Priority Intelligence Requirements

Building cyber threat intelligence begins with identifying your priority intelligence requirements (PIR).

Complete the form to receive our PIR Getting Started Guide. The document outlines seven questions to consider, including pro tips on how to get the most out of the exercise. The answers this activity yields will guide your organization in gathering the details needed to identify and prioritize critical initiatives.

Download the guide to get started.

Get the guide.