Making effective use of cyber threat intelligence
Making effective use of cyber threat intelligence is an important component of an organization's security program. Cyber threat intelligence must be collected, analyzed, shared and leveraged. This context is used in performing Product Analysis on leading tools and standards for cyber threat intelligence systems. Some of the tools and standards considered are the Open Indicators of Compromise (OpenIOC) framework, Vocabulary for Event Recording and Incident Sharing (VERIS), Cyber Observable eXpression (CybOX), Incident Object Description and Exchange Format (IODEF), Trusted Automated eXchange of Indicator Information (TAXII), Structured threat Information Expression (STIX), Traffic Light Protocol (TLP), Open Threat Exchange (OTX) and Collective Intelligence Framework (CIF).
Download the paper from here - https://www.sans.org/reading-room/whitepapers/warfare/tools-standards-cyber-threat-intelligence-projects-34375