The Implementation of Strategic Threat Intelligence for Business Organization

  • Yee Ling Leong Universiti Utara Malaysia
Keywords: Strategic, Data Intelligence, Threat, Business Organization, Threat Intelligence, Strategic Threat Intelligence


Nowadays strategic threat intelligence is very important to all the organization. Strategic cyber threat intelligence can determine who and why to provide key insights to the organization. It purpose is to determine who is behind a particular threat or threat family and addressing to evolving trends. The strategic level of cyber threat intelligence also included and explains about why. Why makes a company or an organization a target? Strategic Threat Intelligence offer the overview of the threat status of the organization. Therefore, the C-Suite include chief executive officer (CEO), chief financial officer (CFO), chief operating officer (COO) and chief information officer (CIO) of the organization use cyber threat intelligence data to understand the high-level trends and threats to the company or the organization. The C-Suite of the organization also need to know how to implement the strategic threat intelligence to prevent unexpected things happen. This research paper aims to discuss about the importance of the strategic threat intelligence to the company or organization and how to implement it. After knowing and understanding the implementation of strategic threat intelligence to the company or organization, this research paper also will discuss about the when of using strategic threat intelligence. The issue and challenges is also discussed in the article.


Berndt, A., & Ophoff, J. (2020). Exploring the value of a cyber threat intelligence function in an organization. Information Security Education. Information Security in Action, 96–109.
Bromiley, M. (2016). Threat Intelligence: What It Is, and How to Use It Effectively. A SANS Whitepaper.
Chandel, S., Yan, M., Chen, S., Jiang, H., & Ni, T.-Y. (2019). Threat Intelligence Sharing Community: A Countermeasure Against Advanced Persistent Threat. 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
Confente, I., Siciliano, G. G., Gaudenzi, B., & Eickhoff, M. (2019). Effects of data breaches from user-generated content: A corporate reputation analysis. European Management Journal, 37(4), 492–504.
Conti, M., Dargahi, T., & Dehghantanha, A. (2018). Cyber Threat Intelligence: Challenges and Opportunities. Advances in Information Security, 1–6.
Dasgupta, D., Roy, A., & Nag, A. (2017). Multi-Factor Authentication. Infosys Science Foundation Series, 185–233.
Dog, S. E., Tweed, A., Rouse, L. R., Chu, B., Qi, D., Hu, Y., … Al-Shaer, E. (2016). Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs. 2016 25th International Conference on Computer Communication and Networks (ICCCN).
Fadillah, M. (2019). REVIEW OF COFFEE MARKETING STRATEGIES IN BUSINESS COMPETITION. SCIENTIFIC JOURNAL OF REFLECTION: Economic, Accounting, Management and Business, 2(2), 131-140.
GÜREL, E. (2017). SWOT ANALYSIS: A THEORETICAL REVIEW. Journal of International Social Research, 10(51), 994–1006.
Ibrahim, A., Thiruvady, D., Schneider, J.-G., & Abdelrazek, M. (2020). The Challenges of Leveraging Threat Intelligence to Stop Data Breaches. Frontiers in Computer Science, 2.
Johnson, C. S., Badger, M. L., Waltermire, D. A., Snyder, J., & Skorupka, C. (2016). Guide to Cyber Threat Information Sharing.
KPMG. (2013). Cyber threat intelligence and the lessons from law enforcement. KPMG Cybersecurity.
Landon-Murray, M. (2016). Big Data and Intelligence: Applications, Human Capital, and Education. Journal of Strategic Security, 9(2), 94–123.
McMillan, R. (2013). Definition: Threat Intelligence. Gartner.
Moustafa, N., Adi, E., Turnbull, B., & Hu, J. (2018). A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems. IEEE Access, 6, 32910–32924.
Piplai, A., Mittal, S., Abdelsalam, M., Gupta, M., Joshi, A., & Finin, T. (2020). Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior. 2020 IEEE International Conference on Intelligence and Security Informatics (ISI).
Puyt, R., Lie, F. B., De Graaf, F. J., & Wilderom, C. P. M. (2020). Origins of SWOT Analysis. Academy of Management Proceedings, 2020(1), 17416.
Sahrom Abu, M., Rahayu Selamat, S., Ariffin, A., & Yusof, R. (2018). Cyber Threat Intelligence – Issue and Challenges. Indonesian Journal of Electrical Engineering and Computer Science, 10(1), 371.
Tounsi, W., & Rais, H. (2018). A survey on technical threat intelligence in the age of sophisticated cyber attacks. Computers & Security, 72, 212–233.
Verizon, D. (2020). Data Breach Investigations Report 2020. Computer Fraud & Security, 2020(6), 4.
How to Cite
Leong, Y. L. (2021). The Implementation of Strategic Threat Intelligence for Business Organization. Journal of IT in Asia, 9(1), 41-48.