{"id":78329,"date":"2023-01-16T12:11:22","date_gmt":"2023-01-16T12:11:22","guid":{"rendered":"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/?p=77871"},"modified":"2025-09-04T14:05:20","modified_gmt":"2025-09-04T14:05:20","slug":"cyberthreat-intelligence-dissemination-white-paper","status":"publish","type":"post","link":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/","title":{"rendered":"Disseminating Cyberthreat Intelligence to Enhance Information Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"78329\" class=\"elementor elementor-78329\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a914fe1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a914fe1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d0b3b2f\" data-id=\"d0b3b2f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-808187f elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"808187f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#form\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"521\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/5-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Desktop.jpg\" class=\"attachment-full size-full wp-image-78398\" alt=\"Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/5-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Desktop.jpg 1024w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/5-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Desktop-300x153.jpg 300w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/5-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Desktop-768x391.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92d1598 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-image\" data-id=\"92d1598\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#form\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"521\" height=\"521\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Mobile.jpg\" class=\"attachment-full size-full wp-image-78384\" alt=\"Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Mobile.jpg 521w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Mobile-300x300.jpg 300w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Mobile-150x150.jpg 150w\" sizes=\"(max-width: 521px) 100vw, 521px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a242ff8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a242ff8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d47524\" data-id=\"7d47524\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ebd3546 elementor-widget elementor-widget-heading\" data-id=\"ebd3546\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Disseminating Cyberthreat Intelligence to Enhance Information Security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-971c440 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"971c440\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1dbc424\" data-id=\"1dbc424\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-690297b elementor-widget elementor-widget-post-info\" data-id=\"690297b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a4968b2 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>January 16, 2023<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-5dadb57 elementor-inline-item\">\n\t\t\t\t\t\t<a href=\"#author\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tSusan Villaquiral\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-45dc397 elementor-inline-item\">\n\t\t\t\t\t\t<a href=\"\/cybersecurity-exchange\/threat-intelligence\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tThreat Intelligence\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98432b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"98432b8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6abf6b0\" data-id=\"6abf6b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6201be8 elementor-widget elementor-widget-text-editor\" data-id=\"6201be8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">EC-Council&#8217;s whitepaper, &#8220;<\/span><b><span data-contrast=\"auto\">Disseminating Cyberthreat Intelligence to Enhance Information Security<\/span><\/b><span data-contrast=\"auto\">,&#8221; authored by Susan Villaquiral Cort\u00e9s, CISO and COO at ArkNova SAS, focuses on the importance of <a href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/\">cyber threat intelligence (CTI)<\/a> in improving information security posture. The whitepaper aims to provide a comprehensive guide to organizations on implementing a CTI program and sharing CTI with the broader community to create a collaborative security environment.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">The whitepaper begins by explaining the importance of CTI in mitigating cyber threats. It highlights how CTI helps organizations identify and prioritize threats, provide contextual information to security analysts, and develop proactive security measures. The whitepaper emphasizes that an effective CTI program requires a comprehensive understanding of the threat landscape, including threat actors&#8217; tactics, techniques, and procedures.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-48964ac elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"48964ac\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-495877d\" data-id=\"495877d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43ff8a6 elementor-widget elementor-widget-image\" data-id=\"43ff8a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"683\" height=\"1024\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-131-683x1024.jpg\" class=\"attachment-large size-large wp-image-78588\" alt=\"\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-131-683x1024.jpg 683w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-131-200x300.jpg 200w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-131-768x1152.jpg 768w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-131.jpg 1000w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1103e2b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1103e2b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a4eb738\" data-id=\"a4eb738\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44c2177 elementor-widget elementor-widget-text-editor\" data-id=\"44c2177\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">The whitepaper then discusses the challenges organizations face when implementing a CTI program, including needing more resources, expertise, and knowledge. It highlights the need for organizations to adopt a structured and systematic approach to CTI, including using specialized tools and platforms, and the importance of creating a CTI team with the right skill sets.