
Ultimate access to all questions.
Your organization is in the process of deploying a new threat intelligence platform to enhance its cybersecurity posture. As the Cybersecurity Architect, you are tasked with defining the security requirements for this platform. The organization operates in a highly regulated industry, requiring strict compliance with data protection standards, and has a global presence with a need for scalable solutions. Considering these constraints, which of the following measures should you prioritize to ensure the threat intelligence platform is both effective and compliant? (Choose one option)
A
Limit the threat intelligence sources to only open-source feeds to minimize costs, despite the potential reduction in threat coverage and context.
B
Deploy the threat intelligence platform exclusively for network security, overlooking the integration with endpoint detection and cloud security tools, to simplify implementation.
C
Adopt a comprehensive threat intelligence platform that aggregates data from open-source, commercial, and proprietary sources, enriched with contextual analysis, and ensures seamless integration across network, endpoint, and cloud environments to support real-time threat detection and response.
D
Restrict access to the threat intelligence platform to a select group within the security team to reduce the risk of data leakage, ignoring the benefits of cross-departmental collaboration in threat analysis.