The Cyber5 Podcast

State of the Cyber Threat Intelligence Market with IT-Harvest Chief Research Analyst Richard Stiennon

Episode 30 of the podcast covers the state of the cyber threat intelligence market with Richard Stiennon, Chief Research Analyst at IT-Harvest and author of the recently released Security Yearbook 2020.


  • Question 1: (01:21) From your cyber threat intelligence research, what were the primary categories of CTI vendors?
  • Question 2: (04:30) Are there too many CTI solution vendors? Is it becoming too much noise?
  • Question 3: (08:02) What are the key factors you see as tangible reasons for growth as it relates to providing customer value?
  • Question 4: (09:40) How would you advise budget conscious CISO’s to spend after reading report?
  • Question 5: (12:22) Do you see the ability for managed services disruption to the market instead of products?

Episode 30 | October 29, 2020

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights℠ Retainer
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks