In 2023, when asked what methods are most leveraged in cyber threat intelligence (CTI) analysis, nearly 50 percent of respondents indicated frequently using intuitive or experience based judgement, and around 39 percent stated using this method occasionally. By contrast, the use of structured analytic techniques, such as key assumptions check, clustering, or Analysis of Competing Hypothesis (ACH) was the least used method for analysis.
What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis?
Characteristic
Used frequently
Used ocasionally
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Exclusive Premium Statistic
To access all Premium Statistics, you need a paid Statista Account
Profit from the additional features of your individual account
Currently, you are using a shared account. To use individual functions (e.g., mark statistics as favourites, set
statistic alerts) please log in with your personal account.
If you are an admin, please authenticate by logging in again.
Learn more about how Statista can support your business.
SANS Institute, & Anomali. (July 11, 2023). What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis? [Graph]. In Statista. Retrieved September 09, 2024, from https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/
SANS Institute, und Anomali. "What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis?." Chart. July 11, 2023. Statista. Accessed September 09, 2024. https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/
SANS Institute, Anomali. (2023). What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis?. Statista. Statista Inc.. Accessed: September 09, 2024. https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/
SANS Institute, and Anomali. "What Frequently Used Methods Are Leveraged in Cyber Threat Intelligence (Cti) Analysis?." Statista, Statista Inc., 11 Jul 2023, https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/
SANS Institute & Anomali, What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis? Statista, https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/ (last visited September 09, 2024)
What frequently used methods are leveraged in cyber threat intelligence (CTI) analysis? [Graph], SANS Institute, & Anomali, July 11, 2023. [Online]. Available: https://www.statista.com/statistics/1334482/cyber-threat-intelligence-methods-analysis-worldwide/