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">\u202fThe whitepaper stresses the importance of sharing CTI with the broader community to create a collaborative security environment. Sharing CTI can help organizations build relationships with other entities in the cybersecurity community, including other organizations, government agencies, and law enforcement. The paper discusses various platforms and channels that can be used to share CTI, including information sharing and analysis centers (ISACs), sector-specific forums, and social media. The whitepaper also covers the legal and ethical considerations surrounding CTI sharing. It emphasizes the importance of adhering to data protection laws and regulations and avoiding disclosing sensitive information. The whitepaper highlights the need for organizations to establish clear guidelines and procedures for CTI sharing and to ensure compliance with relevant laws and regulations.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">\u202fThe whitepaper concludes by providing practical guidance on how organizations can implement a CTI program and share CTI with the broader community. It gives a step-by-step approach to developing a CTI strategy, including identifying the organization&#8217;s CTI requirements, building a CTI team, selecting CTI tools and platforms, and establishing CTI-sharing relationships. The whitepaper also emphasizes the need for ongoing evaluation and refinement of the CTI program to ensure its effectiveness.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">In conclusion, the whitepaper by Susan Villaquiral Cort\u00e9s is a valuable resource for organizations looking to enhance their information security posture by implementing a CTI program. The paper provides a comprehensive guide to implementing a CTI program, including the importance of CTI in mitigating cyber threats, the challenges organizations face when implementing a CTI program, the legal and ethical considerations surrounding CTI sharing, and practical guidance on how organizations can implement a CTI program and share CTI with the broader community.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span class=\"ui-provider gp b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">To download the whitepaper, please submit your details in the form provided below.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>EC-Council&#8217;s whitepaper, &#8220;Disseminating Cyberthreat Intelligence to Enhance Information Security,&#8221; authored by Susan Villaquiral Cort\u00e9s, CISO and COO at ArkNova SAS, focuses on the importance of cyber threat intelligence (CTI) in improving information security posture. The whitepaper aims to provide a comprehensive guide to organizations on implementing a CTI program and sharing CTI with the broader&hellip;<\/p>\n","protected":false},"author":48,"featured_media":78384,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12228],"tags":[12268,12269,403,12270,12258,199,12271,12272,12273,12274,12275,12276,12259,12277,12278,12262,12264,12279,12280],"class_list":{"0":"post-78329","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-whitepaper","8":"tag-cloudsecurity","9":"tag-cyberawareness","10":"tag-cybercrime","11":"tag-cyberdefense","12":"tag-cyberresilience","13":"tag-cybersecurity","14":"tag-cybersecurityawareness","15":"tag-cybersecuritysolutions","16":"tag-cybersecuritystrategy","17":"tag-cybersecuritytips","18":"tag-cybersecuritytraining","19":"tag-cyberthreatanalysis","20":"tag-cyberthreats","21":"tag-datasecurity","22":"tag-endpointsecurity","23":"tag-informationsecurity","24":"tag-networksecurity","25":"tag-securityintelligence","26":"tag-threatintelligence"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Intelligence Dissemination - CTIA EC-Council<\/title>\n<meta name=\"description\" content=\"This white paper covers the present and future of cyberthreat intelligence dissemination and reporting, including blockchain\u2019s potential to transform CTI sharing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Disseminating Cyberthreat Intelligence to Enhance Information Security\" \/>\n<meta property=\"og:description\" content=\"This white paper covers the present and future of cyberthreat intelligence dissemination and reporting, including blockchain\u2019s potential to transform CTI sharing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-16T12:11:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-04T14:05:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Mobile.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Susan Villaquiral Cortes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Susan Villaquiral Cortes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/cyberthreat-intelligence-dissemination-white-paper\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/cyberthreat-intelligence-dissemination-white-paper\\\/\"},\"author\":{\"name\":\"Susan Villaquiral Cortes\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/1b19776f2afe9ef5587584bf389c6699\"},\"headline\":\"Disseminating Cyberthreat Intelligence to Enhance Information Security\",\"datePublished\":\"2023-01-16T12:11:22+00:00\",\"dateModified\":\"2025-09-04T14:05:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/cyberthreat-intelligence-dissemination-white-paper\\\/\"},\"wordCount\":468,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/cyberthreat-intelligence-dissemination-white-paper\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/mob-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Mobile.jpg\",\"keywords\":[\"CloudSecurity\",\"cyberawareness\",\"cybercrime\",\"cyberdefense\",\"cyberresilience\",\"cybersecurity\",\"cybersecurityawareness\",\"cybersecuritysolutions\",\"cybersecuritystrategy\",\"cybersecuritytips\",\"cybersecuritytraining\",\"cyberthreatanalysis\",\"cyberthreats\",\"datasecurity\",\"endpointsecurity\",\"InformationSecurity\",\"networksecurity\",\"securityintelligence\",\"threatintelligence\"],\"articleSection\":[\"Whitepaper\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/cyberthreat-intelligence-dissemination-white-paper\\\/\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/cyberthreat-intelligence-dissemination-white-paper\\\/\",\"name\":\"Cyber