Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    HONOR MagicBook Pro 14 officially available nationwide for RM4499

    AMD’s powerful AI chips can finally be unleashed on Windows PCs

    Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025

      Nvidia CEO hails Trump’s plan to rescind some export curbs on AI chips to China

      May 22, 2025

      AI poses a bigger threat to women’s work, than men’s, report says

      May 21, 2025

      AMD CEO Lisa Su calls China a ‘large opportunity’ and warns against strict U.S. chip controls

      May 8, 2025
    • Business

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025

      Cookie-Bite attack PoC uses Chrome extension to steal session tokens

      April 22, 2025

      Trump tariffs reignite Europe’s push for cloud sovereignty

      April 17, 2025
    • Crypto

      XRP Price Slips as Bears Tighten Grip and Short Bets Surge

      June 12, 2025

      HTX Launches TRX Options, Empowering Users with Flexible and Diversified Trading Strategies

      June 12, 2025

      Ethereum Leverage At All-Time High as BlackRock Ramps Up Accumulation

      June 12, 2025

      HBAR Price Downtrend Set To Face Volatility Explosion; Recovery Likely

      June 12, 2025

      Aura (AURA) Token Skyrockets Over 3,500%, But Analysts Urge Caution Amid Rug Pull Fears

      June 11, 2025
    • Technology

      AMD’s powerful AI chips can finally be unleashed on Windows PCs

      June 13, 2025

      Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

      June 13, 2025

      Microsoft’s AI helper, Copilot Vision, is now live

      June 13, 2025

      Microsoft throws shade at macOS Tahoe’s familiar new vista

      June 13, 2025

      WTF is sell-side decisioning?

      June 12, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Technology»Building resilient cyber threat intelligence communities
    Technology

    Building resilient cyber threat intelligence communities

    TechAiVerseBy TechAiVerseMay 27, 2025No Comments7 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Building resilient cyber threat intelligence communities
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Building resilient cyber threat intelligence communities

    Cyber threat intelligence is no longer a luxury: intelligence sharing communities must mature, and there are many common lessons to learn.

    By

    • Rob Dartnall,
      SecAlliance

    Published: 27 May 2025

    Over the last six years, I’ve had the privilege of working with governments, national central banks, and communities of interest around the world, helping them build and refine their cyber threat intelligence (CTI) communities. From the most cyber mature entities to those in emerging economies with lesser resources, there are clear pattens. And while maturity levels may vary a great deal, the core challenges and the solutions are remarkably similar.

    Coming from a military intelligence background, I have always viewed intelligence sharing as a fundamental principle. While “need to know” was a core dictate, “need to share” was equally vital – especially when it came to operations. Moving into the private sector was a culture shock, because the hesitation to share intelligence wasn’t just a reality, it was pervasive.

    Size matters

    This led to my first key lesson – size matters.

    Take, for example, when I was working with a national central bank to build a CTI community. Despite the effort and a lot of good intentions, the initiative was sadly doomed to fail. Why? Because the country’s biggest banks already had their own, smaller, highly trusted network. They just didn’t want to share intelligence outside of that group.

    The argument here is pretty simple. No financial institution is individually resilient.  Cyber risk affects everyone and banks have a responsibility to protect the wider financial ecosystem.

    At the other extreme, I observed an active global Information Sharing and Analysis Centre (ISAC) where dozens of members participated in calls, yet very little of value was exchanged. The issue here was that the community was too big. People just were not willing to share intelligence with faceless individuals that they didn’t know and thus, trust.

    So, clearly CTI communities must be big enough that they actually have an impact on the whole of the ecosystem, but also small enough to that trusted relationships develop.

    Intelligence vs. Data

    My second key lesson, was around the constant struggle over the definition of “intelligence.” A term we know well, but older communities, built out of IT teams, struggled to understand. Many CTI communities were highly tactical, focused solely on indicators of compromise (IoCs) that were shared via platforms like the Malware Information Sharing Platform (MISP). But in reality, this wasn’t intelligence. It was the sharing of threat data.

    The conversation needed to be elevated, so I advocated for broader discussions on threat information, strategic intelligence and best practices. Also, that intelligence needed to be tailored for different audiences. For example, automated data outputs for analysts; technical papers for cyber experts; intelligence summaries for CISOs, and strategic reports and horizon scanning for executives and board members. Intelligence briefings that were relevant to them and their unique community.

    Ultimately, intelligence products must have a clear “so what?” that identifies what the intelligence means and crucially what the decision makers should do with it. There’s little point to threat intelligence if it has no context and does not inform decision making.

    Navigating the legal challenge

    There are obviously legal concerns in intelligence-sharing communities. Unfortunately, these have in the past been used as an excuse not to share. GDPR, for example, initially caused uncertainty but over time organisations understood that data privacy regulations were not meant to be barriers, they are guidelines for structured sharing.

