Contact Sales
Contact Sales

NEW2CTI | Beyond the Feed: Designing CTI Programs That Matter to the Business

NEW2CTI | Beyond the Feed: Designing CTI Programs That Matter to the Business (PDF, 1.65MB)Last updated: 26 Jan, 2026
Presented by:
Sydney JonesArun  Warikoo
Sydney Jones & Arun Warikoo

Across organizations, intelligence teams grapple with the following challenges: aligning the threat intelligence program with organization's business priorities, and articulating its tangible business value. How does a threat intelligence program ensure that insights on the current and emerging threat landscape reach the right stakeholders and ultimately safeguard business continuity and resiliency.

This presentation will delve into a requirements-driven framework for operationalizing threat intelligence to deliver measurable organizational impact.

You will learn how to:

- Develop stakeholder engagements by identifying stakeholders, a clear understanding on stakeholders needs, socializing CTI value, define use cases on ways intel can provide value, and expected outcomes

- Design and implement Intel Requirements that align with stakeholder priorities. Translating stakeholder use cases into intel requirements

- Build a collection management workflow that is aligned with intel requirements. We will delve into identifying collection sources, measure their usefullness and accuracy, and how to find new sources.

- Building an effective iterative process. We will explore how often the intel requirements should be be re-validated.

Whether you are establishing an intel program or maturing it, this session will highlight practical strategies for aligning threar intel with stakeholder needs.

SANS Cyber Threat Intelligence Summit 2026
NEW2CTI | Beyond the Feed: Designing CTI Programs That Matter to the Business