Threat Intelligence Dissemination - CTIA EC-Council\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/cyberthreat-intelligence-dissemination-white-paper\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/cyberthreat-intelligence-dissemination-white-paper\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/mob-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Mobile.jpg\",\"datePublished\":\"2023-01-16T12:11:22+00:00\",\"dateModified\":\"2025-09-04T14:05:20+00:00\",\"description\":\"This white paper covers the present and future of cyberthreat intelligence dissemination and reporting, including blockchain\u2019s potential to transform CTI sharing.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/cyberthreat-intelligence-dissemination-white-paper\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/cyberthreat-intelligence-dissemination-white-paper\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/cyberthreat-intelligence-dissemination-white-paper\\\/#primaryimage\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/mob-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Mobile.jpg\",\"contentUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/mob-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Mobile.jpg\",\"width\":521,\"height\":521,\"caption\":\"Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/cyberthreat-intelligence-dissemination-white-paper\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Whitepaper\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/whitepaper\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Disseminating Cyberthreat Intelligence to Enhance Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/1b19776f2afe9ef5587584bf389c6699\",\"name\":\"Susan Villaquiral Cortes\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Intelligence Dissemination - CTIA EC-Council","description":"This white paper covers the present and future of cyberthreat intelligence dissemination and reporting, including blockchain\u2019s potential to transform CTI sharing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/","og_locale":"en_US","og_type":"article","og_title":"Disseminating Cyberthreat Intelligence to Enhance Information Security","og_description":"This white paper covers the present and future of cyberthreat intelligence dissemination and reporting, including blockchain\u2019s potential to transform CTI sharing.","og_url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-01-16T12:11:22+00:00","article_modified_time":"2025-09-04T14:05:20+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Mobile.jpg","type":"image\/jpeg"}],"author":"Susan Villaquiral Cortes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Susan Villaquiral Cortes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/#article","isPartOf":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/"},"author":{"name":"Susan Villaquiral Cortes","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/1b19776f2afe9ef5587584bf389c6699"},"headline":"Disseminating Cyberthreat Intelligence to Enhance Information Security","datePublished":"2023-01-16T12:11:22+00:00","dateModified":"2025-09-04T14:05:20+00:00","mainEntityOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/"},"wordCount":468,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Mobile.jpg","keywords":["CloudSecurity","cyberawareness","cybercrime","cyberdefense","cyberresilience","cybersecurity","cybersecurityawareness","cybersecuritysolutions","cybersecuritystrategy","cybersecuritytips","cybersecuritytraining","cyberthreatanalysis","cyberthreats","datasecurity","endpointsecurity","InformationSecurity","networksecurity","securityintelligence","threatintelligence"],"articleSection":["Whitepaper"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/","name":"Cyber Threat Intelligence Dissemination - CTIA EC-Council","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/#primaryimage"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Mobile.jpg","datePublished":"2023-01-16T12:11:22+00:00","dateModified":"2025-09-04T14:05:20+00:00","description":"This white paper covers the present and future of cyberthreat intelligence dissemination and reporting, including blockchain\u2019s potential to transform CTI sharing.","breadcrumb":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/#primaryimage","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Mobile.jpg","contentUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security-Mobile.jpg","width":521,"height":521,"caption":"Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security"},{"@type":"BreadcrumbList","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/cyberthreat-intelligence-dissemination-white-paper\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test1.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Whitepaper","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/category\/whitepaper\/"},{"@type":"ListItem","position":4,"name":"Disseminating Cyberthreat Intelligence to Enhance Information Security"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/1b19776f2afe9ef5587584bf389c6699","name":"Susan Villaquiral Cortes"}]}},"_links":{"self":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/78329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/48"}],"replies":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=78329"}],"version-history":[{"count":0,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/78329\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/78384"}],"wp:attachment":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=78329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=78329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=78329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}