您的浏览器禁用了JavaScript(一种计算机语言,用以实现您与网页的交互),请解除该禁用,或者联系我们。 [Forrester]:2025威胁情报基准研究报告:从被动响应到主动预判 - 发现报告

2025威胁情报基准研究报告:从被动响应到主动预判

金融 2025-11-13 Forrester 生产-肖徐-审核报告小号
报告封面

Harness AI And Expert Insights To Transform Threat IntelligenceFrom Overwhelming To Actionable Table Of Contents 3Executive Summary4Key Findings5Growing Threat And Data Volumes As Well As SkillsShortages Leave Organizations Vulnerable10Organizations Struggle To Operationalize Threat Intelligence Mandy Polacek, Contributing Research:Forrester’sSecurity & Riskresearch group ABOUT FORRESTER CONSULTING Forrester provides independent and objectiveresearch-based consultingto help leaders deliverkey outcomes. Fueled by ourcustomer-obsessed research, Forrester’s seasoned consultantspartner with leaders to execute their specific priorities using a unique engagement model that Executive Summary As cyberattacks grow in frequency and sophistication, organizationsstruggle to keep up due to challenges like increasing, siloed threatintelligence feeds. Rather than aiding efficiency, myriad feeds inundatesecurity teams with data, making it hard to extract useful insights or In January 2025, Google Cloud commissioned Forrester Consulting toevaluate the state of cyberthreat intelligence (CTI) practices and strategies.Forrester conducted a double-blind online survey with 1,541 director+ ITand cybersecurity leaders at global enterprises across 12 industries toexplore this topic. The survey found that organizations are increasinglyvulnerable due to the vast amount of threats and data and a shortage ofskilled threat analysts. Despite the use of AI, human expertise remainsessential to help security teams interpret and apply threat intelligence with key Findings Data overload and skills gaps leave analysts drowning in informationand organizations at risk.A shortage of skilled threat analysts plus anoverwhelming volume of threat data leave organizations vulnerable. While Organizations struggle to operationalize threat intelligence.Respondentssaid their organizations rely on many threat intelligence sources, but mostfind it challenging to fully use this information to improve their securityposture. Many also found it hard to turn raw data from feeds into a decision Organizations are stuck in a reactive state.Due to the shortage ofanalysts and data overload, 72% of respondents said they can only reactto cyberthreats; they struggle to prioritize threats and respond quickly Becoming proactive will require actionable insights, superchargedby AI and embedded skilled analysts (as needed).To overcome thesekey challenges, organizations need actionable threat intelligence that iscomplete, accurate, relevant, and timely. They must lay the right foundation Growing Threat And Data Volumes As Well As Skills Shortages LeaveOrganizations Vulnerable Organizations today face a shortage of personnel who can effectivelyinterpret and act on threat intelligence. While AI is helping upleveldefenders, organizations struggle to use it consistently. At the same •Too few analysts are working with too many data feeds.Sixty percentof respondents reported that the lack of skilled threat analysts preventsthem from improving their threat intelligence capabilities, and 61% said •Organizations are turning to AI to ease theburden.Eighty-six percent of respondentsagreed that their organization must use AI •By industry, manufacturing respondents were most concerned,with 89% worried that they’re missing real threats due to alert anddata volume.Most threat intelligence is built for IT environments, butmanufacturers have a lot of operational technology, such as PLCs andSCADA systems, so they need highly tailored intelligence. Dealing with •Executives must urgently prioritize a proactive approach to securityas attacks grow in size and complexity.Eighty percent of respondentssay their senior leadership team underestimates their organization’scyberthreats (see Figure 4). The speed of attacks and the complexityof the threat landscape continue to increase. Respondents were most By industry, technology/technology services felt the most strongly thattheir leadership underestimates their organization’s cyberthreats, with84% agreeing. This could be due to leaders prioritizing innovation and (Responses of agree/strongly agree) Organizations Struggle To Operationalize Threat Intelligence Organizations rely on many information sourcesto stay abreast of vulnerabilities and emergingthreats: Respondents cited information sharingand analysis centers (ISACs) and paid external •Organizations gather threat intelligencefrom a variety of sources but value curatedinsights from paid threat intelligenceproviders and ISACs the most.Respondents,and especially those in APAC, rely on manysources for cyber intelligence, including ISACs,paid and open-source threat intelligencesolutions, social and traditional media, and Base: 1,541 senior IT and cybersecurityleaders at enterprise organizations inNorth America, Europe, and Asia PacificNote: Respondents were first askedwhich cyber intelligence sources theyuse and then which of those sourcesare most valuable. Responses show thep