ID.RA-02.154

Does your organization have a process to receive and review cybersecurity threat intelligence from reputable third-party sources?

Explanation

This question assesses whether your organization actively monitors external threat intelligence to stay informed about current threat actors and their tactics, techniques, and procedures (TTPs). Regular review of security advisories helps organizations anticipate potential threats, understand emerging attack vectors, and proactively adjust security controls to address specific risks before they are exploited. Evidence of fulfillment could include documentation of subscribed threat intelligence feeds (e.g., US-CERT, CISA, industry ISACs), meeting minutes from threat intelligence review sessions, or screenshots of a threat intelligence platform showing recent advisories with annotations on their relevance to your environment.

Implementation Example

Receive and review advisories from reputable third parties on current threat actors and their tactics, techniques, and procedures (TTPs)

ID: ID.RA-02.154

Context

Function
ID: IDENTIFY
Category
ID.RA: Risk Assessment
Sub-Category
Cyber threat intelligence is received from information sharing forums and sources

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron