2017 Actionable Threat Intelligence Survey Do You Have the Policies, Personnel and Tools to Get the Most Out of Your Threat Intel?

In today's shape-shifting threat landscape, every organization needs the same thing: Real-time, actionable threat intelligence. And there is no shortage of intelligence feeds from reputable third-party sources. But are there too many intelligence feeds for systems and analysts to process? How effectively is actionable threat intelligence being put into practice to improve organizations' abilities to detect and respond to cybersecurity incidents - including when addressing third-party risks?

Help answer these questions and more by participating in the 2017 Actionable Threat Intelligence Survey, sponsored by LookingGlass Cyber Solutions. Take the survey (below) and help us determine:

  • What is the quantity, quality and accuracy of threat intelligence that organizations currently receive?
  • What tools and techniques are organizations deploying to automate threat intelligence and put it into action?
  • What will be the top investment priorities to maximize actionable threat intelligence in 2018?


  1. How do you assess the quality of the threat intelligence your organization currently uses to detect and/or respond to cybersecurity threats?
  2. In the past year, how frequently has threat intelligence played a role in detection of threats that could have impacted your organization?
  3. In the past year, how frequently has threat intelligence played a role in detection of third-party risks?
  4. In the past year, how frequently has threat intelligence played a role in detection of threats after they have entered your organization?
  5. In the past year, what has your organization done to improve the quality and applicability of threat intelligence (check all that apply)?
    :
  6. How do you assess your organization's ability to operationalize threat intelligence?
  7. What today is the single biggest weakness in how your organization acquires or operationalizes threat intelligence?
    :
  8. What are your current sources of threat intelligence (check all that apply)?
    :
  9. What do you consider to be the most critical elements of threat intelligence for your organization (check all that apply)?
    :
  10. Are your security tools/applications/appliances integrated sufficiently to use same source threat intelligence?





Around the Network