In 2023, when asked what methods are most leveraged in cyber threat intelligence (CTI) analysis, nearly 50 percent of respondents indicated frequently using intuitive or experience based judgement, and around 39 percent stated using this method occasionally. By contrast, the use of structured analytic techniques, such as key assumptions check, clustering, or Analysis of Competing Hypothesis (ACH) was the least used method for analysis.
What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis?
Characteristic
Used frequently
Used ocasionally
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Exclusive Premium Statistic
To access all Premium Statistics, you need a paid Statista Account
Profit from the additional features of your individual account
Currently, you are using a shared account. To use individual functions (e.g., mark statistics as favourites, set
statistic alerts) please log in with your personal account.
If you are an admin, please authenticate by logging in again.
Learn more about how Statista can support your business.
SANS Institute, & Anomali. (July 11, 2023). What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis? [Graph]. In Statista. Retrieved July 22, 2024, from https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/
SANS Institute, und Anomali. "What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis?." Chart. July 11, 2023. Statista. Accessed July 22, 2024. https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/
SANS Institute, Anomali. (2023). What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis?. Statista. Statista Inc.. Accessed: July 22, 2024. https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/
SANS Institute, and Anomali. "What Frequently Used Methods Are Leveraged in Cyber Threat Intelligence (Cti) Analysis?." Statista, Statista Inc., 11 Jul 2023, https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/
SANS Institute & Anomali, What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis? Statista, https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/ (last visited July 22, 2024)
What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis? [Graph], SANS Institute, & Anomali, July 11, 2023. [Online]. Available: https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/