Summary
In this chapter, we have covered the definitions of Cyber Threat Intelligence (CTI) and Advance Persistent Threats (APTs). We have reviewed each of the steps involved in the Intelligence Cycle, overviewing how to carry out data collection and processing. Finally, we closed the chapter with one of the main challenges that the intelligence analysis face: the analyst bias.
In the next chapter, we will introduce the concept of threat hunting and the different methodologies and approaches we can follow.