In 2023, when asked what methods are most leveraged in cyber threat intelligence (CTI) analysis, nearly 50 percent of respondents indicated frequently using intuitive or experience based judgement, and around 39 percent stated using this method occasionally. By contrast, the use of structured analytic techniques, such as key assumptions check, clustering, or Analysis of Competing Hypothesis (ACH) was the least used method for analysis.
What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis?
Profit from the additional features of your individual account
Currently, you are using a shared account. To use individual functions (e.g., mark statistics as favourites, set
statistic alerts) please log in with your personal account.
If you are an admin, please authenticate by logging in again.
Learn more about how Statista can support your business.
SANS Institute, & Anomali. (July 11, 2023). What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis? [Graph]. In Statista. Retrieved November 21, 2024, from https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/
SANS Institute, und Anomali. "What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis?." Chart. July 11, 2023. Statista. Accessed November 21, 2024. https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/
SANS Institute, Anomali. (2023). What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis?. Statista. Statista Inc.. Accessed: November 21, 2024. https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/
SANS Institute, and Anomali. "What Frequently Used Methods Are Leveraged in Cyber Threat Intelligence (Cti) Analysis?." Statista, Statista Inc., 11 Jul 2023, https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/
SANS Institute & Anomali, What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis? Statista, https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/ (last visited November 21, 2024)
What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis? [Graph], SANS Institute, & Anomali, July 11, 2023. [Online]. Available: https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/