Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Asus ExpertCenter PN54 reviewed

    Huawei MatePad Mini: Launch date confirmed for compact flagship tablet with OLED screen

    P40WD-40: New Lenovo ThinkVision monitor leaks with Thunderbolt 4 and 120 Hz refresh rate for professionals

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Blue-collar jobs are gaining popularity as AI threatens office work

      August 17, 2025

      Man who asked ChatGPT about cutting out salt from his diet was hospitalized with hallucinations

      August 15, 2025

      What happens when chatbots shape your reality? Concerns are growing online

      August 14, 2025

      Scientists want to prevent AI from going rogue by teaching it to be bad first

      August 8, 2025

      AI models may be accidentally (and secretly) learning each other’s bad behaviors

      July 30, 2025
    • Business

      Why Certified VMware Pros Are Driving the Future of IT

      August 24, 2025

      Murky Panda hackers exploit cloud trust to hack downstream customers

      August 23, 2025

      The rise of sovereign clouds: no data portability, no party

      August 20, 2025

      Israel is reportedly storing millions of Palestinian phone calls on Microsoft servers

      August 6, 2025

      AI site Perplexity uses “stealth tactics” to flout no-crawl edicts, Cloudflare says

      August 5, 2025
    • Crypto

      Chainlink (LINK) Price Uptrend Likely To Reverse as Charts Hint at Exhaustion

      August 31, 2025

      What to Expect From Solana in September

      August 31, 2025

      Bitcoin Risks Deeper Drop Toward $100,000 Amid Whale Rotation Into Ethereum

      August 31, 2025

      3 Altcoins Smart Money Are Buying During Market Pullback

      August 31, 2025

      Solana ETFs Move Closer to Approval as SEC Reviews Amended Filings

      August 31, 2025
    • Technology

      Asus ExpertCenter PN54 reviewed

      August 31, 2025

      Huawei MatePad Mini: Launch date confirmed for compact flagship tablet with OLED screen

      August 31, 2025

      P40WD-40: New Lenovo ThinkVision monitor leaks with Thunderbolt 4 and 120 Hz refresh rate for professionals

      August 31, 2025

      Best AI Workstation Processors 2025: Why AMD Ryzen Beats Intel for Local AI Computing for now!

      August 31, 2025

      How to turn a USB flash drive into a portable games console

      August 31, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Building resilient cyber threat intelligence communities
    Technology

    Building resilient cyber threat intelligence communities

    TechAiVerseBy TechAiVerseMay 27, 2025No Comments7 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Building resilient cyber threat intelligence communities
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    BMI Calculator – Check your Body Mass Index for free!

    Building resilient cyber threat intelligence communities

    Cyber threat intelligence is no longer a luxury: intelligence sharing communities must mature, and there are many common lessons to learn.

    By

    • Rob Dartnall,
      SecAlliance

    Published: 27 May 2025

    Over the last six years, I’ve had the privilege of working with governments, national central banks, and communities of interest around the world, helping them build and refine their cyber threat intelligence (CTI) communities. From the most cyber mature entities to those in emerging economies with lesser resources, there are clear pattens. And while maturity levels may vary a great deal, the core challenges and the solutions are remarkably similar.

    Coming from a military intelligence background, I have always viewed intelligence sharing as a fundamental principle. While “need to know” was a core dictate, “need to share” was equally vital – especially when it came to operations. Moving into the private sector was a culture shock, because the hesitation to share intelligence wasn’t just a reality, it was pervasive.

    Size matters

    This led to my first key lesson – size matters.

    Take, for example, when I was working with a national central bank to build a CTI community. Despite the effort and a lot of good intentions, the initiative was sadly doomed to fail. Why? Because the country’s biggest banks already had their own, smaller, highly trusted network. They just didn’t want to share intelligence outside of that group.

    The argument here is pretty simple. No financial institution is individually resilient.  Cyber risk affects everyone and banks have a responsibility to protect the wider financial ecosystem.

    At the other extreme, I observed an active global Information Sharing and Analysis Centre (ISAC) where dozens of members participated in calls, yet very little of value was exchanged. The issue here was that the community was too big. People just were not willing to share intelligence with faceless individuals that they didn’t know and thus, trust.

    So, clearly CTI communities must be big enough that they actually have an impact on the whole of the ecosystem, but also small enough to that trusted relationships develop.

    Intelligence vs. Data

    My second key lesson, was around the constant struggle over the definition of “intelligence.” A term we know well, but older communities, built out of IT teams, struggled to understand. Many CTI communities were highly tactical, focused solely on indicators of compromise (IoCs) that were shared via platforms like the Malware Information Sharing Platform (MISP). But in reality, this wasn’t intelligence. It was the sharing of threat data.

    The conversation needed to be elevated, so I advocated for broader discussions on threat information, strategic intelligence and best practices. Also, that intelligence needed to be tailored for different audiences. For example, automated data outputs for analysts; technical papers for cyber experts; intelligence summaries for CISOs, and strategic reports and horizon scanning for executives and board members. Intelligence briefings that were relevant to them and their unique community.

    Ultimately, intelligence products must have a clear “so what?” that identifies what the intelligence means and crucially what the decision makers should do with it. There’s little point to threat intelligence if it has no context and does not inform decision making.

    Navigating the legal challenge

    There are obviously legal concerns in intelligence-sharing communities. Unfortunately, these have in the past been used as an excuse not to share. GDPR, for example, initially caused uncertainty but over time organisations understood that data privacy regulations were not meant to be barriers, they are guidelines for structured sharing.

