Knowing how and when to perform incident escalation is when good threat intelligence becomes especially valuable. Compromises are usually not single events, but rather small pieces of a larger campaign. As new information is learned, the methods of detection and response need to escalate and adapt to handle the incident.
Cybersecurity staff deploying safety-critical IoT systems in industries such as transportation and utilities should keep an eye on national and international threats above and beyond the local organization. This is the normal course of business for the US and other national intelligence-related agencies. Nation-state, terrorist, organized crime and other international-related security considerations ...