Comprised of technical discussions and guidelines to assist organizations implementing automated cyber threat intelligence information sharing and its use in mitigating cybersecurity risks, the ISAO 300-2 document is designed to provide an implementation guideline for automating key elements of the cyber threat intelligence life cycle.
“This document, written and supported by volunteers within the ISAO community, supports the decision-making and actions taken by the information sharing ecosystem to manage cybersecurity risks to their organizations,” said Dr. Greg White, executive director of the ISAO SO.
The ISAO 300-2 document is targeted at organizations wanting to automate and use cyber threat intelligence processes for defending their enterprise. This document is also useful for any Information Sharing and Analysis Organization (ISAO) members and organizations that are participating or considering participating in automated sharing efforts.
The document highlights areas that include, but are not limited to, the information life cycle, structured and unstructured data as it relates to automation, different types of automation, the cyber threat intelligence ecosystem, stakeholder engagement and how to design an automated process.