Provide examples of Cyber Threat Intelligence (CTI) Priority Intelligence Requirements (PIRs) based on possible Stakeholders
- C-suite level
- Cyber Threat Intelligence
- Email Security/Phihshing
- External Attack Surface Management
- GRC
- Incident Response Management
- Incident Response
- Insider Threat Team
- Red Team
- Third Party Risk Management
- Threat Hunting
- Threat Modeling
- Threat Simulation
- Vulnerability Management
The following PIRs are typically of strategic interest to C-suite executives, as they align with high-level organizational priorities and decision-making perspectives
| PIR TEAM ID | PIR FULL NAME | DESCRIPTION | OBJECTIVE |
|---|---|---|---|
| PIR-CS | Data | Desc | Obj |
| PIR-CS | Data | Desc | Obj |
| PIR-CS | Data | Desc | Obj |
| PIR-CS | Data | Desc | Obj |
| PIR TEAM ID | PIR FULL NAME | DESCRIPTION | OBJECTIVE |
|---|---|---|---|
| PIR-CTI | Data | Desc | Obj |
| PIR-CTI | Data | Desc | Obj |
| PIR-CTI | Data | Desc | Obj |
| PIR-CTI | Data | Desc | Obj |
| PIR TEAM ID | PIR FULL NAME | DESCRIPTION | OBJECTIVE |
|---|---|---|---|
| PIR-PHISH | Data | Desc | Obj |
| PIR-PHISH | Data | Desc | Obj |
| PIR-PHISH | Data | Desc | Obj |
| PIR-PHISH | Data | Desc | Obj |
| PIR TEAM ID | PIR FULL NAME | DESCRIPTION | OBJECTIVE |
|---|---|---|---|
| PIR-EASM | Data | Desc | Obj |
| PIR-EASM | Data | Desc | Obj |
| PIR-EASM | Data | Desc | Obj |
| PIR-EASM | Data | Desc | Obj |
| PIR TEAM ID | PIR FULL NAME | DESCRIPTION | OBJECTIVE |
|---|---|---|---|
| PIR-GRC | Data | Desc | Obj |
| PIR-GRC | Data | Desc | Obj |
| PIR-GRC | Data | Desc | Obj |
| PIR-GRC | Data | Desc | Obj |
| PIR TEAM ID | PIR FULL NAME | DESCRIPTION | OBJECTIVE |
|---|---|---|---|
| PIR-IRM | Data | Desc | Obj |
| PIR-IRM | Data | Desc | Obj |
| PIR-IRM | Data | Desc | Obj |
| PIR-IRM | Data | Desc | Obj |
| PIR TEAM ID | PIR FULL NAME | DESCRIPTION | OBJECTIVE |
|---|---|---|---|
| PIR-IR | Data | Desc | Obj |
| PIR-IR | Data | Desc | Obj |
| PIR-IR | Data | Desc | Obj |
| PIR-IR | Data | Desc | Obj |
Insider Threat Team
| PIR TEAM ID | PIR FULL NAME | DESCRIPTION | OBJECTIVE |
|---|---|---|---|
| PIR-INSIDER | Data | Desc | Obj |
| PIR-INSIDER | Data | Desc | Obj |
| PIR-INSIDER | Data | Desc | Obj |
| PIR-INSIDER | Data | Desc | Obj |
| PIR TEAM ID | PIR FULL NAME | DESCRIPTION | OBJECTIVE |
|---|---|---|---|
| PIR-RED | Data | Desc | Obj |
| PIR-RED | Data | Desc | Obj |
| PIR-RED | Data | Desc | Obj |
| PIR-RED | Data | Desc | Obj |
| PIR TEAM ID | PIR FULL NAME | DESCRIPTION | OBJECTIVE |
|---|---|---|---|
| PIR-TPRM | Data | Desc | Obj |
| PIR-TPRM | Data | Desc | Obj |
| PIR-TPRM | Data | Desc | Obj |
| PIR-TPRM | Data | Desc | Obj |
| PIR TEAM ID | PIR FULL NAME | DESCRIPTION | OBJECTIVE |
|---|---|---|---|
| PIR-TH | Data | Desc | Obj |
| PIR-TH | Data | Desc | Obj |
| PIR-TH | Data | Desc | Obj |
| PIR-TH | Data | Desc | Obj |
| PIR TEAM ID | PIR FULL NAME | DESCRIPTION | OBJECTIVE |
|---|---|---|---|
| PIR-ThreatM | Data | Desc | Obj |
| PIR-ThreatM | Data | Desc | Obj |
| PIR-ThreatM | Data | Desc | Obj |
| PIR-ThreatM | Data | Desc | Obj |
| PIR TEAM ID | PIR FULL NAME | DESCRIPTION | OBJECTIVE |
|---|---|---|---|
| PIR-ThreatS | Data | Desc | Obj |
| PIR-ThreatS | Data | Desc | Obj |
| PIR-ThreatS | Data | Desc | Obj |
| PIR-ThreatS | Data | Desc | Obj |
| PIR TEAM ID | PIR FULL NAME | DESCRIPTION | OBJECTIVE |
|---|---|---|---|
| PIR-VM | PIR-VM-01 - New CISA KEV | Be advice when a news vulnerability is added to the CISA KEV (Known Exploited Vulnerability) | THe objective is to be made aware of new CISA KEV and then validate if the vulnerability is present on an asset. As the CISA KEV list vulnerability thaht are exploited in the wild, then those should be addressed with a hight priority. |
| PIR-VM | Data | Desc | Obj |
| PIR-VM | Data | Desc | Obj |
| PIR-VM | Data | Desc | Obj |