    To mitigate privacy concerns, most successful intelligence sharing communities will implement centralised contracts and terms of reference to ensure liability protection, along with sharing guidelines that define permissible data exchange within legal frameworks, and automated threat data processing.

    CIISI – a successful framework

    The CIISI-EU framework is a testament to the power of trusted intelligence sharing. Five years ago, the European Cyber Resilience Board (ECRB) and the European Central Bank (ECB)  discussed creating a small, yet highly effective community focused on strategic insights, best practice exchange and operational intelligence. From this initiative, the CIISI framework was established and has since been adopted by other nations.

    Comprised of 26 entities – including SecAlliance and ThreatMatch as the centralised intelligence function – alongside Europol and ENISA, CIISI strikes the right balance between tactical, operational, and strategic intelligence. It brings together joint research, coordinated intelligence functions, workshops and training, to ensure that decision-makers at all levels have access to relevant intelligence products.

    A defining strength of the framework is that the ECB not only implemented it but also released its white paper and intelligence-sharing rulebook, allowing other organisations and nations to learn from its approach.

    Having been directly involved in the creation of CIISI, I was able to apply its principles to replicate similar frameworks across various countries, adapting each to fit specific sectoral, cultural and maturity requirements. However, while every community does have its own unique needs, certain fundamental principles are constant.

    Firstly, intelligence should be shared as widely as possible within appropriate classification levels to maximise its impact while preserving trust. Communities must also be large enough to drive meaningful outcomes, but small enough to maintain the necessary level of confidence among members.

    It is essential to develop intelligence products tailored for different audiences, ensuring engagement at the executive level to secure leadership buy-in and funding.

    Building trust is a cornerstone of successful intelligence sharing. And that is why meeting face-to-face at least twice a year is really important for strengthening relationships among community members.

    Intelligence assessments, informational insights and data should be actively exchanged, with automation playing a key role in making this process more efficient. Now in 2025, tactical intelligence sharing should largely be more automated, enabling more time on operational and strategic outputs. Establishing a centralised platform is crucial, moving intelligence sharing away from fragmented channels such as email and WhatsApp. This platform must distribute not only indicators of compromise (IOCs) but also finished intelligence products and strategic reports. It must be human centric and easy to use for all user types, not just technical teams. It must control the dissemination at community, but also organisational and individual level to allow members to control access to their intelligence.

    A dedicated intelligence function is essential to drive dissemination, identify patterns, add assessments, and act as a catalyst for engagement. To reinforce commitment, members should sign up to a charter, rulebook, or formal terms of reference, outlining their obligations to contribute intelligence. Additionally, providing templates and policy frameworks can help organisations navigate internal legal challenges, ensuring that regulatory barriers do not stifle collaboration.

    CIISI has demonstrated that implemented properly, structured intelligence sharing frameworks can drive real impact. Its principles continue to shape communities worldwide, refining how intelligence is exchanged, processed, and acted upon to enhance cyber resilience at national and sectoral levels.

    In 2025 and beyond, as cyber threats continue to evolve, intelligence-sharing communities must continue to adapt to become more strategic, more collaborative and more impactful. The principles outlined in this article provide an outline for building resilient, effective CTI ecosystems that contribute to national and sector-wide cybersecurity resilience.

    Read more on Business continuity planning


    • Countering nation-state cyber espionage: A CISO field guide


    • Threat hunting frameworks, techniques and methodologies

      By: Dave Shackleford


    • Security Think Tank: The cloud just got more complicated

      By: Rob Dartnall


    • Structured Threat Information eXpression (STIX)

      By: Rahul Awati

    BMI Calculator – Check your Body Mass Index for free!

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleSecurity vs. usability: Why rogue corporate comms are still an issue
    Next Article Armed forces charity steps in to address cyber mental health crisis
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Asus ExpertCenter PN54 reviewed

    August 31, 2025

    Huawei MatePad Mini: Launch date confirmed for compact flagship tablet with OLED screen

    August 31, 2025

    P40WD-40: New Lenovo ThinkVision monitor leaks with Thunderbolt 4 and 120 Hz refresh rate for professionals

    August 31, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025168 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202548 Views

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202530 Views

    Is Libby Compatible With Kobo E-Readers?

    March 31, 202528 Views
    Don't Miss
    Technology August 31, 2025

    Asus ExpertCenter PN54 reviewed

    Asus ExpertCenter PN54 reviewed – what the mini PC with AMD Ryzen AI 7 350…

    Huawei MatePad Mini: Launch date confirmed for compact flagship tablet with OLED screen

    P40WD-40: New Lenovo ThinkVision monitor leaks with Thunderbolt 4 and 120 Hz refresh rate for professionals

    Best AI Workstation Processors 2025: Why AMD Ryzen Beats Intel for Local AI Computing for now!

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Asus ExpertCenter PN54 reviewed

    August 31, 20252 Views

    Huawei MatePad Mini: Launch date confirmed for compact flagship tablet with OLED screen

    August 31, 20252 Views

    P40WD-40: New Lenovo ThinkVision monitor leaks with Thunderbolt 4 and 120 Hz refresh rate for professionals

    August 31, 20252 Views
    Most Popular

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    French Apex Legends voice cast refuses contracts over “unacceptable” AI clause

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.