access as Trump Sides with Crypto

      March 4, 2026

      Hyperliquid and DEXs Break the Top 10 — Is the CEX Era Ending?

      March 4, 2026

      Consensus Hong Kong 2026: The Institutional Turn 

      March 4, 2026

      New Crypto Mutuum Finance (MUTM) Reports V1 Protocol Progress as Roadmap Enters Phase 3

      March 4, 2026

      Bitcoin Short Sellers Caught Off Guard in New White House Move

      March 4, 2026
    • Technology

      Optimizing Content for Agents

      March 14, 2026

      Our Experience with I-Ready

      March 14, 2026

      Show HN: Simple plugin to get Claude Code to listen to you

      March 14, 2026

      I beg you to follow Crocker’s Rules, even if you will be rude to me

      March 14, 2026

      5 Ways To Use Your PC’s Ethernet Port (Besides Plugging In Your Router)

      March 14, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Building resilient cyber threat intelligence communities
    Technology

    Building resilient cyber threat intelligence communities

    TechAiVerseBy TechAiVerseMay 27, 2025No Comments7 Mins Read3 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Building resilient cyber threat intelligence communities
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Building resilient cyber threat intelligence communities

    Cyber threat intelligence is no longer a luxury: intelligence sharing communities must mature, and there are many common lessons to learn.

    By

    • Rob Dartnall,
      SecAlliance

    Published: 27 May 2025

    Over the last six years, I’ve had the privilege of working with governments, national central banks, and communities of interest around the world, helping them build and refine their cyber threat intelligence (CTI) communities. From the most cyber mature entities to those in emerging economies with lesser resources, there are clear pattens. And while maturity levels may vary a great deal, the core challenges and the solutions are remarkably similar.

    Coming from a military intelligence background, I have always viewed intelligence sharing as a fundamental principle. While “need to know” was a core dictate, “need to share” was equally vital – especially when it came to operations. Moving into the private sector was a culture shock, because the hesitation to share intelligence wasn’t just a reality, it was pervasive.

    Size matters

    This led to my first key lesson – size matters.

    Take, for example, when I was working with a national central bank to build a CTI community. Despite the effort and a lot of good intentions, the initiative was sadly doomed to fail. Why? Because the country’s biggest banks already had their own, smaller, highly trusted network. They just didn’t want to share intelligence outside of that group.

    The argument here is pretty simple. No financial institution is individually resilient.  Cyber risk affects everyone and banks have a responsibility to protect the wider financial ecosystem.

    At the other extreme, I observed an active global Information Sharing and Analysis Centre (ISAC) where dozens of members participated in calls, yet very little of value was exchanged. The issue here was that the community was too big. People just were not willing to share intelligence with faceless individuals that they didn’t know and thus, trust.

    So, clearly CTI communities must be big enough that they actually have an impact on the whole of the ecosystem, but also small enough to that trusted relationships develop.

    Intelligence vs. Data

    My second key lesson, was around the constant struggle over the definition of “intelligence.” A term we know well, but older communities, built out of IT teams, struggled to understand. Many CTI communities were highly tactical, focused solely on indicators of compromise (IoCs) that were shared via platforms like the Malware Information Sharing Platform (MISP). But in reality, this wasn’t intelligence. It was the sharing of threat data.

    The conversation needed to be elevated, so I advocated for broader discussions on threat information, strategic intelligence and best practices. Also, that intelligence needed to be tailored for different audiences. For example, automated data outputs for analysts; technical papers for cyber experts; intelligence summaries for CISOs, and strategic reports and horizon scanning for executives and board members. Intelligence briefings that were relevant to them and their unique community.

    Ultimately, intelligence products must have a clear “so what?” that identifies what the intelligence means and crucially what the decision makers should do with it. There’s little point to threat intelligence if it has no context and does not inform decision making.

    Navigating the legal challenge

    There are obviously legal concerns in intelligence-sharing communities. Unfortunately, these have in the past been used as an excuse not to share. GDPR, for example, initially caused uncertainty but over time organisations understood that data privacy regulations were not meant to be barriers, they are guidelines for structured sharing.

    To mitigate privacy concerns, most successful intelligence sharing communities will implement centralised contracts and terms of reference to ensure liability protection, along with sharing guidelines that define permissible data exchange within legal frameworks, and automated threat data processing.

    CIISI – a successful framework

    The CIISI-EU framework is a testament to the power of trusted intelligence sharing. Five years ago, the European Cyber Resilience Board (ECRB) and the European Central Bank (ECB)  discussed creating a small, yet highly effective community focused on strategic insights, best practice exchange and operational intelligence. From this initiative, the CIISI framework was established and has since been adopted by other nations.