    To mitigate privacy concerns, most successful intelligence sharing communities will implement centralised contracts and terms of reference to ensure liability protection, along with sharing guidelines that define permissible data exchange within legal frameworks, and automated threat data processing.

    CIISI – a successful framework

    The CIISI-EU framework is a testament to the power of trusted intelligence sharing. Five years ago, the European Cyber Resilience Board (ECRB) and the European Central Bank (ECB)  discussed creating a small, yet highly effective community focused on strategic insights, best practice exchange and operational intelligence. From this initiative, the CIISI framework was established and has since been adopted by other nations.

    Comprised of 26 entities – including SecAlliance and ThreatMatch as the centralised intelligence function – alongside Europol and ENISA, CIISI strikes the right balance between tactical, operational, and strategic intelligence. It brings together joint research, coordinated intelligence functions, workshops and training, to ensure that decision-makers at all levels have access to relevant intelligence products.

    A defining strength of the framework is that the ECB not only implemented it but also released its white paper and intelligence-sharing rulebook, allowing other organisations and nations to learn from its approach.

    Having been directly involved in the creation of CIISI, I was able to apply its principles to replicate similar frameworks across various countries, adapting each to fit specific sectoral, cultural and maturity requirements. However, while every community does have its own unique needs, certain fundamental principles are constant.

    Firstly, intelligence should be shared as widely as possible within appropriate classification levels to maximise its impact while preserving trust. Communities must also be large enough to drive meaningful outcomes, but small enough to maintain the necessary level of confidence among members.

    It is essential to develop intelligence products tailored for different audiences, ensuring engagement at the executive level to secure leadership buy-in and funding.

    Building trust is a cornerstone of successful intelligence sharing. And that is why meeting face-to-face at least twice a year is really important for strengthening relationships among community members.

    Intelligence assessments, informational insights and data should be actively exchanged, with automation playing a key role in making this process more efficient. Now in 2025, tactical intelligence sharing should largely be more automated, enabling more time on operational and strategic outputs. Establishing a centralised platform is crucial, moving intelligence sharing away from fragmented channels such as email and WhatsApp. This platform must distribute not only indicators of compromise (IOCs) but also finished intelligence products and strategic reports. It must be human centric and easy to use for all user types, not just technical teams. It must control the dissemination at community, but also organisational and individual level to allow members to control access to their intelligence.

    A dedicated intelligence function is essential to drive dissemination, identify patterns, add assessments, and act as a catalyst for engagement. To reinforce commitment, members should sign up to a charter, rulebook, or formal terms of reference, outlining their obligations to contribute intelligence. Additionally, providing templates and policy frameworks can help organisations navigate internal legal challenges, ensuring that regulatory barriers do not stifle collaboration.

    CIISI has demonstrated that implemented properly, structured intelligence sharing frameworks can drive real impact. Its principles continue to shape communities worldwide, refining how intelligence is exchanged, processed, and acted upon to enhance cyber resilience at national and sectoral levels.

    In 2025 and beyond, as cyber threats continue to evolve, intelligence-sharing communities must continue to adapt to become more strategic, more collaborative and more impactful. The principles outlined in this article provide an outline for building resilient, effective CTI ecosystems that contribute to national and sector-wide cybersecurity resilience.

    Read more on Business continuity planning


    • Countering nation-state cyber espionage: A CISO field guide


    • Threat hunting frameworks, techniques and methodologies

      By: Dave Shackleford


    • Security Think Tank: The cloud just got more complicated

      By: Rob Dartnall


    • Structured Threat Information eXpression (STIX)

      By: Rahul Awati

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleSecurity vs. usability: Why rogue corporate comms are still an issue
    Next Article Armed forces charity steps in to address cyber mental health crisis
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    AMD’s powerful AI chips can finally be unleashed on Windows PCs

    June 13, 2025

    Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

    June 13, 2025

    Microsoft’s AI helper, Copilot Vision, is now live

    June 13, 2025
    Leave A Reply Cancel Reply

    Top Posts

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202523 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202518 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202514 Views

    Arizona moves to ban AI use in reviewing medical claims

    March 12, 202511 Views
    Don't Miss
    Gadgets June 13, 2025

    HONOR MagicBook Pro 14 officially available nationwide for RM4499

    HONOR MagicBook Pro 14 officially available nationwide for RM4499 HONOR has announced the general availability…

    AMD’s powerful AI chips can finally be unleashed on Windows PCs

    Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

    Microsoft’s AI helper, Copilot Vision, is now live

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    HONOR MagicBook Pro 14 officially available nationwide for RM4499

    June 13, 20250 Views

    AMD’s powerful AI chips can finally be unleashed on Windows PCs

    June 13, 20250 Views

    Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

    June 13, 20250 Views
    Most Popular

    Ethereum must hold $2,000 support or risk dropping to $1,850 – Here’s why

    March 12, 20250 Views

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.