Intelligence Capability Development
Optimize your threat intelligence capabilities
Get more value from your intelligence
Optimize your ability to consume,
analyze and apply threat intelligence.
Get expert assistance in
building a sustainable Intelligence-led organization.
Improve
your team’s analytical and threat hunting capabilities.
Assess the current state of your intelligence program and threats
- Discover the threats your organization is currently facing.
- Identify the intelligence you need and who will use it.
- Evaluate your current threat intelligence capabilities.


Design an optimized threat intelligence program to meet your requirements
- Map out your strategic, operational and tactical use cases for the application of intelligence.
- Get a blueprint for improvement covering people, technology and processes.
Enhance the capabilities of your staff
- Develop your team’s analytical skillsets using core cyber threat intelligence concepts and structured analytic techniques.
- Apply foundational concepts and a structured framework to identify repeatable best practices for threat hunting.

“Mandiant Threat Intelligence services help extend threat communications to stakeholders across the entire organization for efficient response to cyber threats.”
Choose from these services
Whether combined or delivered separately,
Mandiant Threat Intelligence services support
the development
and maintenance of a comprehensive threat intelligence program.
Threat Intelligence Foundations (TIF)
Establish the basic building blocks for developing threat intelligence capabilities. Identify relevant threats, the stakeholders who require visibility and the pragmatic practices for effective delivery and consumption.
Cyber Threat Diagnostic (CTD)
Build a baseline threat profile that includes the motives, intentions and capabilities of threat actors targeting your business. Each custom profile is built by analyzing threat activity on your network logs as well as observations from the global digital underground.
Intelligence Capability Assessment (ICA)
Evaluate the effectiveness of your current threat intelligence capabilities and the integrated throughput of intel across multiple I.T.-related domains and disciplines.
Intelligence Capability Uplift (ICU)
Develop a world-class threat intelligence program that includes scalable, repeatable processes for the collection, analysis and dissemination of intelligence throughout the organization.
Analytic Tradecraft Workshop (ATW)
Host a one-day team workshop to enhance the analytical skillsets necessary to support your organization’s threat intelligence capabilities in-house.
Hunt Mission Training (HMT)
Host a tactically-focused workshop to guide staff in the intelligence-driven approach to proactively identifying active or nascent threats. The workshop is tailored for SOC, IR and tactical intelligence analysts responsible for advanced threat detection activities.
Our approach
Intelligence Capability Development services range in size and scope. All outcomes are focused on increasing an organization’s ability to identify, contextualize, adapt to, anticipate and communicate the threats it encounters, resulting in enhanced capabilities such as:
Programmatic Intel Consumption and Integration
Develop the ability to implement a set of cyber threat intelligence (CTI) practices, capabilities or an entire program, capable of consuming and applying CTI to reduce long term risk and integrate CTI into key cybersecurity capabilities.
Strategy and Process
Develop a strategic roadmap to enhance security maturity using an intelligence-driven methodology. Key security and business process components recognize and include threat intelligence.
Threat Awareness and Skill Enhancement
Teams and individuals within the organization have a greater understanding of the threats it faces, with enhanced skills related to consuming, analyzing, applying and communicating threat intelligence.
Related resources
Forrester Report
FireEye named leader in The Forrester New Wave
White paper
The Value of True Cyber Threat Intelligence
White Paper
Intelligence First:
How threat intelligence enriches security consulting services
Ready to get started?
Our security experts are
standing by to help you with an incident or answer questions about
our
consulting and managed detection and response services.