    Comprised of 26 entities – including SecAlliance and ThreatMatch as the centralised intelligence function – alongside Europol and ENISA, CIISI strikes the right balance between tactical, operational, and strategic intelligence. It brings together joint research, coordinated intelligence functions, workshops and training, to ensure that decision-makers at all levels have access to relevant intelligence products.

    A defining strength of the framework is that the ECB not only implemented it but also released its white paper and intelligence-sharing rulebook, allowing other organisations and nations to learn from its approach.

    Having been directly involved in the creation of CIISI, I was able to apply its principles to replicate similar frameworks across various countries, adapting each to fit specific sectoral, cultural and maturity requirements. However, while every community does have its own unique needs, certain fundamental principles are constant.

    Firstly, intelligence should be shared as widely as possible within appropriate classification levels to maximise its impact while preserving trust. Communities must also be large enough to drive meaningful outcomes, but small enough to maintain the necessary level of confidence among members.

    It is essential to develop intelligence products tailored for different audiences, ensuring engagement at the executive level to secure leadership buy-in and funding.

    Building trust is a cornerstone of successful intelligence sharing. And that is why meeting face-to-face at least twice a year is really important for strengthening relationships among community members.

    Intelligence assessments, informational insights and data should be actively exchanged, with automation playing a key role in making this process more efficient. Now in 2025, tactical intelligence sharing should largely be more automated, enabling more time on operational and strategic outputs. Establishing a centralised platform is crucial, moving intelligence sharing away from fragmented channels such as email and WhatsApp. This platform must distribute not only indicators of compromise (IOCs) but also finished intelligence products and strategic reports. It must be human centric and easy to use for all user types, not just technical teams. It must control the dissemination at community, but also organisational and individual level to allow members to control access to their intelligence.

    A dedicated intelligence function is essential to drive dissemination, identify patterns, add assessments, and act as a catalyst for engagement. To reinforce commitment, members should sign up to a charter, rulebook, or formal terms of reference, outlining their obligations to contribute intelligence. Additionally, providing templates and policy frameworks can help organisations navigate internal legal challenges, ensuring that regulatory barriers do not stifle collaboration.

    CIISI has demonstrated that implemented properly, structured intelligence sharing frameworks can drive real impact. Its principles continue to shape communities worldwide, refining how intelligence is exchanged, processed, and acted upon to enhance cyber resilience at national and sectoral levels.

    In 2025 and beyond, as cyber threats continue to evolve, intelligence-sharing communities must continue to adapt to become more strategic, more collaborative and more impactful. The principles outlined in this article provide an outline for building resilient, effective CTI ecosystems that contribute to national and sector-wide cybersecurity resilience.

    Read more on Business continuity planning


    • Countering nation-state cyber espionage: A CISO field guide


    • Threat hunting frameworks, techniques and methodologies

      By: Dave Shackleford


    • Security Think Tank: The cloud just got more complicated

      By: Rob Dartnall


    • Structured Threat Information eXpression (STIX)

      By: Rahul Awati

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleSecurity vs. usability: Why rogue corporate comms are still an issue
    Next Article Armed forces charity steps in to address cyber mental health crisis
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Optimizing Content for Agents

    March 14, 2026

    Our Experience with I-Ready

    March 14, 2026

    Show HN: Simple plugin to get Claude Code to listen to you

    March 14, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025716 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025303 Views

    Wired Headphones Are Making A Comeback, And We Have Gen Z To Thank

    July 22, 2025210 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025173 Views
    Don't Miss
    Gaming March 14, 2026

    Embark Studios head Patrick Söderlund explains how Arc Raiders was made on “a quarter of the budget” of a AAA title

    Embark Studios head Patrick Söderlund explains how Arc Raiders was made on “a quarter of…

    Will there actually be any such thing as a Project Helix “native” game? | Opinion

    Larry Hryb joins Commodore International Corporation as community development consultant

    Roblox and Minecraft players are less likely to play traditional AAA video games

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Embark Studios head Patrick Söderlund explains how Arc Raiders was made on “a quarter of the budget” of a AAA title

    March 14, 20262 Views

    Will there actually be any such thing as a Project Helix “native” game? | Opinion

    March 14, 20263 Views

    Larry Hryb joins Commodore International Corporation as community development consultant

    March 14, 20263 Views
    Most Popular

    Outbreak turns 30

    March 14, 20250 Views

    New SuperBlack ransomware exploits Fortinet auth bypass flaws

    March 14, 20250 Views

    CDs Offer Guaranteed Returns in an Uncertain Market. Today’s CD Rates, March 14, 2025

    March 14, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.